{"id":230224,"date":"2017-07-25T07:25:14","date_gmt":"2017-07-25T11:25:14","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/manufacturings-confusing-approach-to-cybersecurity-automation-world.php"},"modified":"2017-07-25T07:25:14","modified_gmt":"2017-07-25T11:25:14","slug":"manufacturings-confusing-approach-to-cybersecurity-automation-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/automation\/manufacturings-confusing-approach-to-cybersecurity-automation-world.php","title":{"rendered":"Manufacturing&#8217;s Confusing Approach to Cybersecurity &#8211; Automation World"},"content":{"rendered":"<p><p>    Cisco has been publishing cybersecurity reports for nearly a    decade and its 2017 Midyear Cybersecurity Report has been    released amid a flurry of global malware activity across    industry. This midyear report notes that the dramatic increase    in cyberattack frequency, complexity and size over the past    year suggests that the economics of hacking have turned a    corner due to the quick and easy access to a range of useful    and low-cost resources.  <\/p>\n<p>    With this reality in mind, Cisco points out that the intent of    these reports is to keep security teams and the businesses they    support alert to the increasing sophistication of threats and    the techniques that adversaries use to compromise users, steal    information and create disruption.  <\/p>\n<p>    Despite the difference in cybersecurity issues across    industries, Ciscos report notes that there are numerous common    concerns and, thus, lessons to be learned among industries.  <\/p>\n<p>    An example of thisand one which Automation World readers will    find familiaris the reports call to better integrate    information technology (IT) and operational technology (OT).    The recent WannaCry ransomware attack caused shutdowns    at the Renault-Nissan auto plants in Europe and is an example    of how connected systems can be affected by an attack, the    report states. If connectivity is not done securely and in a    coordinated fashion, then even untargeted ransomware can affect    OT systems. As connected systems come to the OT world, IT and    OT can no longer be walled off from each other. They can    benefit by sharing data for analysis to help improve safety and    product quality. They can also work together to manage    cybersecurity threats. But to do so, they must develop their    defense-in-depth capabilities, since disconnected and siloed    systems wont provide a comprehensive view of IT and OT.  <\/p>\n<p>    As concerning as cybersecurity breaches are, news about their    increasing occurrence appears to be leading manufacturers to    improve security. According to the report, 95 percent of the    manufacturing security professionals surveyed said    cybersecurity breaches have driven improvements at their    companies to at least a modest extent. The report also notes    that 28 percent of the manufacturers surveyed for the report    cited a loss of revenue due to cybersecurity attacks in the    past year.  <\/p>\n<p>    Two key findings in this most recent report of particular    interest to manufacturing organizations involve the Internet of    Things (IoT) and the supply chain.  <\/p>\n<p>    Ciscos report states that one of the biggest vulnerabilities    of the IoT is a lack of visibility. The report says that    defenders are simply not aware of what IoT devices are    connected to their network. They need to move quickly to    address thisbecause threat actors are already exploiting    security weaknesses in IoT devices; [these] devices [then]    serve as strongholds for adversaries, and allow them to move    laterally across networks quietly and with relative ease.  <\/p>\n<p>    Supply chain attacks offer adversaries a way to spread malware    to many organizations through a single compromised site,    according to the report. In one attack a software vendors    download webpage was compromised, allowing the infection to    spread to any organization that downloaded the software from    this vendor.  <\/p>\n<p>    To get to the point where manufacturing systems are updated    and integrated, manufacturers must resolve the security    solution complexity problem, according to the Cisco report.    Forty-six percent of the manufacturing security professionals    said they use six or more security vendors; 20 percent said    they use more than 10 vendors. And when asked specifically    about products they use from these vendors, 63 percent of    security professionals said they use six or more products,    while 30 percent said they use more than 10 products.    Essentially, they are using one or more products per vendor    they are associated with.  <\/p>\n<p>    This high number of cybersecurity products and vendors in the    typical manufacturing facility creates a confusing picture for    security experts, states the report. This complexity speaks    to the need for both IT and OT teams to narrow their focus on    security threatsfor example, using only those products than    can address the most immediate concerns. Manufacturers could    look toward implementing a defense-in-depth policy that    includes simple protections for physical assets, such as    blocking access to ports in unmanaged switches or using managed    switches in their plant network infrastructure.  <\/p>\n<p>    Despite the clear increase in cybersecurity breaches that have    targeted manufacturers, Cisco says the good news is that there    are simple steps manufacturers can take to improve security.    The report points out that improving cybersecurity should be    seen by manufacturers as being a gradual process rather than a    task to be completed all at once. Though something as simple as    a written security policy can provide a framework for    improvements, the Cisco study shows that 40 percent of the    manufacturing security professionals said they do not have a    formal security strategy, nor do they follow standardized    information security policy practices such as ISO 27001 or NIST    800-53.   <\/p>\n<p>    Theres clear room for direct and immediate improvement by    simply addressing such best practices.  <\/p>\n<p>    Download the complete report from    Cisco.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.automationworld.com\/article\/industry-type\/all\/manufacturings-confusing-approach-cybersecurity\" title=\"Manufacturing's Confusing Approach to Cybersecurity - Automation World\">Manufacturing's Confusing Approach to Cybersecurity - Automation World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Cisco has been publishing cybersecurity reports for nearly a decade and its 2017 Midyear Cybersecurity Report has been released amid a flurry of global malware activity across industry. This midyear report notes that the dramatic increase in cyberattack frequency, complexity and size over the past year suggests that the economics of hacking have turned a corner due to the quick and easy access to a range of useful and low-cost resources. With this reality in mind, Cisco points out that the intent of these reports is to keep security teams and the businesses they support alert to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information and create disruption <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/automation\/manufacturings-confusing-approach-to-cybersecurity-automation-world.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[431581],"tags":[],"class_list":["post-230224","post","type-post","status-publish","format-standard","hentry","category-automation"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/230224"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=230224"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/230224\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=230224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=230224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=230224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}