With more and more automation systems and industrial devices being connected to networks, raw data from every device can be transformed into a treasure chest of valuable information. Granted, this data can help to optimize the process, but with connectivity comes new ICS cybersecurity concerns. Connectivity opens previously air-gapped or physically isolated control networks to the world of cyber threats where potentially damaging impacts to brand reputation, human safety, operational productivity and product quality can occur.
How are we mitigating this new risk?
Industrial cybersecurity is a journey. It’s one that is never-ending, as automation control systems are adopting information technology (IT) and cloud-based solutions at a faster rate than ever before. At the same time, the threat landscape of malicious activity is constantly evolving.
As a result of these trends, previously isolated control networks are now potentially accessible to outsiders through increasing numbers of touchpoints including from the corporate IT network and the Internet itself. This can open up the control network to ransomware, malware, equipment failure, human error, malicious internal events and other cybersecurity-related incidents, even if these cyber events are not directly targeting the industrial control network.
While no doubt familiar to the IT side of the organization, these ICS issues (and their costs) can be even more damaging in the industrial side due to the fact that producing and shipping products can be considered the lifeblood of the business.
What are the potential business impacts?
- Productivity
- Quality
- Safety
- Profitability
- Brand reputation
What does a minute or an hour of downtime cost when plants are often run at maximum capacity? What is the financial impact when a product falls out of specification and needs to be reworked? What is the impact of having to issue a product recall? These threats are real, and the potential financial (Read more...)
*** This is a Security Bloggers Network syndicated blog from The State of Security authored by Gary DiFazio. Read the original post at: https://www.tripwire.com/state-of-security/ics-security/ics-cybersecurity-issues-solutions/

