• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • CleanMyMac One-Time Purchase: Lifetime License for $62

    CleanMyMac One-Time Purchase: Lifetime License for $62
  • UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

    UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29
  • Wordela Vocabulary Mastery: Lifetime Subscription for $39

    Wordela Vocabulary Mastery: Lifetime Subscription for $39
  • Apple Watch Series SE 2nd Gen (2022) Aluminum with Silicone Band – 44mm/Starlight (Refurbished Grade A: GPS + Cellular) for $273

    Apple Watch Series SE 2nd Gen (2022) Aluminum with Silicone Band – 44mm/Starlight (Refurbished Grade A: GPS + Cellular) for $273
  • Scribbyo AI: Lifetime Subscription for $49

    Scribbyo AI: Lifetime Subscription for $49
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How to Reduce Exposure on the Manufacturing Attack Surface

May 18, 2023 by iHash Leave a Comment

Manufacturing Attack Surface

Digitalization initiatives are connecting once-isolated Operational Technology (OT) environments with their Information Technology (IT) counterparts. This digital transformation of the factory floor has accelerated the connection of machinery to digital systems and data. Computer systems for managing and monitoring digital systems and data have been added to the hardware and software used for managing and monitoring industrial devices and machines, connecting OT to IT.

Such connectivity enhances productivity, reduces operational costs and speeds up processes. However, this convergence has also increased organizations’ security risk, making manufacturers more susceptible to attacks. In fact, in 2022 alone, there were 2,337 security breaches of manufacturing systems, 338 with confirmed data disclosure (Verizon, 2022 DBIR Report).

Table of Contents

  • Ransomware: A Growing Threat for Manufacturers
  • 5 Steps Manufacturers Can Take Today to Reduce Exposure of the Attack Surface
    • 1 — Test Again and Again
    • 2 — Automate Your Security Processes
    • 3 — Take the Adversarial Perspective
    • 4 — Prioritize Patching Based On Actual Risk
    • 5 — Benchmark Your Security Posture
  • How Automated Security Validation Helps Manufacturers

Ransomware: A Growing Threat for Manufacturers

The nature of attacks has also changed. In the past, attackers may have been espionage-driven, targeting manufacturing companies to steal Intellectual Property (IP) and secrets. Today, however, ransomware attacks and attacks involving stolen credentials are far more prevalent.

In 2022, manufacturing was the most targeted sector for ransomware attacks, seeing an 87% increase in ransomware attacks from the previous year. This is due to manufacturing’s aversion to downtime. Or as Verizon put it in their 2022 Data Breach Industry Report, manufacturing is “an industry where availability equals productivity.”

Despite understanding the risk, many manufacturing companies are not yet prepared to handle an attack. According to Security Scorecard, 48%, nearly half, of the manufacturing companies reviewed scored a C, D, or F in security. This comes at a high price: the average cost of a critical infrastructure data breach is $4.82 million, according to IBM’s “Cost of a Data Breach” report.

Recent high-profile incidents such as the ransomware attack on Dole Company, one of the world’s largest producers of fruit and vegetables, have shown how crippling these attacks can be. The company was forced to temporarily shut down its North American production facilities.

In August, two Luxembourg-based companies were attacked with ransomware. The attackers took down customer portals and exfiltrated data from systems. And of course, the infamous Colonial Pipeline incident, the poster child of cyber attacks on critical infrastructure. These are just a few examples, and there are many more.

What can manufacturers do to protect themselves?

5 Steps Manufacturers Can Take Today to Reduce Exposure of the Attack Surface

Reducing the risk of cyber attacks is essential for ensuring the plant floor continues operating, uninterrupted. Here are five steps manufacturers like you can take to reduce cybersecurity risk:

1 — Test Again and Again

Regularly testing and assessing your organization’s network and infrastructure provides you with real-time visibility into your security posture. By testing and then testing again (and again) you will be able to identify real vulnerabilities that can be exploited by attackers. You will also be able to evaluate the effectiveness of your security controls and identify areas for improvement so you can adjust your security program and stack. This will also give you a competitive edge, since by preventing attacks you can ensure you are always productive and proactively eliminate operational downtime.

Use industry-standard frameworks like MITRE ATT&CK and OWASP to ensure you are testing for the most prevalent attack types and techniques.

2 — Automate Your Security Processes

Automation allows for optimal use of time and resources. Such efficiency helps streamline your efforts and reduce the time and effort required for identifying and responding to security threats. Therefore, it is recommended to automate the security measures you take. For example, automate the testing of your network.

Automation also creates standardization, consistency and accuracy, to prevent errors. As a result, you will be able to scale and increase the scope of your security practices, in a cost-effective manner. In addition, automated systems are often easy to use, enabling control at the click of a button. This enables any user to surface risk easily, by letting the platform do the work. When choosing your automation tools and platforms, make sure the program is safe by design. Implement a solution that does not incur downtime and can be relied on.

3 — Take the Adversarial Perspective

While no one thinks ‘like a manufacturer’ better than you, when it comes to security, it’s time to put your ‘attacker hat’ on. Hackers are looking for any way to exploit your network, and they’re not waiting for a playbook to do it. Try to think out-of-the-box and to apply different perspectives and analysis methods. Thinking like a hacker is the best offense you can take.

