Cybersecurity recommendation | 7 | Industries are running fast into Automatized Process Control - European Champions Alliance
3569
post-template-default,single,single-post,postid-3569,single-format-standard,ajax_fade,page_not_loaded,,qode_grid_1300,footer_responsive_adv,qode-content-sidebar-responsive,qode-child-theme-ver-1.0.0,qode-theme-ver-10.1.1,wpb-js-composer js-comp-ver-7.3,vc_responsive,elementor-default,elementor-kit-6046
 

Cybersecurity recommendation | 7 | Industries are running fast into Automatized Process Control

Cybersecurity recommendation | 7 | Industries are running fast into Automatized Process Control

The problem:

This includes spreading connected meters and other objects (IoT) and constantly collecting data from those devices.

Hence the target of an attack will now not only include the classical company’s information system (IT: Information Technology) but also its connected industrial infrastructure (OT: Operational Technology).
Attacks against IoT and industrial control/command systems can have dramatic consequences. Not only can it damage, perhaps stop, the company’s operation, but it can also lead to wide range of consequences in the case of a large connected network.

 

7 key recommendations you should keep in mind

  1. Don’t forget: IoT is multiplying the probability of an attack by 10 at least.
  2. Don’t forget: the consequences of a successful attack on your IoT system can be dramatic.
  3. Don’t forget: while it is already tough to register and manage all the components of your IT system, it is even more difficult for elusive connected objects.
  4. An IoT system, an industrial automated system (OT), is a long chain with many components. Security must be applied all along the chain.
  5. Deploying an Endpoint Detection and Response solution with automated remediation on your most critical OT assets can be carefully considered as it is designed to stop unknown threats and prevent a costly plant shutdown
  6. Consider building an industrial cyber resilience platform to escrow vital information (industrial IS, ERP…) which must remain available in any circumstances.
  7. Consider IoT is often part of digital transformation with Business Model innovation (Product As a Service) and you need to protect your customer business.

 

Download and consult our Cybersecurity Guide for more recommendations: 

Andrea Vaugan
andrea.vaugan@european-champions.com