IT in Manufacturing


Cybersecurity in factory automation

November 2024 IT in Manufacturing

In the era of Industry 4.0, factory automation has transformed industrial processes, enhancing efficiency, productivity and connectivity. However, this digital evolution has also introduced new vulnerabilities, making cybersecurity a critical concern for manufacturers. Addressing these challenges is crucial to protect critical infrastructure from increasingly sophisticated cyberthreats. As part of Adroit Technologies and Mitsubishi Electric, the company is at the forefront of implementing robust cybersecurity measures in factory automation.

The growing cyberthreat landscape

Albert Einstein once said, “I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones.” While Einstein couldn’t have foreseen the advent of cyber warfare, his sentiment about the devastating potential of future conflicts resonates today. Cyberattacks are a pervasive global issue, constantly targeting critical infrastructure, including factory automation systems.

Historically, factories operated in isolated environments, with minimal cyber risks. However, the shift towards connected factories, driven by the adoption of IoT and AI, has exponentially increased these risks. Ransomware attacks, for instance, have surged in parallel with the rise of cryptocurrencies, demonstrating the evolving nature of cyberthreats.

Legislative responses to cybersecurity challenges

Governments worldwide are responding to these threats by introducing robust cybersecurity legislation, particularly focusing on operational technology (OT) and factory automation. In the European Union, significant legislative measures include the Cyber Resilience Act and the Network and Information Systems Directive  (NIS2).

The Cyber Resilience Act

Approved by the European Parliament in March, the Cyber Resilience Act aims to create a coherent cybersecurity framework for all products with digital components, not just factory automation. This horizontal legislation impacts manufacturers, importers and distributors, requiring them to implement comprehensive cyber risk assessments and coordinated vulnerability disclosure policies. The act emphasises the importance of reporting vulnerabilities and incidents to enhance overall security.

The Network and Information Systems Directive (NIS2)

NIS2, which came into force in January 2023, extends its scope beyond critical infrastructure to include sectors such as waste management, pharmaceuticals, food and beverage, social media platforms, and cloud service providers. This directive mandates that organisations providing essential services implement cyber risk management programmes and adhere to specific reporting obligations for incidents and vulnerabilities.

Implementing cybersecurity in factory automation

Achieving compliance with these legislative frameworks, and ensuring robust cybersecurity in factory automation requires a strategic approach. Standards like IEC 62443, a group of publications focusing on cybersecurity for industrial automation and control systems, provide valuable guidance. These standards help organisations establish cybersecurity programmes, conduct risk assessments, and implement secure development lifecycles.

Practical steps for cybersecurity implementation

At Adroit Technologies, a multi-layered defence strategy known as ‘defence in depth’ has been developed in collaboration with Mitsubishi Electric to enhance cybersecurity in factory automation. This approach involves establishing clear cybersecurity policies, defining roles and responsibilities, and ensuring staff awareness and training. Implementing structured physical access controls to prevent unauthorised access to network equipment, operator terminals, and other critical components is also crucial. Additionally, creating secure zones and conduits through network segmentation, firewalls, VLANs and demilitarised zones (DMZs) helps in controlling internet access and using encrypted communication. Another essential measure is ensuring that all devices and components adhere to secure development practices, and are regularly updated to mitigate vulnerabilities is another essential measure.

Adroit Secure Mobile Gateway

The Adroit Secure Mobile Gateway (SMG) can significantly enhance your cybersecurity framework by forming part of a layered defense for your OT environment. SMG provides secure Adroit client access on any device anywhere, making it a versatile and powerful tool for maintaining cybersecurity for your Adroit installations. This additional software component offers web access to existing Adroit graphics, allowing operators to manage systems remotely through any device with an HTML 5 browser. This means that you can use Edge, Firefox, Chrome, Opera and other browsers to access the system securely, enhancing flexibility and efficiency.

