Story image

65% of manufacturers run outdated operating systems – Trend Micro

15 Apr 2019
Twitter
Facebook

Cybersecurity solutions provider Trend Micro has announced new research that demonstrates the threats facing manufacturing networks still running outdated technology, including risks to intellectual property and production processes.

The report, Securing Smart Factories: Threats to Manufacturing Environments in the Era of Industry 4.0, outlines the security dimension of a new era for manufacturing driven by IoT and connectivity everywhere.

Manufacturers are heavily investing in the convergence of traditional operational technology (OT) with IT networks in 2019, adding new technology to environments that are still vulnerable to more than 10-year-old issues, like Conficker.

“Industry 4.0 offers unparalleled opportunities to increase productivity, enhance process efficiencies, and realise on-demand manufacturing, but it also dramatically alters the threat risk model for these facilities,” says Trend Micro network defense and hybrid cloud security executive vice president Steve Quane.

“As this research outlines, the convergence of IT and OT could unwittingly have a serious impact on production lines, and could lead to the loss of IP and competitive advantage.”  

The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.

Previously isolated operations networks are being connected to the IT network to drive efficiencies, but this exposes insecure proprietary protocols and potentially decades-old OT equipment that is often not patched frequently enough because of its criticality.

There is a harsh disparity between the significant operations performed by these devices and the fact that they operate for years with known vulnerabilities.

According to Gartner, OT networks and assets, and their security implications were undiscovered and unmanaged for many years.

As a result, current OT networks are unsegmented with a mix of production protocols, unidentified assets, legacy systems and devices.

These industrial components have many unsecured communication channels to corporate/ IT networks, and they utilise different vendor architectures and security standards.

In addition to maintaining legacy infrastructure with known weaknesses, new vulnerabilities are being discovered more frequently than ever before in these systems.

Zero-day vulnerabilities purchased in human-machine interfaces (HMIs) of industrial control systems increased by more than 200 percent in 2018 compared to the previous year.

Manufacturers are thus exposed to both targeted and commodity malware, including cryptocurrency mining attacks that could harm key production processes by consuming processing power and causing network latency.

Ransomware is also a major threat to manufacturers if the attack affects production.

To help mitigate the impact of Industry 4.0 threats, Trend Micro recommends manufacturers remember the basics of cybersecurity, such as restricting user access and disabling directory listings, as well as identifying and prioritising key assets to protect.

Download image
The true extent of cloud inertia’s effect on your organisation
The report dives into the importance of expertise to an organisation’s cloud evolution and the impact the current technical skills gap is having on businesses.More
Story image
18 Sep
Finance breaches highlight need for internal cyber vigilance - Bitglass
The financial services sector reported the second-highest number of data breaches in the 12-month period covered by the latest OIAC report. More
Story image
05 Sep
Proofpoint and CrowdStrike partner on endpoint protection integration
In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.More
Download image
Beyond deployment: Making AWS work for your use case
If you’re a business that wants to understand how to save time with your technology, AWS actively seeks those optimisations and gets your technology to work in ways it couldn’t work before.More
Story image
19 Sep
Veritas and Pure Storage team up to reduce downtime for applications and services
Three new integrations just announced extend the collaboration across the Veritas Enterprise Data Services platform providing Veritas and Pure Storage customers with business continuity.More
Story image
13 Sep
IBM launches data privacy platform for hybrid multicloud environments
The IBM z15 will enable customers to manage who can access data via policy-based controls such as encryption, cloud-native deployment, instant recovery, and data-centric privacy controls.More