Visit
Official Website

Fictron Industrial Supplies Sdn Bhd
No. 7 & 7A,
Jalan Tiara, Tiara Square,
Taman Perindustrian Sime UEP,
47600 Subang Jaya,
Selangor, Malaysia.
+603-8023 9829
+603-8023 7089
Fictron Industrial
Automation Pte Ltd

140 Paya Lebar Road, #03-01,
AZ @ Paya Lebar 409015,
Singapore.
+65 31388976
sg.sales@fictron.com

How to Stay Secure From Cyberthreats Affecting Manufacturers

22 Feb 2019
How to Stay Secure From Cyberthreats Affecting Manufacturers
View Full Size
Manufacturers are already going through a digital transformation age, which is altering the technology landscape in the complete industry. Today, manufacturing machines connected to the network can provide process feedback, predict failure rates, and communicate in real time with a larger manufacturing system. Manufacturers leverage this data from the plant floor to enhance their business.
 
The fact is that, this digital transformation is causing manufacturers to gradually become more vulnerable to cyberattacks. Over the last few of years, the industry has noticed annual double digit increases in the number of attacks on manufacturing systems. We’re transitioning to a period where Industrial IoT (IIoT), Industry 4.0 and IT/Operational Technology (OT) has become the norm in the manufacturing industry, but it’s also leading to major security problems. IIoT is pushing the convergence of IT and OT where both IT and OT teams need to understand the risks imposed by IIoT devices connecting to the Internet or corporate network and determine how to track and monitor those risks. And Industry 4.0 moves data from complex systems into converged platforms (PLM, ERP, MES, etc.), where some may call the information in these systems “the crown jewels” of their IP. Once that gets hacked, it’s game over for manufacturers.
 
When it comes to cyberattacks in the industry, there are two major concerns; intellectual property (IP) and downtime caused by breaches. Hackers target manufacturers for their product designs, computer-aided design (CAD) and computer-aided manufacturing (CAM) data, bill of materials and production process information. They also target a manufacturers programmable language controllers (PLCs) and manufacturing execution systems (MES), which are what makes the production line move. A breach into these systems could result downtime, missed supplier commitments and huge financial losses.
 
Instead of worrying about having to shut down the shop because of a cyberattack, or a cyberattack shutting down the shop floor by itself, carry out these steps to help improve the security of your business. 
 
Need for increased visibility:
It’s crucial for manufacturers to have visibility into their network so they can see and understand threats as they happen. With visibility of the network, the security team can identify when a new device comes on line or a new IP is accepted. It also allows you to recognize which device(s) are causing problems, and when a device on the shop floor is talking to another device that it shouldn’t be communicating with. Tools such as security event information event software, and network monitoring applications can aid in real time visibility.
 
It is time to patch:
Let’s say you manufactured a ball joint. Generally, there was no need for changes.  The injection molding was the same, the specs, process, and systems didn’t need to change for many years.  Even the PC running system and patch level stayed the same. Well, now Industry 4.0 is changing all of that. These systems now connected to the internet meaning we need to patch vulnerabilities. Before, manufacturers were concerned that patching could impact their specific software, so they overlooked it.  That isn’t an option any longer. Manufacturers need to patch, test patches on software, and upgrade systems that can’t be patched anymore.
 
Connectivity & Collaboration:
Many manufacturers have factories across the globe where remote availability is required. Plant owners need to access the shop floor from everywhere and vendors need access to their machines for diagnostics, performance metrics and updates. Different business devices from across the globe need to correspond on one network, in real-time. VPNs, SDWAN, two factor authentication, 24x7 monitoring, and third party security are all topics of consideration now. For organizations with limited teams or skillsets, outsourcing to a vendor may be a viable approach.
 
Rapid response:
Your business is more connected than ever. Even if you keep up the tips above, and go over and beyond industry best practices, something is going to arise. It is a matter of time before there is a security incident. Plan ahead. Develop procedures, educate both internal and external teams and make positive they know what to do when a breach occurs, and use these procedures frequently. If you do not have expertise on hand to deal with a security incident, reach out to a partner to fill any gaps. Partners can help with proactive threat mitigation, threat investigations and threat response. When something happens, timing is key. Having people, processes, and partners in place is key to a rapid response.
 
The digital transformation age is already here, and hackers aren’t going anywhere. Don’t wait for a breach to happen on your network to make a change. Implementing these key tactics can make a huge difference in your security posture.


This article is originally posted on Tronserve.com

You have 0 items in you cart. Would you like to checkout now?
0 items