IT in Manufacturing


Preventing cyberattacks

August 2023 IT in Manufacturing

A common misconception is that both cyberattacks and cybersecurity controls are sophisticated and complex. “In fact, the methods criminals use to infiltrate industrial networks are often relatively straightforward,” warns Charles Blackbeard, business development manager for ABB Ability Digital Solutions.

“Therefore, it follows that protection measures also often do not need to be overly convoluted, especially when implemented in line with a defined strategy based on a risk assessment, and managed by a user-friendly application that enables everyone to be part of cybersecurity efforts.”

Cybercriminals may gain access to a facility through insecure remote login software by exploiting disclosed vulnerabilities in the software or sending phishing emails to employees, who open them on a system connected to the plant network. Attackers may then take control of the mouse on an individual workstation and perform malicious tasks, undetected in the guise of a control system engineer performing their typical job but remotely.

“While controls such as patching, malware protection and system backups offer essential protection from cyberattacks, they need a solid foundation,” stresses Blackbeard. Suppose an industrial system is built on a poorly designed, indefensible network, where all devices are separated from the internet by a single firewall. In that case, additional risks are added to the mix and may even offset the benefit from the implemented security controls.”

Combining this with an ageing distributed control system relying on unsupported Windows computers makes it much easier for attackers to find and infiltrate the operation without using sophisticated methods. Implementing and maintaining even the most basic security controls upon a solid architecture significantly reduces the risk of being compromised. Over time, when the assessed threat changes, one may need to add more security to stay ahead and remain aligned with the company’s strategy and risk appetite.

According to the SANS 2021 OT/ICS Cybersecurity Report, 48% of organisations surveyed did not know whether their industrial control system (ICS) had been compromised. “That statement by itself is rather disturbing, but even more so when coupled with the evidence that most systems already are or have been compromised,” highlights Blackbeard. “This illustrates that the urgent need to secure operational environments is matched only by the need for cultural change. Leadership must understand and support OT cybersecurity efforts and instigate an organisational cultural shift to prioritise training and action. Without culture and behavioural change, it is unlikely that any investment in technology or software will lead to long-term protection.”

The threat posed by cyberattacks on industry regarding financial loss, production downtime and reputational damage cannot be underestimated. A total of 61% of factories report that they have experienced a critical cybersecurity incident, while 75% say an incident has halted production. The average cost of OT-specific malware attacks for organisations is nearly R50 million. Ransomware attacks carried out by criminals for financial gain account for around eight out of ten attacks. Industrial companies are viewed as easy, high-value targets whose OT systems may be outdated, unprotected and exploitable, maybe even via the internet, making an attack even easier.

He adds that the question industrial companies should be asking is not “Can I afford to implement a cybersecurity strategy?”, but rather “Can I afford not to?”. Viewed in terms of business criticality, protecting internal systems from hackers is now a business priority, particularly when it comes to critical public infrastructure such as electricity, or fuel and water supplies.

Defining ROI from cybersecurity is never easy, because you are effectively buying risk insurance, rather than tangible increases in revenue and production. However, companies are increasingly aware that security is not just about protecting critical assets: it is also about answering to investors and protecting their right to operate by complying with international best practices and standards.

Keep in mind that the yearly cost of implementing a robust cybersecurity strategy and controls that can be upgraded to respond to evolving threats to OT production assets, in partnership with a trusted service and technology provider, works out far less than the cost of an insurance policy. A well-implemented cybersecurity strategy may reduce the insurance premium to fund these cyber efforts partly or fully.

ABB Ability Cybersecurity Workplace (CSWP) simplifies the process of monitoring and maintaining foundational security controls by collecting security-relevant data from implemented cybersecurity solutions and forwarding it into a consolidated application. Operators can seamlessly monitor the status of basic security controls such as patching, malware protection and system backup, perform standard security tasks, and receive alerts with actionable insights to remediate weaknesses and reduce risks – all from a single, easy to use dashboard.

This makes maintaining your cybersecurity easier, quicker and less daunting. CSWP is scalable, meaning it can be updated with new security features to keep up with evolving threats, and support regulatory compliance without a lengthy learning curve. For example, an industrial plant may have McAfee malware protection software, and Windows Server for patching, and separate software for backup, which can be complex to operate and maintain.

CSWP makes this both standardised and configurable, and consolidates all security controls into one view so that staff do not have to access multiple applications. Equipping frontline workers with the tools to secure the operational environment also reduces labour and operating costs. Another feature requested by many is the power to isolate the OT and IT environments with a click of a button, and prevent IT network intrusions and external actors from affecting the OT systems and potentially harming people, assets or the environment. CSWP also reduces the risks associated with remote access by managing user accounts and authentication, notifying staff when someone remotely accesses the systems, and letting operators activate and terminate remote sessions at will.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Sustainable energy management
Siemens South Africa IT in Manufacturing
Utilising its innovative ONE approach technology, Siemens provides complete transparency on resource consumption and offers data-driven optimisation recommendations for sustainable energy management.

Read more...
Paving the way for a carbon-neutral future in South Africa
IT in Manufacturing
At ABB Electrification, we believe the infrastructure of the future must do more than support daily operations, it must anticipate them. We are committed to building intelligent systems that connect and optimise infrastructure across sectors.

Read more...
Africa’s hidden AI advantage
IT in Manufacturing
Through my work implementing AI systems across three continents, I’ve become convinced that Africa’s unique context demands urgent AI adoption. Successful implementation requires local expertise to understand resource constraints as design parameters to create the innovations that make technology truly work under real-world conditions.

Read more...
Siemens Xcelerator empowers space-tech pioneer, Skyroot Aerospace
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software has announced that Skyroot Aerospace, a leading private space launch service company in India, has adopted Polarion software from the Siemens Xcelerator portfolio to digitally transform its software development processes and enhance efficiency as it aims to accelerate access to space for its customers worldwide.

Read more...
Water is running out, is your ESG strategy ready?
IT in Manufacturing
Water is one of the most critical yet undervalued resources in modern business. Water stewardship asks businesses to understand their water footprint across the entire value chain and to engage with others who share the same water resources.

Read more...
Cybersecurity in 2025: Six trends to watch
Rockwell Automation IT in Manufacturing
Rockwell Automation’s 10th State of Smart Manufacturing report finds that cybersecurity risks are a major, ever-present obstacle, and are now the third-largest impediment to growth in the next 12 months.

Read more...
The state of the smart buildings market in 2025
IT in Manufacturing
Smart buildings are entering a transformative phase, driven by sustainability goals, technological innovation and evolving user expectations. According to ABI Research’s latest whitepaper, the sector is undergoing a strategic overhaul across key areas like retrofitting, energy efficiency, data-driven operations and smart campus development.

Read more...
Digital twin for Bavaria’s National Theatre
Siemens South Africa IT in Manufacturing
Siemens and the Bavarian State Opera are digitalising the acoustics in Bavaria’s National Theatre in Munich, Germany. The result is a digital twin that simulates sound effects, orchestral setups and venue configurations in a realistic 3D acoustic model so that musicians, the director and conductors can assess a concert hall’s acoustics even before the first rehearsal.

Read more...
How AI can help solve South Africa’s water crisis
IT in Manufacturing
Climate change, ageing infrastructure, pollution and unequal access are putting intense pressure on the country’s water systems. A powerful question arises: “Can artificial intelligence help us change course?”

Read more...
Backup has evolved, but has your strategy?
IT in Manufacturing
With cyber threats rising and compliance standards tightening, South African organisations are under growing pressure to revisit their data protection strategies. The era of treating backups as a box-ticking exercise is over.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved