Connect with us

Hi, what are you looking for?

BUSINESS

Top 10 tips to address tech vulnerabilities in critical infrastructure industries

Security expert, Fortinet, states that almost 80 percent of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as software misconfigurations from human error and malfunctioning network protocols.

Critical infrastructure industries in particular, such as utilities, transportation and natural resource producers, together with the communities and economies they serve, face not only particularly damaging outcomes from cyber security attacks, but also need to deal with significant complexity due to the scale of their operations.

Market research firm ABI Research estimates that spending on critical cyber security infrastructure in the Asia-Pacific region is expected to hit US$22 billion by 2020.

“Organizations across multiple industries today face an evolving threats cape and growing pressure to rethink security strategies for long-term sustainability. A more holistic security sapproach is required to protect against intentional targeted attacks as well as human error from internal sources,” said Jeff Castillo, Country Manager of Fortinet Philippines. “Solving ICS (industrial control systems) security issues requires a solution that unifies the best of current OT network security capabilities with an extensive understanding of ICS processes and protocols.”

Advertisement. Scroll to continue reading.

The machines and technology used to manage and run hydropower dams, oil and gas companies and other infrastructures were never designed to be connected to remote or public networks. As these systems were isolated and physical access often restricted, information security has never been accorded the highest priority.

“But with emergence of Industry 4.0, these environments are now interconnected. Proliferation of open standard and off-the-shelf hardware and software also increases their vulnerability. This means that industrial control systems (ICS) now have a wider footprint for attack,” explained Castillo.

As organizations cannot predict every threat, they must then focus on what they can control. Fortinet has recently issued Top 10 guidelines to help local companies assess their operational technology (OT) vulnerabilities:

1.    Identify critical elements that need immediate protection is a crucial first step

2.    Identify protocols for permission management or access to controls – Most systems were previously isolated. Now that IT and OT are interconnected, they need to keep pace with OT security best practices. In addition, determining the appropriate privileges for authorized users is just as important as blocking unauthorized access

Advertisement. Scroll to continue reading.

3.    Update hardware and software operating systems regularly – Some hardware and software systems pre-date the very notion of cybersecurity. Organizations need to ensure compatibility with standard modern defenses such as anti-virus software or threat scanning technologies

4.   Perform regular and routine organization update and patch – While most operations cannot afford any down-time and cost associated with patching, deferring updates lead to wider security gaps.

5.    Identify unsecured, and IP-enabled telemetry devices such as sensors and pressure gauges – Data on these devices can be manipulated, which then impacts the safety and reliability of the overall system.

6.   Employ best practices in modern coding – Using embedded and often custom-built software written with little attention to recommended security techniques leaves OT systems open to attack.

7.    Adhere to a standard procedure for logging events – Organizations that establish a process for noting and reporting system events can often use this data to detect irregularities and implement security measures.

Advertisement. Scroll to continue reading.

8.   Regulate component manufacturers and supply chain – Without proper monitoring and governance, equipment may be compromised before it is even installed.

9.   Implement Network Segmentation – Many operations have not yet partitioned their networks into functional segments (while remaining fully interconnected). Without proper segmentation, infected data and applications can overlap from one segment to another, and attackers who manage to breach perimeter defenses can easily move undetected across the network

 

10.  Prepare an Operational Recovery Plan – In the unfortunate event of a disaster, every organization needs a documented procedure to assess damage, repair systems and machines, and restore operations. Regular security drills also help operators implement recovery quickly and efficiently when it is needed most.

 

Advertisement. Scroll to continue reading.

 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

Advertisement