OT, 4IR and cybercrime

Issue 2/3 2023 Integrated Solutions, Infrastructure, Mining (Industry), IoT & Automation


Hennie Colyn.

The convergence of OT (operational technology) and IT in industrial environments offers numerous and tangible benefits. When 4IR technologies are added to the mix, the sky becomes the proverbial limit.

However, the above proliferation has also opened operational systems to cyberattacks, traditionally reserved for IT. Unfortunately, numerous organisations still have a lot of work to do to ensure they do not become the next name in a long list of cybercrime victims.

A recent Claroty global survey[1] confirms the above. The report surveyed 1100 IT and OT security professionals and revealed that 80% of the respondents had fallen victim to ransomware attacks targeting critical infrastructure.

The reality is that unless data centre managers’ start reducing risks to OT systems, the abovementioned statistics will become the tip of the iceberg. In fact, TechMonitor[2] estimates that global cost of cybercrime will reach $10.5 trillion by 2025.

The target on OT’s back

OT infrastructure forms an integral part of data centre environments, delivering important functionality to critical services and industries such as energy and utilities, water and wastewater (WWW) plants, and transportation.

Datacentres exist at the interaction of IT and OT, which can expose it to additional cybersecurity threats. This interplay between IT and OT becomes even more personal with the adoption of 4IR, driven by digitalisation.

The increased exposure of OT environments to cyber dangers is an unfortunate side effect of digitalisation. The addition of digital applications and IoT connections to capture and analyse data from OT equipment has widened the cyberattack surface. Furthermore, industrial operations continue to rely on legacy equipment that was not designed with protection against cyber dangers.

These issues create vulnerabilities that threat actors are very happy to explore. Sponsored hacker groups are of particular concern as they may choose high profile, critical infrastructure targets.

Hardening infrastructure

Fortunately, there are numerous ways of safeguarding OT systems, and the data centres they resides in, against cyberattacks. However, it requires investment and commitment across the entire organisational structure.

For one, OT cyber defences require a multi-layered, integrated approach that considers the environment’s vulnerabilities and addresses internal and external threats. It is important to update processes and security as technology evolves.

Global standards can also provide valuable guidance in best operational practices. The IEC 62443-2-4 standard specifies security capability requirements for integration, operational, and maintenance for deployed devices, systems, and network components. It provides a comprehensive set of cybersecurity standards for industrial automation and control systems that can be applied to the data centres’ critical infrastructure.

Organisations grappling with how best to secure their OT environments can also partner with technology and service providers that offer decades of experience and sophisticated cybersecurity solutions, to address vulnerabilities, while improving efficiencies.

For example, Schneider Electric’s Cybersecurity Application Platform (CAP) provides an integrated cybersecurity solution, enabling operations teams to have real-time visibility of their cybersecurity environment while reducing the complexity of OT environments.

Resources

[1] www.securitysa.com/*se5

[2] www.securitysa.com/*se6


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
The impact of AI on security
Technews Publishing Information Security AI & Data Analytics
Today’s threat actors have moved away from signature-based attacks that legacy antivirus software can detect, to ‘living-off-the-land’ using legitimate system tools to move laterally through networks. This is where AI has a critical role to play.

Read more...
ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
From the editor's desk: Can it be October already?
Technews Publishing News & Events
Welcome to the final SMART Handbook of the year. In this issue, we focus on residential estate security, from the fence to the gate and beyond. We also review our Durban SMART Estate Security Conference, ...

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.