IT in Manufacturing


Preventing cyberattacks

August 2023 IT in Manufacturing

A common misconception is that both cyberattacks and cybersecurity controls are sophisticated and complex. “In fact, the methods criminals use to infiltrate industrial networks are often relatively straightforward,” warns Charles Blackbeard, business development manager for ABB Ability Digital Solutions.

“Therefore, it follows that protection measures also often do not need to be overly convoluted, especially when implemented in line with a defined strategy based on a risk assessment, and managed by a user-friendly application that enables everyone to be part of cybersecurity efforts.”

Cybercriminals may gain access to a facility through insecure remote login software by exploiting disclosed vulnerabilities in the software or sending phishing emails to employees, who open them on a system connected to the plant network. Attackers may then take control of the mouse on an individual workstation and perform malicious tasks, undetected in the guise of a control system engineer performing their typical job but remotely.

“While controls such as patching, malware protection and system backups offer essential protection from cyberattacks, they need a solid foundation,” stresses Blackbeard. Suppose an industrial system is built on a poorly designed, indefensible network, where all devices are separated from the internet by a single firewall. In that case, additional risks are added to the mix and may even offset the benefit from the implemented security controls.”

Combining this with an ageing distributed control system relying on unsupported Windows computers makes it much easier for attackers to find and infiltrate the operation without using sophisticated methods. Implementing and maintaining even the most basic security controls upon a solid architecture significantly reduces the risk of being compromised. Over time, when the assessed threat changes, one may need to add more security to stay ahead and remain aligned with the company’s strategy and risk appetite.

According to the SANS 2021 OT/ICS Cybersecurity Report, 48% of organisations surveyed did not know whether their industrial control system (ICS) had been compromised. “That statement by itself is rather disturbing, but even more so when coupled with the evidence that most systems already are or have been compromised,” highlights Blackbeard. “This illustrates that the urgent need to secure operational environments is matched only by the need for cultural change. Leadership must understand and support OT cybersecurity efforts and instigate an organisational cultural shift to prioritise training and action. Without culture and behavioural change, it is unlikely that any investment in technology or software will lead to long-term protection.”

The threat posed by cyberattacks on industry regarding financial loss, production downtime and reputational damage cannot be underestimated. A total of 61% of factories report that they have experienced a critical cybersecurity incident, while 75% say an incident has halted production. The average cost of OT-specific malware attacks for organisations is nearly R50 million. Ransomware attacks carried out by criminals for financial gain account for around eight out of ten attacks. Industrial companies are viewed as easy, high-value targets whose OT systems may be outdated, unprotected and exploitable, maybe even via the internet, making an attack even easier.

He adds that the question industrial companies should be asking is not “Can I afford to implement a cybersecurity strategy?”, but rather “Can I afford not to?”. Viewed in terms of business criticality, protecting internal systems from hackers is now a business priority, particularly when it comes to critical public infrastructure such as electricity, or fuel and water supplies.

Defining ROI from cybersecurity is never easy, because you are effectively buying risk insurance, rather than tangible increases in revenue and production. However, companies are increasingly aware that security is not just about protecting critical assets: it is also about answering to investors and protecting their right to operate by complying with international best practices and standards.

Keep in mind that the yearly cost of implementing a robust cybersecurity strategy and controls that can be upgraded to respond to evolving threats to OT production assets, in partnership with a trusted service and technology provider, works out far less than the cost of an insurance policy. A well-implemented cybersecurity strategy may reduce the insurance premium to fund these cyber efforts partly or fully.

ABB Ability Cybersecurity Workplace (CSWP) simplifies the process of monitoring and maintaining foundational security controls by collecting security-relevant data from implemented cybersecurity solutions and forwarding it into a consolidated application. Operators can seamlessly monitor the status of basic security controls such as patching, malware protection and system backup, perform standard security tasks, and receive alerts with actionable insights to remediate weaknesses and reduce risks – all from a single, easy to use dashboard.

This makes maintaining your cybersecurity easier, quicker and less daunting. CSWP is scalable, meaning it can be updated with new security features to keep up with evolving threats, and support regulatory compliance without a lengthy learning curve. For example, an industrial plant may have McAfee malware protection software, and Windows Server for patching, and separate software for backup, which can be complex to operate and maintain.

CSWP makes this both standardised and configurable, and consolidates all security controls into one view so that staff do not have to access multiple applications. Equipping frontline workers with the tools to secure the operational environment also reduces labour and operating costs. Another feature requested by many is the power to isolate the OT and IT environments with a click of a button, and prevent IT network intrusions and external actors from affecting the OT systems and potentially harming people, assets or the environment. CSWP also reduces the risks associated with remote access by managing user accounts and authentication, notifying staff when someone remotely accesses the systems, and letting operators activate and terminate remote sessions at will.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Why choose between Capex and Opex if you can Totex?
Schneider Electric South Africa IT in Manufacturing
In a sector marked by cyclical demand, high capital intensity, and increasing regulatory and sustainability pressures, mining, minerals and metals (MMM) companies are re-evaluating how they approach procurement and investment.

Read more...
AI and the smart factory
Schneider Electric South Africa IT in Manufacturing
Imagine walking into a factory where machines can think ahead, predict problems before they happen and automatically make adjustments to realise peak performance. This isn’t science fiction, it’s happening right now as AI continues to transform how we run industrial operations.

Read more...
Why your supply chain should be a competitive advantage
Schneider Electric South Africa IT in Manufacturing
The last five years have placed unprecedented strain on global supply chains. Leading companies are turning the challenge into an opportunity to transform their supply chains into a competitive advantage.

Read more...
Why AI will never truly understand machines
Wearcheck IT in Manufacturing
Cutting-edge technology and solutions powered by AI are embraced by specialist condition monitoring company, WearCheck, where the extreme accuracy of data used to assess and diagnose machine health is paramount.

Read more...
Buildings and microgrids for a greener future
Schneider Electric South Africa IT in Manufacturing
Buildings are no longer passive consumers of power. Structures of almost every size are evolving into dynamic energy ecosystems capable of generating, storing and distributing their own electricity. Forming part of this exciting transformation are microgrids.

Read more...
Traditional data centres are not fit for purpose
IT in Manufacturing
Traditional data centre designs are falling short, with nearly half of IT leaders admitting their current infrastructure does not support energy or carbon-reduction goals. New research commissioned by Lenovo reveals that data centre design must evolve to future-proof businesses.

Read more...
AI agents for digital environment management in SA
IT in Manufacturing
The conversation about artificial intelligence in South Africa has shifted rapidly over the past year. Among the technologies changing the pace of business are AI agents - autonomous, task-driven systems designed to operate with limited human input.

Read more...
AI-powered maintenance in future-ready data centres
Schneider Electric South Africa IT in Manufacturing
The data centre marketplace often still relies on outdated maintenance methods to manage mission-critical equipment. Condition-Based Maintenance (CBM) is powered by AI and is fast becoming a necessity in ensuring both competitiveness and resilience.

Read more...
Powering up data centre mega development
IT in Manufacturing
Parker Hannifin has secured a major contract to supply key equipment for nearly 30 aeroderivative gas turbines powering a new hyperscale data centre in Texas.

Read more...
Building resilient supply chains through smarter e-procurement
RS South Africa IT in Manufacturing
In a time of constant disruption, from supply chain uncertainty to rising operational costs, businesses that embrace digital procurement are better positioned to stay competitive and resilient.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved