IT in Manufacturing


OT cybersecurity: New threats, new needs

January 2023 IT in Manufacturing

Critical infrastructure, just like other assets in the OT (operational technology) industry, is vulnerable to malware and other IT security risks. As illustrated by the Stuxnet worm, which targeted the scada and PLC systems of a major Middle Eastern nuclear programme, no equipment is immune from attacks or becoming paralysed by cyberthreats. In fact, the stakes are even higher when critical infrastructure is involved, rising to the level of national security. For this reason, today’s OT field network security and operational security must stay ahead of the game to protect critical infrastructure from new and constantly evolving threats.

Not only has the number of malware attacks and other security incidents increased in recent years, cyberthreats also affected more diverse industrial sectors including key infrastructure and the energy, water and healthcare industries. Another worrying observation is that the same types of cyberattack are being used across different industries. As such, today’s OT cybersecurity solutions must be versatile and cater to the security needs of different industries.

The ideal OT cybersecurity platform needs to be flexible

As cybersecurity threats are on the rise, IT cybersecurity professionals are hard-pressed to find an ideal cybersecurity solution for the unique demands of the OT sector. A suitable cybersecurity platform requires a high level of customisation to be able to truly protect critical OT equipment, such as scada systems. A tailor-made platform takes into account industrial protocols, application payloads, and network commands and data. This is particularly true in vertical market applications such as energy and transportation.

As the industry-specific OT fields require complex and highly customised configurations at different control points and devices, security is prone to human error, which can lead to vulnerabilities that are easily overlooked. To tackle this weakness, a central network management platform allows for easier deployment and flexibility in authority delegation. Different management privileges can be assigned to specific zones or roles, reducing any possible human errors. The central control platform also offers better access to data on network traffic for analysis.

An IPS cybersecurity platform is integral to holistic OT network defence

OT professionals all agree that applying security patches is important. However, many older software and devices do not support new patches, so they can quickly become cybersecurity liabilities in OT applications. Indeed, updating devices in the industrial field is not easy. These vulnerabilities can be addressed with industrial intrusion prevention systems (IPS). Capable of virtual patching to shield vulnerable assets, IPS also monitor the network environment, protect OT equipment and deliver security patches in a timely manner, without interrupting operations.

IPS can proactively detect suspicious activity and known attack patterns in network traffic. Once a malicious activity is detected, the IPS will discard the packet and block traffic from the attacker’s IP address, while still allowing legitimate traffic to pass through. Real-time detection stops external attacks before they can reach vulnerable systems such as scada or PLCs. Designed with the unique needs of OT in mind, an IPS cybersecurity platform offers robust and reliable features that take the guesswork and worries out of deploying and maintaining a holistic defence perimeter against cyberthreats.

The best fit for your application

Moxa’s industrial-grade EDR-G9010 Series all-in-one firewall, NAT, VPN, switch and router offers a comprehensive cybersecurity package featuring IPS, enhanced security functions and high-speed connectivity. The MXsecurity management software further simplifies cybersecurity deployments by providing centralised control over EDR-G9010 Series devices, and streamlines network security management.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Fortifying the state in a time of cyber siege
IT in Manufacturing
In an era where borders are no longer physical, South Africa is being drawn into a new kind of conflict, one fought not with tanks and missiles, but with lines of code and silent intrusions. The digital battlefield is here, and cyber space has become the next frontier of conflict.

Read more...
Levelling up workplace safety - how gamification is changing the rules of training
IT in Manufacturing
Despite the best intentions, traditional safety training often falls short, with curricula either being too generic, too passive, or ultimately unmemorable. Enter gamification, a shift in training that is redefining how businesses train for safety and live by those principles.

Read more...
Reinventing data centre design: critical changes to meet surging
Schneider Electric South Africa IT in Manufacturing
AI technologies are pushing the boundaries of what is possible which, in turn, is presenting data centres with a whole new set of challenges. Fortunately, several options are emerging which include optimising design and infrastructure for efficiency, cooling and management systems

Read more...
Watts next - can IT save the planet
IT in Manufacturing
The digital age’s insatiable demand for computing power has collided with an urgent and pressing need for sustainability. As data centres and AI workloads consume unprecedented energy, IT providers are pivotal in redefining how technology intersects with environmental stewardship.

Read more...
South Africa’s digital revolution:
IT in Manufacturing
South Africa stands at a pivotal moment in its technological evolution, poised to redefine itself as Africa’s leading digital powerhouse. Over the past two years, political leaders and media narratives have painted a picture of rapid digital transformation, underscoring the government’s ambition to position South Africa at the forefront of innovation.

Read more...
Smart manufacturing, APC and the
Schneider Electric South Africa IT in Manufacturing
Manufacturers are prioritising the integration of smart technologies into their daily operations to stay one step ahead of the competition. In South Africa, some experts believe the country has the potential to leapfrog its global peers through the creation of smart factories.

Read more...
Schneider Electric’s Five-Pillar Strategy takes the guesswork out of equip
Schneider Electric South Africa IT in Manufacturing
Schneider Electric’s Field Service Cycle, otherwise known as the Five-Pillar Strategy, is a structured approach to managing the lifecycle of equipment to prolong asset lifespan while reducing the total cost of ownership for customers.

Read more...
Enhancing operational safety and efficiency through advanced risk-based modelling
IT in Manufacturing
Now, more than ever, capital and operational cost can be reduced while enhancing operational safety and increasing production uptime by applying transformative methods such as Computational Fluid Dynamics modelling.

Read more...
Laying the groundwork in IT/OT
IT in Manufacturing
In the realm of manufacturing, the core mandate is to deliver value to stakeholders. For many in the industry, this is best achieved through a risk-averse approach. Only upon establishing a robust foundation should a business consider venturing into advanced optimisation or cutting-edge technological innovations such as industrial AI.

Read more...
Looking into the future of machine vision
Omron Electronics IT in Manufacturing
Artificial intelligence (AI) is driving a significant transformation in all areas of industrial automation, and machine vision is no exception. Omron’s AI-powered machine vision systems seamlessly integrate state-of-the-art algorithms, enabling machines to analyse and interpret visual data meticulously.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved