IT in Manufacturing


Data security during load shedding: what should you know?

June 2023 IT in Manufacturing

Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what about your data? What steps have you taken to ensure your business information and application services remain available when load shedding strikes? And did you also cover your security?

When data and applications become unavailable, work stops. Load shedding has made this balance much harder to maintain, and many companies might start cutting corners in their security to ensure productivity. But they are taking a significant risk.

“Today’s digital businesses must balance access to their systems with hybrid workers, 24/7 availability, and ongoing security. Throw in frequent power failures and they need to start making tough choices. It becomes tempting to make choices that focus on availability, and sacrifice security features. This is understandable, but they should be careful because cybercriminals can exploit those shortcuts,” says Gerhard Swart, CTO at cybersecurity company, Performanta.

Load shedding puts every organisation’s security under pressure. According to Swart, there are five key considerations you should take into account to avoid trouble while keeping your systems online and your business cyber-safe.

1. Users log in from different areas and at different times

Modern cybersecurity depends on predictable user behaviours, particularly zero trust security that scrutinises the locations and times of people logging in. Load shedding causes big swings in when and where people decide to access systems, and criminals exploit this confusion. Companies should implement multi-factor authentication to reduce problems with hacked accounts, and enlist threat detection services to catch unusual behaviour.

2. Data centre providers are not impervious

Third-party data centres invest considerable resources to provide power generation and protection against surges. But these measures can still fail, and all organisations must have data loss protection plans. These plans include backup services and failover contingencies, such as a secondary live data site duplicated from the primary data centre.

3. Productivity pressures can derail backup/recovery security

When users need to access data or applications, it should happen quickly, or their productivity will suffer. Speed is essential for ready access to digital assets. But such productivity demands often lead to cutting security corners. This is a dangerous compromise and should be avoided. Create clear, flexible backup and recovery processes that maintain key features such as zero trust security and encryption.

4. Password sharing and weak passwords are more widespread

Hybrid working has encouraged some bad security habits to grow, such as weak passwords, reusing passwords and sharing passwords. Even though passwords are not a great solitary defence, they still form part of a robust security posture and good security hygiene. Poor password habits have dual adverse effects: they undermine security culture and weaken security measures. Load shedding amplifies these bad habits. Create a clear password policy, scan for duplicate passwords, and consider providing a company-supported password manager.

5. Criminals can exploit load shedding anxiety

One of the most significant risks from load shedding is the anxiety and panic it causes. Criminals can use these emotions in phishing attacks such as an email offering a super-cheap, high-end power supply (act now or lose it forever!). Users click on the link, thinking they will get a special deal, but they instead allow malware onto their system. Ensure your people are updated on their security hygiene, instruct them to watch out for these attempts, and use periodic testing to demonstrate how an attack could happen.

Load shedding amplifies many risks around technology. Most of these are apparent, such as providing backup power. However, it’s important not to overlook the problems it creates for data and applications. Speak to an experienced digital business security provider to ensure your environment balances security and productivity when the lights go off.




Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Bringing brownfield plants back to life
Schneider Electric South Africa IT in Manufacturing
Today’s brownfield plants are typically characterised by outdated equipment and processes, and face challenges ranging from inefficient operations to safety hazards. However, all is not lost, as these plants stand to gain a lot from digitalisation and automation.

Read more...
How to manage resilient MRO supply chains
RS South Africa IT in Manufacturing
In today’s fast-changing and unpredictable world, maintaining a resilient supply chain for Maintenance, Repair and Operations (MRO) is crucial for businesses across various sectors. RS South Africa MD, Brian Andrew shares his top five tips on how to approach and manage MRO supply chains to ensure resilience against future shocks.

Read more...
Digital twin technology for optimised asset management and maintenance
Schneider Electric South Africa IT in Manufacturing
In an era where technological advancements are rapidly transforming industries, digital twin technology is an important industry innovation that promises to redefine asset management and maintenance. It enables organisations, their internal teams, and external partners to stay one step ahead of potential downtime, and even catastrophic failure.

Read more...
Reshaping the future of air freight with Siemens software
Siemens South Africa IT in Manufacturing
Aerospace company, Natilus has adopted the Siemens Xcelerator portfolio of industry software. The company is focused on transforming the world’s supply chain with its next-generation blended-wing body aircraft, and through its use of Siemens software it has reduced the development time to build its first prototype aircraft by 50%.

Read more...
The power of connected vehicles in shaping the future of mobility
IT in Manufacturing
In today’s increasingly digital transformative world of mobility, connected vehicle architecture has emerged as a cornerstone of innovation, rapidly transforming how fleet owners interact with vehicles and the ecosystem.

Read more...
Accelerating digitalisation across process industries
ABB South Africa IT in Manufacturing
ABB has launched Do More With Digital, a global campaign highlighting the opportunities for the process industries to realise their full potential through digital transformation.

Read more...
Automation tips for eco-friendly plastic packaging
Omron Electronics IT in Manufacturing
The urgent need to reduce plastic packaging to alleviate environmental strain is widely recognised. However, the benefits of plastics should not be completely overlooked. To address this, efficient and resource-saving usage is essential.

Read more...
Hack-proof measurement technology
VEGA Controls SA Editor's Choice IT in Manufacturing
Users in the process industry have not prioritised cyber security. This might be because they assume the IT department’s responsibility, or they don’t feel directly threatened. However, both attitudes are neglectful, and here’s why: IT security should always be a joint task between IT and OT.

Read more...
How manufacturing with AI can drive a sustainable future
IT in Manufacturing
Global warming and the associated reality of climate change are the most discussed outcomes of unsustainable human behaviours. However, global warming is just one of the problems precipitated by the overuse of our natural resources. These must be addressed urgently, in addition to mitigating the cascading effect of global temperature shifts.

Read more...
Five steel producers taking action to decarbonise steel production
Editor's Choice IT in Manufacturing
Steel is crucial for engineering, construction and the energy transition. There is rising demand, but it produces 7% of global greenhouse gas (GHG) emissions. However, by 2030, near-zero emission steel at scale can be achieved by using ambitious, innovative technologies, and collaboration between steel purchasers, producers and companies providing enabling technologies.

Read more...