IT in Manufacturing


Defending against modern-day cyber threats

April 2024 IT in Manufacturing

The anatomy of cyber threats has changed, meaning that organisations can no longer rely on traditional cybersecurity solutions to protect their perimeter, but should instead rethink their data protection strategy and become proactive in their defence against breaches. Modern cyber threats have become far more intelligent, and can reside on an organisation’s network and devices for months before executing an attack to analyse and find vulnerabilities to target. Data typically resides on premises, in public and private clouds, in software-as-a-service (SaaS) applications, and on end user devices. The perimeter that organisations must protect is becoming increasingly huge.

At the same time, traditional point solutions for data protection are no longer adequate, while comprehensive solutions are very hard to come by. This is driving the need for next-generation data protection with active defence, which will enable organisations to effectively protect their perimeter.

So, how do cyberattacks happen in the modern era? Bad actors typically access an organisation’s devices and networks, where they remain latent for quite some time. They then start to do some damage by executing their payload, encrypting or exfiltrating and leaking data. Then they disable applications from operational recovery, and prevent the organisation from doing further backups. Simply put, they wreak havoc and cause damage to the network.

Fast attack

On average, it takes 84 minutes to execute the attack, which is a drastic drop in the attack vector in that aspect. On the other hand, the entry point has been extended because cybercriminals have become a lot more intelligent and do a significant amount of analysis before they attack, figuring out where the data points are and where sensitive data resides, to determine how to attack it.

Once enacted, the attack itself is very short. The surprising part for many organisations is that 93% of attacks target backup repositories as they contain all their critical data. This is the easiest target to go after, and raises the need for organisations to rethink their data protection strategies. Modern enterprises need to deploy next-generation solutions, as many of the data protection solutions in the market are not geared to protect against what is happening now.

To make things worse, according to the latest cybercrimes trends published by Crowdstrike, malware-free cyberattacks have reached 71% of the breaches recorded annually. This is not good news, as it means that valid credentials were used to gain access to systems and to have privileges as the legitimate user of a targeted device. This also means that targeted organisations did not even know they were being attacked.

Moving in between

Modern-day cyber threats are essentially moving in between traditional data protection solutions and the organisation’s last line of defence (backup and recovery). It is at the intersection of these two points where traditional solutions, perimeter security, and the last line of defence are not catching these threats.

This trend is driving the need for the next-generation data protection with active defence. This means that an organisation’s data protection solution needs to start assessing its data at a much earlier stage. This is because bad actors often gain access to an environment more than six months in advance.

Organisations need to be a lot more proactive, and thus minimise the use of the last line of defence by being able to detect bad actors much earlier on. This can be done with early threat detection, checking for suspicious activity, early warning, and threat and risk analysis.

Recovery as a last line of defence is necessary, but is not enough. With the growing sophistication of cyber threats, organisations need to understand that there are many measures they can and should put in place to prevent bad actors from reaching their last line of defence.

For more information contact Commvault, +27 86 111 4625, [email protected], www.comvault.com




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing brownfield plants back to life
Schneider Electric South Africa IT in Manufacturing
Today’s brownfield plants are typically characterised by outdated equipment and processes, and face challenges ranging from inefficient operations to safety hazards. However, all is not lost, as these plants stand to gain a lot from digitalisation and automation.

Read more...
Control architecture leads to faster, easier product development for refrigeration
Opto Africa Automation Editor's Choice IT in Manufacturing
What’s the secret to providing superior service and staying competitive in a changing market? You might learn something from ALTA Refrigeration’s experience. Over ten years, it transformed itself from a custom engineering services company into a scalable industrial equipment manufacturer, using an edge-oriented control architecture to manage a growing installed base.

Read more...
Comprehensive protection of the network against attacks
Phoenix Contact IT in Manufacturing
In recent years, the generation of data to create ever better transparency and control of production has become a decisive competitive factor. IIoT has also contributed to more manufacturing systems being connected to IT or cloud systems. This places higher demands on access security, which Phoenix Contact meets with the Secure Edge Box.

Read more...
Embracing security as a core component of your technology
IT in Manufacturing
ABI Research recently undertook a comprehensive study to learn more about the product security assurance landscape from the perspective of enterprise customers, surveying 302 enterprise customers, and conducting in-depth interviews to complement the qualitative survey.

Read more...
AI in manufacturing: a process engineer’s perspective
Editor's Choice IT in Manufacturing
The expert will tell you what to do, the philosopher will tell you why to do it, and the engineer will get on and actually do it. As the hype around AI intensifies, the number of ‘experts’ is increasing exponentially. In contrast, the number of engineers who actually know how to implement AI technology remains small.

Read more...
Generative AI for immersive real-time visualisation
Siemens South Africa IT in Manufacturing
Siemens will deepen its collaboration with NVIDIA to help build the industrial metaverse.

Read more...
Award-winning Gen AI solutions
IT in Manufacturing
Amazon Web Services recently hosted an exclusive event in South Africa on ‘Elevating Possibilities with Partners - a Showcase of GenAI Excellence’. This event brought together ten esteemed partners, including Synthesis Software Technologies, to highlight innovative advancements in the field of Generative AI.

Read more...
AI is driving data centres to the edge
Schneider Electric South Africa IT in Manufacturing
The data centre has become the cornerstone that links our digitally interconnected world. At the same time, the rapid growth and application of AI and machine learning (ML) is shaping the design and operation of data centres.

Read more...
Full-scale central control room simulator
Valmet Automation IT in Manufacturing
Valmet will deliver a full-scale central control room simulator to Nordic Ren-Gas, the leading Nordic green hydrogen and e-methane developer in Finland.

Read more...
Re-imagining business operations with the power of AI
IT in Manufacturing
inq. has introduced a range of artificial intelligence solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...