- Register

 
 

Home>IIot & Smart Technology>Cyber Security>Prioritise reducing the risk
ARTICLE

Prioritise reducing the risk

28 August 2024

Cyber attacks and ransomware pose a growing threat to industrial operators that can at best cause inconvenience, and at worst bring production lines to a halt, jeopardise data privacy, and damage business reputation. All of this carries the potential for catastrophic expense, or worse, says Giacomo Mosca

BOTH RISK and incident rates of cyber security threat in the industrial sector have exponentially risen, with an industry report citing a 50 per cent rise in cases in 2023. While a 2023 Statista report highlighted manufacturing as having the biggest share of cyber-attacks among leading industries worldwide, at more than 25%. 

Although there is a growing awareness and more in the way of preventative measures made by the industry to combat this, the effort of cyber criminals in developing more sophisticated techniques also grows, and their approach evolves. The rise of smart manufacturing has also undoubtedly added to the risk.

Staying one step ahead, implementing the right security controls in line with evolving regulatory mandates, as well as having preventative measures – including physical ones – in place as part of a comprehensive plan, is vital in the ongoing war against cyber crime.

Contributory factors to the rise of cyber crime

Industry 4.0 brings unrivalled operational efficiencies to give manufacturers a competitive edge in a fierce industry. But with that comes a growing implementation of internet-accessible devices that can provide a great way in for hackers. Internet of Things (IoT) devices are increasingly deployed for effective asset monitoring, but if not properly secured they can also provide an open door to the wider network. Balancing technology adoption with robust security measures is vital to avoid security compromise.

Global conflict has also contributed to a rise in cyber threat, as the efforts of existing ‘hacktivists’ – those driven by conflicts like those between Russia and Ukraine, and Israel and Hamas – have been renewed and re-invigoured  

The financial reward for successful cybercrime is also a significant incentive. An industrial organisation facing costly downtime due to a cyber attack is likely to succumb to ransom demands in order to get operations up and running again quickly, and reduce cost and reputation risk. It’s reported that around a third of firms threatened with ransomware pay up, which may seem relatively low. However, the proportion of manufacturing firms paying higher ransoms is on the rise, according to a report from Sophos, so there’s still enough reward incentive for cyber criminals.

Planning, prevention and protection

Proper segregation of IT from Operational Technology (OT) networks is key to blocking cyber criminal access. Regular security testing in operational technology environments in manufacturing is also crucial, and often best conducted by a specialist firm. While the cost of doing so may be an initial barrier, the cost of not doing it could be far higher and should be considered in any investment decision. Similarly, OT security monitoring to identify potential security breach threat before they impact operations is a specialist service or solution that requires investment, but could be a wise one.

There should also be a plan in place for the case of a cyber attack, so decision-makers have a course of action to follow to minimise disruption in a crisis. If facilities allow for a temporary plant switch, for instance, and if and when equipment is switched off, and whose responsibility that is. Having a communications plan to let the right people know at the right time, such as customers if the security breach will impact them, is also a key element in the action plan. With many quick decisions to be made, doing them under the pressure of a crisis isn’t the best strategy. Planning ahead is.

Consideration of physical plant security should also be prioritised. Ensuring no unauthorised access to areas where OT could be tampered with is a good security measure. And firms shouldn’t rule out the possibility of criminals approaching employees, either giving financial incentives for knowingly aiding a cyber breach, or being tricked. Methods like phishing or sending malware via external drives like a USB stick to someone who could use it unwittingly.

Consider security throughout the supply chain

Ensuring no security breaches can occur through third parties is an area to cover. As there is a growing number of providers of cloud-based platforms to connect data from devices and provide real-time data analysis for predictive maintenance, it’s wise to choose those that can demonstrate a commitment to high levels of security. The RS Industria cloud-based asset monitoring solution achieved the top cyber security standard this year, the coveted ISO 27001 Cyber Security standard. This testifies to the fact its technology, infrastructure and internal security procedures meet the tough requirements of the global standard, and gives customers reassurance that it will not expose their manufacturing systems to additional cyber-security risk.

All aspects of cyber security were reviewed by the RS Industria technology team in order to qualify for this British Standards Institution Group accreditation, which reflects the commitment to cyber-security being at the heart of the solution. Choosing a provider that can demonstrate such a commitment is another precaution to take.

There are still some challenges around protection of OT, which is often harder to secure as many plants are still operating ageing assets, and a continuous operational cycle means creating downtime to execute security can impact production. But with the introduction of the second Network Information Systems directive (NIS2),which mandates a number of information security controls for certain organisations operating in the EU, more stringent supervisory measures and stricter enforcement requirements have been introduced. There can be financial, or even criminal, penalties for non-compliance, and even personal liability for senior management.

As the threat of cyber crime continues to rise, the need for a continuously evolving approach is evident. The cost of taking limited action could be too much for the business to bear in the event of an attack that could have been prevented.

Giacomo Mosca is chief information security officer (CISO) interim for RS Group

uk.rs-online.com

 
OTHER ARTICLES IN THIS SECTION
FEATURED SUPPLIERS
 
 
TWITTER FEED