Making a Connection: The State of Cybersecurity for Industrial Networks

 

Industrial networks are under threat from cyberattacks. On Feb. 8, Oldsmar, Florida, announced a cyber intrusion into its water treatment system. They detected the attack, but only after network infiltration.

David Zaveski, Product Manager at Antaira, spoke about the threats to industrial networks, what makes it easy to infiltrate them, and what IT departments can do to prevent such attacks.

Zaveski’s previous roles included working with enterprise networks, and this background gave him a lot of experience in understanding the importance of keeping networks secure. This experience is something he wants to bring to industrial networks, too.

“Industrial networks are quite different from enterprise networks,” Zaveski said. “They are required to have quicker responses across networks, but many are unprotected.”

Many industrial networks are protected from outside cyber interference through “air gapping” their networks by restricting connectivity from the outside. This provides a sense of protection from cyberthreats. And Zaveski said that does protect them. So, why are there breaches?

“What happens is, at some point, another somebody gets the idea that they want to be able to monitor the system remotely, and I want to connect that data and publish it for later planning,” he said. “As soon as they do that and attach that network to the public network, or internet, [risk is there].”

Now, a pathway to infiltrating that once-protected industrial network is created, and the cybersecurity risks begin.

Protocols and devices deployed across a network can keep them more secure. Still, any organization’s most important step is to restrict network access to just what individuals and devices need it, not carte blanche accessibility.

“Look at your network, and say, ‘I know I have A, B, C devices, and I know that A needs to communicate with B and C, but B and C never need to communicate with each other. So, I should block all traffic going from B to C.’ That’s great,” Zaveski said. “Because, now, if somebody hacks in at B, at least they can’t get to C.”

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

Lisa Bischoff
Through the Storm with Lisa Bischoff, Jewel Thief and Computer Hacker turned World-Changing Leadership Expert
February 21, 2025

In this episode of the Through the Storm podcast, Dr. Travis Hearne speaks with jewel thief, computer hacker, and world-changing leader, Lisa Bischoff. Lisa’s life is a testament to the power of transformation. Her journey has taken her from being an electrical engineer to a hacker, a jewel thief, and now, a transformational coach…

Read More
Ellendale AI Data Center
Applied Digital Ellendale AI Data Center: January 2025 Update
February 20, 2025

The new year brings continued momentum at Applied Digital’s Ellendale AI Data Center, with key milestones reinforcing its role in next-generation AI infrastructure. Construction activities in the west chiller plant are nearing completion, finalizing critical cooling capabilities. Fiber and network rooms have been successfully powered on, enhancing the facility’s connectivity readiness. Electrical terminations are…

Read More
agency
More than An Agency
February 20, 2025

Rogue Marketing sets itself apart from traditional agencies by taking a dynamic, results-driven approach rather than a rigid, transactional one. Unlike conventional agencies that simply execute a pre-planned strategy regardless of its performance, Rogue adapts in real time. If a campaign isn’t working halfway through, they pivot immediately to improve outcomes rather than waiting…

Read More
rogue marketing
Different Drives Results
February 20, 2025

Partnering with Rogue Marketing proved to be a game-changer for our dental practices. When we set out to refine our marketing strategy with a focus on patient growth and revenue generation, Rogue provided a fresh and unconventional approach. Unlike traditional marketing strategies that emphasize heavy spending on social media and paid advertising, Rogue helped…

Read More