One of the significant advantages of SMG is that it requires no open firewall ports. A secure channel is initiated from the client side, preventing any direct exposure to sniffing, DDOS attacks and hacking attempts. The technology runs on industry-standard encryption protocols that are RFC 4419/4432 compliant, and ensures that all communications are secure and protected against potential cyberthreats.

Furthermore, SMG employs Transport Layer Security TLS 1.3 to guarantee secure web connectivity. This widely accepted standard is used by millions of organisations globally to secure their communication channels. The gateway also provides application-specific remoting, meaning that access is granted only to the SmartUI Operator and not to any underlying operating system functions. This feature adds an extra layer of security by limiting access strictly to the application level.

The Secure Gateway Client Manager checks if a local Adroit Operator is installed, and configures an Adroit Cloud Operator with the same encrypted credentials and connection information, if found. This seamless integration ensures that your operations remain secure, without the need for additional IT infrastructure changes or open inbound ports.

The digital transformation of factory automation brings both opportunities and challenges. While enhanced connectivity and data analytics drive efficiency, they also expose systems to cyberthreats. By adhering to legislative requirements, and implementing robust cybersecurity strategies, Adroit Technologies, in partnership with Mitsubishi Electric, can safeguard operations and contribute to a secure digital economy. A sustainable society is a safe society, and in the context of the digital economy, this means a cybersecure society.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Data centre design powers up for AI, digital twins and adaptive liquid cooling
IT in Manufacturing
The Vertiv Frontiers report, which draws on expertise from across the organisation, details the technology trends driving current and future data centre innovation, from powering up for AI, to digital twins, to adaptive liquid cooling.

Read more...
How digital infrastructure design choices will decide who wins in AI
Schneider Electric South Africa IT in Manufacturing
As AI drives continues to disrupt industries across the world, the race is no longer just about smarter models or better data. It’s about building infrastructure powerful enough to support innovation at scale.

Read more...
How quantum computing and AI are driving the next wave of cyber defence innovation
IT in Manufacturing
We are standing at the edge of a new cybersecurity frontier, shaped by quantum computing, AI and the ever-expanding IIoT. To stay ahead of increasingly sophisticated threats, organisations must embrace a new paradigm that is proactive, integrated and rooted in zero-trust architectures.

Read more...
2026: The Year of AI execution for South African businesses
IT in Manufacturing
As we start 2026, artificial intelligence in South Africa is entering a new era defined not by experimentation, but by execution. Across the region, the conversation is shifting from “how do we build AI?” to “how do we power, govern and scale it responsibly?”

Read more...
AIoT drives transformation in manufacturing and energy industries
IT in Manufacturing
AIoT, the convergence of artificial intelligence and the Internet of Things, is enhancing efficiency, security and decision making at manufacturing, industrial and energy companies worldwide

Read more...
Today’s advanced safety system is but the beginning
Schneider Electric South Africa IT in Manufacturing
Industrial safety systems have come a long way since the days of hardwired emergency shutdowns. Today, safety systems are not just barriers against risk; they are enablers of safer operations.

Read more...
Siemens brings the industrial metaverse to life
Siemens South Africa IT in Manufacturing
Siemens has announced a new software solution that builds Industrial metaverse environments at scale, empowering organisations to apply industrial AI, simulation and real-time physical data to make decisions virtually, at speed and at scale.

Read more...
Five key insights we gained about AI in 2025
IT in Manufacturing
As 2025 draws to a close, African businesses can look back on one of the most pivotal years in AI adoption to date as organisations tested, deployed and learned from AI at pace. Some thrived and others stumbled. But the lessons that emerged are clear.

Read more...
South Africa’s AI development ranks 63rd in the world
IT in Manufacturing
The seventh edition of the Digital Quality of Life Index by cybersecurity company, Surfshark ranks South Africa 75th globally.

Read more...
Optimising MRO operations through artificial intelligence
RS South Africa IT in Manufacturing
AI is reshaping industrial operations at every level in the maintenance, repair and operations supply chain, where it is driving efficiency, predictive insight and smarter decision making.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved