SA manufacturing companies take note

November 2017 Information Security, Security Services & Risk Management

Mining and manufacturing sectors are becoming increasingly vulnerable to cyber attack. This is highlighted in Dimension Data’s Global Threat Intelligence Report for 2017, where it was revealed that the manufacturing sector was second only to the finance industry on the list of most attacked sectors in the Middle East and Africa region in 2016.

Sean Duffy, executive of security solutions for MEA at Dimension Data.
Sean Duffy, executive of security solutions for MEA at Dimension Data.

In fact, manufacturing featured amongst the top three targets for five out of the six global regions. Sectors like mining and manufacturing are fast becoming a favourite with cyber criminals and it’s not difficult to see why. Most manufacturing systems today were made to be productive, with funds traditionally spent on upgrades for productivity rather than cybersecurity.

OT environments are at risk

Taking a closer look, mining and manufacturing plants are run by operational technology (OT) which controls the physical devices within the plant. These environments are generally operated by the engineering function, independent of the enterprise network run by IT in the organisation. This is problematic because historically manufacturers have not been security focused. To complicate matters further, most operational technology was introduced 20 or 30 years ago when there was little risk of a cyber attack.

The result is that the necessary IT systems to prevent cyber attacks simply weren’t put in place. This includes failing to introduce measures to authenticate the traffic between the various devices contained in the plant and the logical security application of segmenting networks. This threat to the OT environment is being exacerbated by the proliferation of the Internet of Things (IoT). With digital transformation on the rise, organisations are deploying applications and devices that interact with business operations to enhance business outcomes.

For mining and manufacturing this means connecting IT and OT systems securely into one enterprise network to enable boundless information flow for real-time, informed decisions. The move from isolated devices to Internet-enabled platforms that can communicate with each other creates entirely new cybersecurity risks. Critical systems are now exposed and vulnerable to information attacks and Denial of Service (DDoS) attacks.

The consequences can be devastating

It is estimated that by 2020 there will be more than 40 billion devices connected to the Internet. And particularly concerning for South Africa is that 21% of all IoT attacks originated in the MEA region in 2016, according to the Global Threat.

When connecting the digital and physical worlds, new data sources need to be considered as both a source and target of an attack. While in the past cyber attacks have been largely focused on targeting confidentiality of information, we are now seeing a shift towards the availability and security aspect of IT.

This is particularly relevant in the OT environment, where an attack on the technology can bring an organisation to a standstill. Critical services are all controlled via automation and operational technologies, and the impact on their availability has an adverse effect on consumers of these services. For example, if the power grid should be made unavailable because of a cyber attack, electricity would become unavailable to all consumers, ultimately impacting the economy of the country.

This requires a new approach to securing OT environments. A consultation process is needed to understand what the impact on the business would be should its OT environment come under attack as well as the cybersecurity requirements to prevent attacks. These requirements include the

discovery of elements that form part of the OT network, build and design based on security principles, controls for segregation, monitoring, access control and endpoint protection.

Penetration tests should also be run to uncover cybersecurity gaps, allowing for advice on technical solutions to cover those gaps, and assisting manufacturers to implement controls to manage their entire IT security. It is critical that OT form part of an overall enterprise cybersecurity strategy. This will enable manufacturing organisations to take advantage of the benefits of the digital era, while still ensuring that they have invested in the required measures to protect their OT environment from becoming the soft target of a cybersecurity attack.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.