IT in Manufacturing


OT cybersecurity: New threats, new needs

January 2023 IT in Manufacturing

Critical infrastructure, just like other assets in the OT (operational technology) industry, is vulnerable to malware and other IT security risks. As illustrated by the Stuxnet worm, which targeted the scada and PLC systems of a major Middle Eastern nuclear programme, no equipment is immune from attacks or becoming paralysed by cyberthreats. In fact, the stakes are even higher when critical infrastructure is involved, rising to the level of national security. For this reason, today’s OT field network security and operational security must stay ahead of the game to protect critical infrastructure from new and constantly evolving threats.

Not only has the number of malware attacks and other security incidents increased in recent years, cyberthreats also affected more diverse industrial sectors including key infrastructure and the energy, water and healthcare industries. Another worrying observation is that the same types of cyberattack are being used across different industries. As such, today’s OT cybersecurity solutions must be versatile and cater to the security needs of different industries.

The ideal OT cybersecurity platform needs to be flexible

As cybersecurity threats are on the rise, IT cybersecurity professionals are hard-pressed to find an ideal cybersecurity solution for the unique demands of the OT sector. A suitable cybersecurity platform requires a high level of customisation to be able to truly protect critical OT equipment, such as scada systems. A tailor-made platform takes into account industrial protocols, application payloads, and network commands and data. This is particularly true in vertical market applications such as energy and transportation.

As the industry-specific OT fields require complex and highly customised configurations at different control points and devices, security is prone to human error, which can lead to vulnerabilities that are easily overlooked. To tackle this weakness, a central network management platform allows for easier deployment and flexibility in authority delegation. Different management privileges can be assigned to specific zones or roles, reducing any possible human errors. The central control platform also offers better access to data on network traffic for analysis.

An IPS cybersecurity platform is integral to holistic OT network defence

OT professionals all agree that applying security patches is important. However, many older software and devices do not support new patches, so they can quickly become cybersecurity liabilities in OT applications. Indeed, updating devices in the industrial field is not easy. These vulnerabilities can be addressed with industrial intrusion prevention systems (IPS). Capable of virtual patching to shield vulnerable assets, IPS also monitor the network environment, protect OT equipment and deliver security patches in a timely manner, without interrupting operations.

IPS can proactively detect suspicious activity and known attack patterns in network traffic. Once a malicious activity is detected, the IPS will discard the packet and block traffic from the attacker’s IP address, while still allowing legitimate traffic to pass through. Real-time detection stops external attacks before they can reach vulnerable systems such as scada or PLCs. Designed with the unique needs of OT in mind, an IPS cybersecurity platform offers robust and reliable features that take the guesswork and worries out of deploying and maintaining a holistic defence perimeter against cyberthreats.

The best fit for your application

Moxa’s industrial-grade EDR-G9010 Series all-in-one firewall, NAT, VPN, switch and router offers a comprehensive cybersecurity package featuring IPS, enhanced security functions and high-speed connectivity. The MXsecurity management software further simplifies cybersecurity deployments by providing centralised control over EDR-G9010 Series devices, and streamlines network security management.


Credit(s)



Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

South Africa’s AI revolution is here – but are we secure?
IT in Manufacturing
South African businesses are sprinting to embrace generative AI, lured by its potential to drive efficiency, productivity and innovation. But here’s the stark reality: without a rock-solid cybersecurity foundation, AI will become a Trojan horse, opening the floodgates to sophisticated cyber threats.

Read more...
Shaping data resilience strategies with AI and hybrid cloud solutions
IT in Manufacturing
In today’s rapidly evolving digital landscape, organisations are under growing pressure to secure their operations against increasingly sophisticated cyberthreats, including those that leverage AI to enhance the success rate of attacks. In this landscape, it has become essential to ‘fight fire with fire’ – harnessing AI as a means to counter these threats.

Read more...
Cloud or on-prem? Decoding the choices for South African enterprises
IT in Manufacturing
The debate between on-premise and cloud computing architectures remains a prominent topic among businesses, particularly in South Africa.

Read more...
Advancements in wire rope testing
IT in Manufacturing
Being able to get instant, real-time and portable detection of wire rope flaws can make a significant difference for operational teams. There have been a number of significant technological advancements and tools entering the market that help wire rope operators detect and resolve problems faster.

Read more...
Quantum computing power: four steps to protecting your business
IT in Manufacturing
Are you ready for Q-day? Post-quantum cryptography isn’t just an IT issue, it’s a business continuity concern. Quantum computing is fast becoming a reality.

Read more...
Schneider Electric relaunches legacy access control systems
Schneider Electric South Africa IT in Manufacturing
Schneider Electric South Africa has relaunched its comprehensive access control platform to help customers upgrade from ageing and obsolete systems.

Read more...
Digitalisation in mining - the advantage you need now
Schneider Electric South Africa IT in Manufacturing
Digitalisation offers immense and proven benefits such as streamlining operations, reducing error and accelerating workflows. Mining operators today leverage digital technologies to improve efficiency, sustainability and very importantly, safety.

Read more...
The shape of water – automating hydropower operations
Schneider Electric South Africa IT in Manufacturing
Hydropower is undoubtedly one of the building blocks of today’s renewable energy industry and its operations need to be efficient, reliable and sustainable. Automation must therefore form part of today’s modern hydropower operations to improve resource management and enhance reliability.

Read more...
What lies beneath – the hidden cost of AI
Schneider Electric South Africa IT in Manufacturing
The world is quickly realising that with the rapid advancement in AI there are also caveats. In short, apart from environmental implications, it also has major significant financial ramifications.

Read more...
Trends shaping the future of cloud in South Africa
IT in Manufacturing
The cloud has emerged as a fundamental and transformative component of modern business infrastructure. It has fundamentally changed how organisations operate and innovate. In South Africa, this trend is particularly pronounced, with most businesses adopting multi-cloud strategies to enhance their agility and competitiveness.

Read more...