The Need for Implementing Basic Cybersecurity Hygiene in Industries
The rise in internet-based attacks on industrial control systems shows the negligence of organizations in implementing the basic cybersecurity measures.
FREMONT, CA: The equipment manufactured by enterprise often ends up in energy systems, defense equipment, and in several other critical sectors. Cyber Security failures in these sectors can have adverse effects that reach beyond process failure. It could even compromise national security. The main reason for the failure can be attributed to the lack of cybersecurity measures in the IT departments of the manufacturing firms.
In the manufacturing sector, industrial control systems are most prone to cyber threats. Even with the rise in cyberattacks, the statistics show an increase of 30 percent in industrial equipment vulnerability. Surprisingly, most of these failures are caused due to the negligence of organizations toward the implementation of necessary cybersecurity measures.
Check out: Top Cyber Security Companies
Centrify recently conducted a cybersecurity survey with 1300 organization across 11 industries in the U.S. and Canada. According to the report, almost 93 percent of the organization claimed the availability of active measures against threats that involved privileged access. However, the report shows that their approaches were not comprehensive enough to deal with evolving cyberattack tactics.
Cyberattack on industrial control systems is a more significant threat than what is perceived by the organizations. The failure of these systems due to cyberattacks can result in material loss and production downtime, not to mention the socio-economic effects. The significance of industrial control systems (ICS) has made cybersecurity an inevitable factor for organizations to consider when implementing connectivity.
In the face of the looming cybersecurity threats, the concerns of enterprises are in product damage, service failure, and employee injury. The broader effects include loss of product quality, consumer confidence, and classified information, including contracts and employee data.
The recent cybersecurity reposts show that the primary sources of threats to the ICS stem from the internet, email, and removable media. The increase of internet-based attacks from 20.6 percent in 2017 to 27.3 percent in 2018 shows the rise in industrial connectivity. However, the problem lies in the lack of parallel cybersecurity measures to protect the connected systems.
The rising cyberattacks on ICS loom as a dark shadow over the enterprises. Hence, there is a need for enterprises to make cybersecurity a priority right from the adoption of ICS and other connected systems. Also, organizations need to train their employees regarding cyber threats and effective cybersecurity measures to counter them.
By Tom Farrah, CIO & SVP, Dr Pepper Snapple Group
By George Evans, CIO, Singing River Health System
By John Kamin, EVP and CIO, Old National Bancorp
By Phil Jordan, CIO, Telefonica
By Elliot Garbus, VP-IoT Solutions Group & GM-Automotive...
By Dennis Hodges, CIO, Inteva Products
By Bill Krivoshik, SVP & CIO, Time Warner Inc.
By Gregory Morrison, SVP & CIO, Cox Enterprises
By Alberto Ruocco, CIO, American Electric Power
By Sam Lamonica, CIO & VP Information Systems, Rosendin...
By Sven Gerjets, SVP-IT, DIRECTV
By Marie Blake, EVP & CCO, BankUnited
By Lowell Gilvin, Chief Process Officer, Jabil
By Walter Carvalho, VP & Corporate CIO, Carnival Corporation
By Mary Alice Annecharico, SVP & CIO, Henry Ford Health System
By Bernd Schlotter, President of Services, Unify
By Bob Fecteau, CIO, SAIC
By Jason Alan Snyder, CTO, Momentum Worldwide
By Jim Whitehurst, CEO, Red Hat
By Marc Jones, Distinguished Engineer, IBM Cloud Infrastructure