IT in Manufacturing


Cybersecurity for industrial automation and control environments

Technews Industry Guide - Industrial Internet of Things 2016 IT in Manufacturing

The proliferation of cyber threats has prompted asset owners in industrial environments to search for security solutions that can protect their assets and prevent potentially significant monetary loss and brand erosion.

While some industries have made progress in minimising the risk of cyber attacks, the barriers to improving cybersecurity remain high. More open and collaborative networks have made systems more vulnerable to attack. End user awareness and appreciation of the level of risk is inadequate across most industries outside critical infrastructure environments. The uncertainty in the regulatory landscape also remains a significant restraint. With the increased use of commercial off-the-shelf IT solutions in industrial environments, control system availability is vulnerable to malware targeted at commercial systems. Inadequate expertise in industrial IT networks is a sector-wide challenge.

Against this background, organisations need to collaborate with a solutions provider who understands the unique characteristics of the industrial environment and is committed to security. One such solutions provider, Schneider Electric, helps its customers adopt the multi-layered Defence-in-Depth approach through a holistic, systematic plan to mitigate risk. This includes improved security features on current and upcoming solutions, the use of the Automation Systems Manager (ASM) to monitor, manage and protect assets, and a comprehensive suite of services to support customers. With this expertise, organisations can move from reactive and ad hoc responses, to a proactive, planned and holistic approach to security.

The exponential increase in cyber threat levels

Over the last decade, the rise in cyber attacks on critical infrastructure has resulted in cyber security becoming a central concern amongst industrial automation and control system users and vendors. These strategic attacks are aimed at disrupting industrial activity for monetary, competitive, political or social gain, or even as a result of a personal grievance.

Cyber threats are primarily aimed at industrial control systems such as DCSs, PLCs, scada systems and HMIs, through loopholes that can range from unsecured remote access, to inadequate firewalls, to a lack of network segmentation.

Such threats are not a new phenomenon. However, a spate of high-profile attacks over the last decade has brought this issue to centre stage. While motivations for intentional attacks vary, the key attack vectors for any cyber threat are typically as follows:

• Physical intrusion or a cyber attack.

• People and processes.

• Control systems vulnerabilities (hardware and software).

• Network architecture loopholes.

Readers interested in learning how to mitigate such risk can download the full paper at http://instrumentation.co.za/+T37

For more information contact Lebohang Thokoane, Schneider Electric SA, +27 (0)11 254 6400, [email protected], www.schneider-electric.com



Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Revolutionising mining operations with MineOptimize
IT in Manufacturing
Now more than ever, mining and mineral processing companies need to boost productivity, ensure safety, and protect the environment. ABB’s comprehensive electrification, automation and digital solutions portfolio is ideally positioned to meet these challenges across all mining processes, from mine to port, transforming performance in a digital world.

Read more...
Buildings in Africa’s urban evolution
Schneider Electric South Africa IT in Manufacturing
Africa is now an urban continent. How does the continent mobilise to accommodate urban dwellers and maintain and implement critical infrastructure that allows for this expansion? Building management systems provide a tangible solution to optimise resource use, lower operations costs and ultimately contribute to a growing continent that also employs green practices.

Read more...
TwinCAT Vision functionality extended
Beckhoff Automation IT in Manufacturing
The image processing and camera integration capabilities of Beckhoff’s TwinCAT 3 Vision software have been expanded.

Read more...
Automation software to future-proof your operations
Adroit Technologies IT in Manufacturing
As the official partner of Mitsubishi Electric Factory Automation, Adroit Technologies empowers businesses with cutting-edge solutions that reduce costs, improve quality and increase productivity.

Read more...
Siemens automation portfolio, your bridge to the industrial metaverse
Siemens South Africa IT in Manufacturing
Step into the future with Siemens’ automation portfolio, your bridge to the industrial metaverse. Our cutting-edge solutions integrate AI, digital twins and real-time simulation, driving smarter, more efficient production.

Read more...
Transform your manufacturing efficiency
TransLution Software IT in Manufacturing
MÄDLER offers a wide range of gears in various materials, modules and designs, available directly from stock.

Read more...
Optimise the cutting of metal materials
IT in Manufacturing
KRON Cutting is a comprehensive web-based system designed to optimise the cutting of metal materials, including rebar, pipes and profiles.

Read more...
Black Rock Mining centralises mining operations with AVEVA
IT in Manufacturing
Black Rock Mine Operations replaced and upgraded its existing infrastructure, and installed additional capacity to expand production from 3 to 4,6 million tons in three years. The new system is powered by a suite of AVEVA solutions.

Read more...
The strategic role of technology in today’s economy
IT in Manufacturing
In an era of economic uncertainty and persistent market volatility, businesses are under immense pressure to manage costs while maintaining operational effectiveness. The role of chief information officers and chief technology officers has never been more critical, as they are tasked with leveraging technology not just as a tool for efficiency but as a strategic asset in navigating these turbulent times.

Read more...
Minutes to meltdown: surviving a cyber attack
IT in Manufacturing
Commvault recently hosted its Minutes to Meltdown event. Led by the company’s security experts, this was an interactive and detailed ransomware attack simulation designed to help companies understand how to respond in the event of a cyber attack.

Read more...