• Latest
  • Trending
The Three OT Security Dangers of R&R

The Three OT Security Dangers of R&R

January 3, 2022
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Tuesday, 7 February, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

The Three OT Security Dangers of R&R

by ITECHNEWS
January 3, 2022
in Leading Stories, Opinion
0 0
0
The Three OT Security Dangers of R&R

The convergence of operational technology (OT) and information technology (IT) networks increases the complexity of and risks to systems that have long been air-gapped to ensure security. The addition of potentially thousands of industrial internet of things (IIoT) devices for sensing and instrumentation compounds those challenges exponentially.

As operational and cyber risks multiply, we, unfortunately, see too many companies embrace R&R, and that is not ‘rest and relaxation.’ It is ‘react and rush.’ This trend occurs across companies of various sizes and varying stages of their IT/OT convergence journeys.

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

Through my work in OT security, I have seen many organizations react – waiting for incidents to occur before they do and rushing to find a solution. This reactive approach is often due to limited awareness of OT security challenges, and threats or the prioritization of other investments focused on increased productivity instead of securing their infrastructure. But when organizations react, they often rush to solve a security challenge or respond to a corporate or regulatory mandate to a detrimental effect. We all know that rushing potentially leads to errors; with large OT/IT organizations, those errors can have substantial economic or long-term impacts. In the heat of the moment, organizations may embrace solutions that address only part of their needs. That leaves them exposed or needing to pursue additional investments not long after the first inadequate purchase.

R&R behaviors are resulting in the significant rise of three major OT security dangers:

  1. Making the Wrong InvestmentRushing to purchase a solution in response to a costly cybersecurity incident can force an organization to think small and overlook broader concerns they would see given the time to plan carefully. It’s human nature to end up often making tactical decisions as opposed to strategic ones that would bring more benefits in the medium and longer-term, and that would help solve a bigger problem than the one we are tackling today. Similarly, rushing a purchase decision may lead us to select a solution purely based on what functionality it does or does not have, rather than factoring in other critical criteria such as the solution’s ability to scale or the vendor’s long-term support capabilities. For example, a company may choose solutions that solve an OT device visibility problem or offer threat detection solely but don’t allow to take response actions based on observed threats. Therefore, it will not be able to mature with the organization to its next stage.
  2. Limiting OT Security Projects to Small PilotsCompanies are allocating limited dollars to OT security and often only conducting small pilots because they don’t see the value in scaling from the outset. This is often due to the lack of concrete and measurable project objectives and KPIs. Measuring a project’s success and value isn’t easy without a clear scope and well-defined strategic objectives, especially one involving cybersecurity. Unfortunately, that can lead to project abandonment, with the security gap and attack surface remaining wide open.
  3. Potential Collateral Damage via Malware and Ransomware As companies address challenges in limited steps or scope, they unknowingly create protection gaps. For example, an organization might tackle visibility challenges first and only with IT systems, then move onto OT; or they may only tackle attack surface visibility challenges without segmentation and control capabilities. The byproduct of these partial solutions is parts or entire OT systems becoming collateral damage during a malware infection or ransomware incident. In addition, malware intrinsically tries to maximize its spread, so even companies that are not initially targeted by an attack may easily fall victim to it, as we have seen in the past years.

With the pressure to embrace modern technology, adopt new tools and practices, and gain the business and competitive advantages that come from integrating IT, OT and IoT devices and networks, it is understandable that missteps may occur. However, upfront thought, strategic planning and a bit of patience will go a long way to helping operators gain the benefits while preserving security on which their business, and their customers, depend.

Source: Daniel Trivellato
Via: Vice President Product & Engineering (OT, IoT, IoMT), Forescout
Tags: OT Security
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version