IT in Manufacturing


Defending against modern-day cyber threats

April 2024 IT in Manufacturing

The anatomy of cyber threats has changed, meaning that organisations can no longer rely on traditional cybersecurity solutions to protect their perimeter, but should instead rethink their data protection strategy and become proactive in their defence against breaches. Modern cyber threats have become far more intelligent, and can reside on an organisation’s network and devices for months before executing an attack to analyse and find vulnerabilities to target. Data typically resides on premises, in public and private clouds, in software-as-a-service (SaaS) applications, and on end user devices. The perimeter that organisations must protect is becoming increasingly huge.

At the same time, traditional point solutions for data protection are no longer adequate, while comprehensive solutions are very hard to come by. This is driving the need for next-generation data protection with active defence, which will enable organisations to effectively protect their perimeter.

So, how do cyberattacks happen in the modern era? Bad actors typically access an organisation’s devices and networks, where they remain latent for quite some time. They then start to do some damage by executing their payload, encrypting or exfiltrating and leaking data. Then they disable applications from operational recovery, and prevent the organisation from doing further backups. Simply put, they wreak havoc and cause damage to the network.

Fast attack

On average, it takes 84 minutes to execute the attack, which is a drastic drop in the attack vector in that aspect. On the other hand, the entry point has been extended because cybercriminals have become a lot more intelligent and do a significant amount of analysis before they attack, figuring out where the data points are and where sensitive data resides, to determine how to attack it.

Once enacted, the attack itself is very short. The surprising part for many organisations is that 93% of attacks target backup repositories as they contain all their critical data. This is the easiest target to go after, and raises the need for organisations to rethink their data protection strategies. Modern enterprises need to deploy next-generation solutions, as many of the data protection solutions in the market are not geared to protect against what is happening now.

To make things worse, according to the latest cybercrimes trends published by Crowdstrike, malware-free cyberattacks have reached 71% of the breaches recorded annually. This is not good news, as it means that valid credentials were used to gain access to systems and to have privileges as the legitimate user of a targeted device. This also means that targeted organisations did not even know they were being attacked.

Moving in between

Modern-day cyber threats are essentially moving in between traditional data protection solutions and the organisation’s last line of defence (backup and recovery). It is at the intersection of these two points where traditional solutions, perimeter security, and the last line of defence are not catching these threats.

This trend is driving the need for the next-generation data protection with active defence. This means that an organisation’s data protection solution needs to start assessing its data at a much earlier stage. This is because bad actors often gain access to an environment more than six months in advance.

Organisations need to be a lot more proactive, and thus minimise the use of the last line of defence by being able to detect bad actors much earlier on. This can be done with early threat detection, checking for suspicious activity, early warning, and threat and risk analysis.

Recovery as a last line of defence is necessary, but is not enough. With the growing sophistication of cyber threats, organisations need to understand that there are many measures they can and should put in place to prevent bad actors from reaching their last line of defence.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...
Driving digital transformation in the truck industry
Siemens South Africa IT in Manufacturing
Tatra Trucks, a leading truck manufacturer in Czechia, has adopted the Siemens Xcelerator portfolio of industry software including Teamcenter software for product lifecycle management and the Mendix low code platform to help increase production volume and strengthen its ability to manufacture vehicles that meet specific customer requirements.

Read more...
Opinion piece: Digital twins in manufacturing – design, optimise and expand
Schneider Electric South Africa IT in Manufacturing
Digital twin technology can help create better products, fast. It can also transform the work of product development. This strong statement from McKinsey reinforces how far digital twins have come in manufacturing.

Read more...
Asset tracking is key to driving operational excellence and sustainable growth
Schneider Electric South Africa IT in Manufacturing
Asset tracking plays a critical role in the success of industrial businesses. By effectively managing and monitoring assets, companies can optimise their operations, ensuring that resources are used efficiently. This leads to improved productivity and reduced costs.

Read more...
Siemens democratises AI-driven PCB design for small and medium electronics teams
Siemens South Africa IT in Manufacturing
Siemens Digital Industries Software is making its AI-enhanced electronic systems design technology more accessible to small and mid-sized businesses with PADS Pro Essentials software and Xpedition Standard software.

Read more...
Predicting and preventing cyber-attacks with AI and generative AI
IT in Manufacturing
The speed at which cyber threats are evolving is unprecedented. As a result, companies need to implement state-of-the-art technology to protect their data and systems.

Read more...
Real-world lessons in digital transformation
IT in Manufacturing
Synthesis has helped businesses across multiple industries with their digital transformation by solving their unique integration challenges.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved