sb-nz logo
Story image

65% of manufacturers run outdated operating systems – Trend Micro

15 Apr 2019

Cybersecurity solutions provider Trend Micro has announced new research that demonstrates the threats facing manufacturing networks still running outdated technology, including risks to intellectual property and production processes.

The report, Securing Smart Factories: Threats to Manufacturing Environments in the Era of Industry 4.0, outlines the security dimension of a new era for manufacturing driven by IoT and connectivity everywhere.

Manufacturers are heavily investing in the convergence of traditional operational technology (OT) with IT networks in 2019, adding new technology to environments that are still vulnerable to more than 10-year-old issues, like Conficker.

“Industry 4.0 offers unparalleled opportunities to increase productivity, enhance process efficiencies, and realise on-demand manufacturing, but it also dramatically alters the threat risk model for these facilities,” says Trend Micro network defense and hybrid cloud security executive vice president Steve Quane.

“As this research outlines, the convergence of IT and OT could unwittingly have a serious impact on production lines, and could lead to the loss of IP and competitive advantage.”  

The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.

Previously isolated operations networks are being connected to the IT network to drive efficiencies, but this exposes insecure proprietary protocols and potentially decades-old OT equipment that is often not patched frequently enough because of its criticality.

There is a harsh disparity between the significant operations performed by these devices and the fact that they operate for years with known vulnerabilities.

According to Gartner, OT networks and assets, and their security implications were undiscovered and unmanaged for many years.

As a result, current OT networks are unsegmented with a mix of production protocols, unidentified assets, legacy systems and devices.

These industrial components have many unsecured communication channels to corporate/ IT networks, and they utilise different vendor architectures and security standards.

In addition to maintaining legacy infrastructure with known weaknesses, new vulnerabilities are being discovered more frequently than ever before in these systems.

Zero-day vulnerabilities purchased in human-machine interfaces (HMIs) of industrial control systems increased by more than 200 percent in 2018 compared to the previous year.

Manufacturers are thus exposed to both targeted and commodity malware, including cryptocurrency mining attacks that could harm key production processes by consuming processing power and causing network latency.

Ransomware is also a major threat to manufacturers if the attack affects production.

To help mitigate the impact of Industry 4.0 threats, Trend Micro recommends manufacturers remember the basics of cybersecurity, such as restricting user access and disabling directory listings, as well as identifying and prioritising key assets to protect.

Story image
Unbound seeks channel growth with new partner programme
Those who sign up will have access to Unbound’s security solutions, sales and partner enablement, deal registration and partner portal.More
Story image
UiPath and eSentire bring hyperautomation to Microsoft Security
UiPath and eSentire have announced a strategic partnership to deliver end-to-end security policy automation across multiple Microsoft Security services.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Cisco report: Remote working is here to stay, making cybersecurity a top priority
"With this new way of working here to stay and organisations looking to increase their investment in cybersecurity, there’s a unique opportunity to transform the way we approach security as an industry to better meet the needs of our customers and end-users.”More
Story image
Backups as a last line of defence are under threat
Malware can incrementally overwrite and encrypt backups, rendering them inadequate as an insurance policy against ransomware.More
Story image
Creating private data regulations for employees
Whether employees are hired on a part-time or full-time basis, everyone must know about data privacy regulations. Everyone needs to be responsible for keeping the organisation’s data secure. More