By taking the adversarial perspective, you can proactively identify vulnerabilities and weaknesses through attack chain validations and mitigate them before they are exploited. In the long-term, thinking like an attacker can help you develop better security strategies, to minimize the chance of an attack or the blast radius of one in case it occurs.

4 — Prioritize Patching Based On Actual Risk

Prioritization of vulnerability remediation based on business impact is the most cost-effective way to mitigate the risk and reduce exposure to a cyber attack.. Start with patching critical vulnerabilities and threats, based on evidence-based testing, that could have the greatest impact on your business operations. Don’t hypothesize, examine your tests to see which security gaps create “kill-chains” with true impact for you, and proceed to remediate them first .

Prioritization also helps get rid of the “noise” caused by too many security alerts. Even small companies have an unmanageable amount of alerts from security tools they need to sort out.

5 — Benchmark Your Security Posture

By continuously testing your attack surface at regular, frequent intervals, you can continuously benchmark your security posture. This helps increase security in a number of ways:

  • Measure the effectiveness of your security measures compared to industry standards and best practices.
  • Show areas of improvement that are the result of successful remediation.
  • Demonstrate compliance with industry regulations and standards.
  • Gain valuable insights into your security posture and strategy so you can make more informed decisions.

How Automated Security Validation Helps Manufacturers

An Automated Security Validation program provides context and accuracy when validating an organization’s attack surface. With minimal set up, requiring no agents or pre-installations, security and IT teams at manufacturing companies can safely challenge their complete attack surface to pinpoint the most damaging security gaps – just like a real-life attacker would. This significantly enables teams to scale security efforts and minimize exposure on the IT-OT attack surface.

Visit pentera.io to learn more about Automated Security Validation.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: attack, computer security, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, exposure, hacker news, hacking news, how to hack, information security, Manufacturing, network security, ransomware malware, Reduce, software vulnerability, Surface, the hacker news

Special Offers

  • CleanMyMac One-Time Purchase: Lifetime License for $62

    CleanMyMac One-Time Purchase: Lifetime License for $62
  • UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

    UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29
  • Wordela Vocabulary Mastery: Lifetime Subscription for $39

    Wordela Vocabulary Mastery: Lifetime Subscription for $39
  • Apple Watch Series SE 2nd Gen (2022) Aluminum with Silicone Band – 44mm/Starlight (Refurbished Grade A: GPS + Cellular) for $273

    Apple Watch Series SE 2nd Gen (2022) Aluminum with Silicone Band – 44mm/Starlight (Refurbished Grade A: GPS + Cellular) for $273
  • Scribbyo AI: Lifetime Subscription for $49

    Scribbyo AI: Lifetime Subscription for $49

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

North America Holds the Largest Market Share in Artificial Intelligence at 43%

May 27, 2023 By iHash

Evolving the Swift Workgroups

May 27, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

CleanMyMac One-Time Purchase: Lifetime License for $62

Expires July 26, 2023 23:59 PST Buy now and get 29% off KEY FEATURES Meet your personal Mac genius — CleanMyMac X, the smart all-in-one tool that will make your Mac run like new again. CleanMyMac X removes unwanted apps and files from all corners of your macOS, including outdated caches, broken downloads, logs, and […]

UltraVPN Secure USA VPN Proxy: 3 Year Subscription + Free Antivirus for 30 Days for $29

Expires August 25, 2023 23:59 PST Buy now and get 87% off KEY FEATURES Get ultimate online protection with 3 years of UltraVPN + 30 days of Free Antivirus. This VPN offers fast speeds and a reliable server network, making it ideal for streaming. With military-grade AES-256 encryption and strong security features, you can browse […]

The personal threat landscape: securing yourself smartly

The personal threat landscape: securing yourself smartly

If you try to protect yourself against every threat in the world, you’ll soon run out of energy and make your life unbearable. Three-factor authentication here, a twenty-character password with musical notes and Chinese characters there, different browsers for different websites, and abstinence from social media don’t exactly sound life-asserting. What hurts the most is […]

Scribbyo AI: Lifetime Subscription for $49

Expires April 19, 2123 23:59 PST Buy now and get 94% off KEY FEATURES Are you exhausted from spending endless hours crafting content for your website or social media channels? Discover Scribbyo, the innovative AI content generator set to transform the way you produce content. With Scribbyo, you can access 37 supported languages, enabling you […]

Unleash the power of Amazon Kinesis Data Firehose and Elastic for enhanced observability

Unleash the power of Amazon Kinesis Data Firehose and Elastic for enhanced observability

As more organizations leverage the Amazon Web Services (AWS) cloud platform and services to drive operational efficiency and bring products to market, managing logs becomes a critical component of maintaining visibility and safeguarding multi-account AWS environments. Traditionally, logs are stored in Amazon Simple Storage Service (Amazon S3) and then shipped to an external monitoring and […]

Apple announces multibillion-dollar deal with Broadcom

Today Apple announced a new multiyear, multibillion-dollar agreement with Broadcom, a leading U.S. technology and advanced manufacturing company. Through this collaboration, Broadcom will develop 5G radio frequency components — including FBAR filters — and cutting-edge wireless connectivity components. The FBAR filters will be designed and built in several key American manufacturing and technology hubs, including Fort […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT