Securing the Industrial Internet of Things

1 May 2019 Information Security, Infrastructure, Industrial (Industry)

The very benefits that makes the IIoT so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors.

Beginning with the Industrial Revolution in the mid 1700s, the manufacturing industry has undergone several revolutions. However, in today’s age of skyrocketing technological advancements, times are changing at a far more rapid pace, as we see the automation era being replaced by the Fourth Industrial Revolution (4IR).

The 4IR has been driven by several factors. Digital transformation, evolving business models, increased pressures around costs and time to market, have all ushered in this new age and given rise to the Industrial Internet of Things (IIoT), which facilitates unprecedented levels of real-time connectivity, visibility and control across operations.

However, alongside the plethora of benefits, is one major downfall: a dramatic increase in cybersecurity risks. Although the IIoT aims to streamline manufacturing processes, it also endangers Industrial Control Systems (ICS) as they are vulnerable to exploits that can be found freely on the Internet. The vulnerabilities range from basic issues like systems without passwords or with hard-coded passwords to configuration issues, software bugs and hardware vulnerabilities.

“Once a threat actor has the ability to run software on a host that has access to a controller, the chances of a successful attack are extremely high,” says Andre Froneman, business unit manager and industrial cybersecurity adviser at Axiz.

According to Froneman, traditional security is not enough to protect against proliferating cyber threats to both operational technology (OT) and IT systems. ICS on OT networks have totally varying operational requirements that affect the entity’s ability to adapt and respond to evolving cyber security threats.

“This opens up the organisation to new avenues for attackers. ICS cyber security strategies must be designed with asset and operational requirements in mind to protect critical processes without negatively impacting efficiency, productivity and safety. In addition, effective ICS cyber security requires a combination of tools, processes and skills.”

He says to remember that when ICS systems were designed it was with manageability and control with maximum reliability in mind. “Essentially, they were never designed to be attached to the Internet. In this way, these systems now face all the expected challenges associated with vulnerabilities and exploits, but with the additional burden of these systems operating in dispersed geographical environments that can be physically difficult to reach or that can never be taken offline.”

Moreover, all of the equipment that runs these systems is monitored and controlled by industrial controllers (PLC, RTU, and HMI) as well as sensors. They are connected to management systems such as Distributed Control Systems (DCS) and Supervisory Control and Data Acquisition (scada) systems

He says consider critical infrastructure facilities, such as electricity, oil, gas, water, waste, and suchlike, that are key to keeping nations up and running. “One can’t simply switch off these facilities, and it doesn’t take much imagination to think about what could happen if control of these systems fell into the wrong hands. Take for example, the air traffic control at an airport such as OR Tambo, the ramifications should hackers be able to control this, defy thought.”

The wide adoption of these systems is due to their benefits – they are dependable, as well as rugged and stable, allowing critical infrastructure facilities to use them for decades at a time. However, the benefits that make them so compelling, make them equally capable of damaging infrastructure operations and processes through malfeasance.

Froneman explains that these systems commonly employ propriety operating systems that have not been subjected to any form of security hardening. In addition, default passwords and baseline configurations make it child’s play for attackers to compromise them. Similarly, the software they use can’t be updated or patched often, due to the limitations of their geographical locations, as well as worries about downtime. The software run is more often than not, legacy software that lacks the appropriate user and system authentication, data authenticity verification, as well as data integrity checking features. Legacy SCADA controllers are also unable to encrypt communications and this can enable cyber crooks to employ sniffing software to find out username and passwords.

These and other flaws give hackers the ability to inject commands and manipulate parameters to modify, delete, or copy information on controlled access systems. “Should a threat actor alter commands sent to the controllers, changing the controller logical sequence or alter the sensors readings, attackers can change the industrial processes themselves,” he explains.

So what can industrial organisations do to protect their data and systems? Froneman says ICS security needs to be built in layers to prevent attacks from both external and internal sources. “There is no one-size-fits-all approach when it comes to securing ICS/ SCADA infrastructures. A segmented, multi-layer defence-in-depth strategy must be designed for their specific and highly tailored needs.”

He says that a good number of attacks suffered by ICS networks happened via IT attack vectors, including spear phishing via email and ransomware on endpoints. “Using a solution such as Check Point Threat Prevention that has features including sandboxing, as well as network and endpoint security, can prevent and eliminate this type of attack before it hits the ICS system. These technologies are also effective when used in OT networks. SCADA vendors release vulnerability advisories for their ICS devices on an ongoing basis, although OT environments are not quick to install and upgrade their machines, leaving systems unpatched, and creating a vulnerability window. Having this type of solution on the OT network, closes that window.”

Froneman says another way of securing ICS systems is by segmenting IT and OT, and applying the principle of least privilege access. “Boundary protection has been cited as number one for several years in a row by US ICS-CERT, and this type of protection should ensure the availability, integrity and confidentiality of this data, and maintain physical network separation between the real time components of the industrial network.”

“To prevent tampering with legacy data that is communicated in open text without encryption on these systems, secure site-to-site VPN tunnels between boundaries interconnects should be created. In addition, security gateways should be installed at all interconnects, guaranteeing that only relevant and legitimate traffic is able to enter or leave the network. All communication, protocols, methods, queries and responses and payloads should be validated using a firewall, application control, IPS and antivirus.”





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Axis signs CISA Secure by Design pledge
Axis Communications SA News & Events Surveillance Information Security
Axis Communications has signed the United States Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge, signalling the company’s commitment to upholding and transparently communicating the cybersecurity posture of its products.

Read more...
Eight African cybersecurity trends for 2026
Information Security
Check Point Software Technologies has released eight critical trends shaping Africa’s digital turning point in 2026, noting that their implementation will require the government, the private sector, and key civic institutions to cooperate.

Read more...
The year of the agent
Information Security AI & Data Analytics
The dominant attack patterns in Q4 2025 included system-prompt extraction attempts, subtle content-safety bypasses, and exploratory probing. Indirect attacks required fewer attempts than direct injections, making untrusted external sources a primary risk vector heading into 2026.

Read more...
The global state of physical security
Genetec News & Events Infrastructure
Physical security has become a strategic business function, improving IT collaboration and decision-making. Moreover, interest in AI has more than doubled among users, and organisations seek flexibility to deploy workloads on-premises, in the cloud, or hybrid.

Read more...
AI cybersecurity predictions for 2026
AI & Data Analytics Information Security
The rapid development of AI is reshaping the cybersecurity landscape in 2026, for both individual users and businesses. Large language models (LLMs) are influencing defensive capabilities while simultaneously expanding opportunities for threat actors.

Read more...
SMARTpod Talks to Check Point Technologies about the African Perspectives on Cybersecurity report
SMART Security Solutions News & Events Information Security Videos
SMART Security Solutions spoke with Check Point's Hendrik de Bruin about the report, the risks African organisations face, and some mitigation measures.

Read more...
Securing the smart fleet
Information Security Transport (Industry) Logistics (Industry) IoT & Automation
Contributing around 10 to 12% of South Africa’s GDP, the transport and logistics sector supports almost every part of the country’s economic activity. The stakes for keeping these systems secure are higher than ever before.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.