Bookkeeping Service Providers

  • Accounting
  • Bookkeeping
  • US Taxation
  • Financial Planning
  • Accounting Software
  • Small Business Finance
You are here: Home / IOT / Safeguarding the Industrial IoT: a rising security challenge

Safeguarding the Industrial IoT: a rising security challenge

April 8, 2020 by cbn Leave a Comment

The Fourth industrial revolution has unleashed a myriad of opportunities for organisations eager to leverage a new generation of connected Industrial Internet of Things (IIoT) devices and reap the rewards of enhanced data sharing, operational efficiencies, and productivity, says Trevor Daughney, vice president of product marketing at Exabeam

Around the globe, cities are deploying innovative
‘smart’ technologies to connect everything from power grids to transport
infrastructures in a bid to improve the quality of citizens’ lives. Healthcare
is another sector that’s quickly adopting IoT technology to streamline care
delivery and give patients more control over their treatment. Meanwhile,
manufacturers are rapidly upscaling their smart factory investments, utilising everything
from programmable logic controllers (PLCs) and embedded systems to IIoT
devices in their production facilities.

As a result, connected operational
technologies (OT) are rapidly becoming the backbone of modern commercial
automation solutions, business operations and critical infrastructure. However,
the rapid proliferation of such devices has opened the door to external
security threats.

Indeed, a recent 2019 study by the Ponemon Institute reveals how OT environments used to run critical utilities like electricity and water are now top targets for cyber attackers looking to cause “severe” damage. With 54% of utility companies saying they expect an attack in 2020, the digitalisation of OT assets represents a clear and present danger when it comes to protecting critical infrastructure and initiating cyber resilience that works.

Similarly, according to a recent smart factory report by Deloitte and MAPI (Manufacturers Alliance for Productivity and Innovation) cyber threats now represent a growing menace for manufacturing companies looking to converge IT and OT across their operations.

The trouble with digital transformation

Until recently, the risk posed by the
adoption of IP-based connectivity in industrial environments was largely
overlooked. In the past, legacy control systems had specific functions and were
often unconnected to other systems, which made attacks unlikely and difficult
to achieve. This complacency resulted in the rise of the notion that industrial
assets are immune to cyber attack if they are isolated from the Internet or
other vulnerable corporate networks.

However, the infamous Stuxnet worm attack carried out on an Iranian nuclear facility proved a major wakeup call for industrial enterprises across a range of industries. Designed to bypass standard network security programmes, Stuxnet reprogrammed nuclear centrifuges to perform cycles that resulted in them disintegrating.

It was an attack that demonstrated how adopting IP-based connectivity between industrial systems also results in increased exposure to highly complex and sophisticated cyberattacks. Simply put, IIoT devices often have native integration with IP networks. While this helps to streamline operational tasks, it also means that everything else that’s connected is now a vulnerable soft target for global cyberthreats – in much the same way as standard IT devices.

Mind the security gap: the IT and OT
disconnect

It’s not just IIoT devices that are being
exploited within OT systems. Historically, cyberattacks have targeted IT assets
that enable business operations, like computers and mobile devices, for data
theft. However, cyberattacks against IT devices – including networks and
systems that transmit or distribute power to an OT system – can be triggered to
hijack the control systems that operate critical infrastructure. The result of
such hacks will be physical damage, widespread outages, and the loss of
operational data.

This poses a significant challenge for
organisations where IT and OT leaders have, until now, operated in independent
silos. A less than ideal scenario if organisations are leveraging IoT devices
that need to be integrated to – and then managed – using existing IT network
infrastructures.

The growing convergence of IT and OT
security means every organisation needs to gain an integrated overview of global
security aspects and vulnerabilities in a bid to prevent infiltration that
could result in the destruction of critical infrastructure or data loss.

It’s time to apply industrial cyber
security

From the automotive industry to smart cities and big pharma, organisations with IIoT and IT devices within their OT systems need to evaluate exposure and maximise their ability to quickly detect, respond to and mitigate attacks. However, providing device security can be challenging – especially since IIoT and IT devices are inherently different, and IIoT devices were never designed to integrate with security management tools. In my next article, I’ll explore these challenges together with the frameworks and solutions that organisations can apply to achieve industrial cyber security that works.

The author is Trevor Daughney, vice president of product marketing at Exabeam

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow

Share on FacebookShare on TwitterShare on Google+Share on LinkedinShare on Pinterest

Filed Under: IOT, SECURITY

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • May 2021
  • April 2021
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • March 2016

Recent Posts

  • FabCon Vienna: Build data-rich agents on an enterprise-ready foundation
  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Azure mandatory multifactor authentication: Phase 2 starting in October 2025
  • Microsoft Cost Management updates—July & August 2025
  • Protecting Azure Infrastructure from silicon to systems

Recent Comments

    Categories

    • Accounting
    • Accounting Software
    • BlockChain
    • Bookkeeping
    • CLOUD
    • Data Center
    • Financial Planning
    • IOT
    • Machine Learning & AI
    • SECURITY
    • Uncategorized
    • US Taxation

    Categories

    • Accounting (145)
    • Accounting Software (27)
    • BlockChain (18)
    • Bookkeeping (205)
    • CLOUD (1,321)
    • Data Center (214)
    • Financial Planning (345)
    • IOT (260)
    • Machine Learning & AI (41)
    • SECURITY (620)
    • Uncategorized (1,284)
    • US Taxation (17)

    Subscribe Our Newsletter

     Subscribing I accept the privacy rules of this site

    Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in