Making a Connection: The State of Cybersecurity for Industrial Networks

 

Industrial networks are under threat from cyberattacks. On Feb. 8, Oldsmar, Florida, announced a cyber intrusion into its water treatment system. They detected the attack, but only after network infiltration.

David Zaveski, Product Manager at Antaira, spoke about the threats to industrial networks, what makes it easy to infiltrate them, and what IT departments can do to prevent such attacks.

Zaveski’s previous roles included working with enterprise networks, and this background gave him a lot of experience in understanding the importance of keeping networks secure. This experience is something he wants to bring to industrial networks, too.

“Industrial networks are quite different from enterprise networks,” Zaveski said. “They are required to have quicker responses across networks, but many are unprotected.”

Many industrial networks are protected from outside cyber interference through “air gapping” their networks by restricting connectivity from the outside. This provides a sense of protection from cyberthreats. And Zaveski said that does protect them. So, why are there breaches?

“What happens is, at some point, another somebody gets the idea that they want to be able to monitor the system remotely, and I want to connect that data and publish it for later planning,” he said. “As soon as they do that and attach that network to the public network, or internet, [risk is there].”

Now, a pathway to infiltrating that once-protected industrial network is created, and the cybersecurity risks begin.

Protocols and devices deployed across a network can keep them more secure. Still, any organization’s most important step is to restrict network access to just what individuals and devices need it, not carte blanche accessibility.

“Look at your network, and say, ‘I know I have A, B, C devices, and I know that A needs to communicate with B and C, but B and C never need to communicate with each other. So, I should block all traffic going from B to C.’ That’s great,” Zaveski said. “Because, now, if somebody hacks in at B, at least they can’t get to C.”

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

finance
Dr. Silver Kung’s Path From $10 Million in Debt to a Multibillion-Dollar Finance Career
May 21, 2026

Global finance is being tested by forces that no balance sheet can fully predict: unstable supply chains, geopolitical shocks, tighter credit conditions and the accelerating rise of AI. In trade finance especially, success depends on more than capital; it requires judgment, discipline and the ability to see risk before it becomes disruption. As automation…

Read More
specialty pharmacy
At the Center of Care: How Specialty Pharmacy Aligns Patients, Providers, and Payers
May 21, 2026

As healthcare costs continue to rise, more patients are finding themselves navigating not just illness, but the growing complexity of paying for treatment. Specialty pharmacy sits right at the center of that challenge—often out of sight, but increasingly essential to how modern care actually works. These high-cost, high-touch therapies now make up more than…

Read More
Language development
Just Thinking… About How Multilingualism and Language Development Belong at the Center of Student Learning
May 20, 2026

For millions of students in America, learning English is only one part of a much larger academic story. A 2024 GAO report found that English learners in U.S. public schools grew from 4.5 million to 5 million students between fall 2010 and fall 2020, and that they speak more than 400 languages. That diversity…

Read More
AI Infrastructure
Simplifying AI Infrastructure: From Data Center to Deployment (Part 1)
May 19, 2026

In this episode of the Flawless Execution podcast, Jeff Hudgins, VP of Global Services at UNICOM Engineering, breaks down the real-world challenges of deploying AI infrastructure at scale. As AI moves from one-off builds to repeatable global deployments, OEMs, ISVs, and enterprises face increasing complexity across design, integration, cooling, logistics, and installation. Jeff discusses how…

Read More