Making a Connection: The State of Cybersecurity for Industrial Networks

 

Industrial networks are under threat from cyberattacks. On Feb. 8, Oldsmar, Florida, announced a cyber intrusion into its water treatment system. They detected the attack, but only after network infiltration.

David Zaveski, Product Manager at Antaira, spoke about the threats to industrial networks, what makes it easy to infiltrate them, and what IT departments can do to prevent such attacks.

Zaveski’s previous roles included working with enterprise networks, and this background gave him a lot of experience in understanding the importance of keeping networks secure. This experience is something he wants to bring to industrial networks, too.

“Industrial networks are quite different from enterprise networks,” Zaveski said. “They are required to have quicker responses across networks, but many are unprotected.”

Many industrial networks are protected from outside cyber interference through “air gapping” their networks by restricting connectivity from the outside. This provides a sense of protection from cyberthreats. And Zaveski said that does protect them. So, why are there breaches?

“What happens is, at some point, another somebody gets the idea that they want to be able to monitor the system remotely, and I want to connect that data and publish it for later planning,” he said. “As soon as they do that and attach that network to the public network, or internet, [risk is there].”

Now, a pathway to infiltrating that once-protected industrial network is created, and the cybersecurity risks begin.

Protocols and devices deployed across a network can keep them more secure. Still, any organization’s most important step is to restrict network access to just what individuals and devices need it, not carte blanche accessibility.

“Look at your network, and say, ‘I know I have A, B, C devices, and I know that A needs to communicate with B and C, but B and C never need to communicate with each other. So, I should block all traffic going from B to C.’ That’s great,” Zaveski said. “Because, now, if somebody hacks in at B, at least they can’t get to C.”

Follow us on social media for the latest updates in B2B!

Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

biofuel feedstock
Motor Fuels Tax Minute, Episode 43: Biofuel Feedstock
April 16, 2024

In this week’s episode of Motor Fuels Tax Minute, our hosts discuss non-tax specific permits for biofuel feedstocks.   For information or assistance, contact us. We are here to help. ©2024 Detailed Description of Weaver’s Motor Fuels Tax Minute, Episode 43 00:00:00 Emilda: Welcome to Weaver’s Motor Fuels Tax Minute, the vlog where we talk all […]

Read More
An Aging U.S. Workforce Could Be A Fruitful Operational Shift for Businesses
April 15, 2024

In a workforce landscape being shaped by inflation, supply chain evolution, geopolitical tide shifts, and rising next-gen technology, businesses are increasingly recognizing the value of integrating older, experienced workers into their labor strategies. The allure lies not only in the seasoned skills these workers bring but also in their financial independence, which often allows […]

Read More
telecom project success in healthcare
Telecom Project Success in Healthcare Usually Comes Down to Working with the Right Decision Maker
April 15, 2024

In the rapidly evolving landscape of healthcare technology, telecommunications plays a crucial role. As healthcare providers increasingly rely on digital solutions—from telemedicine to electronic health records—telecom companies are finding new opportunities and challenges in this sector. Successfully implementing telecom projects in healthcare requires a nuanced understanding of the industry’s legacy communications infrastructure, unique demands […]

Read More
visitor management systems
Enhance Security with Faster Adoption of Digital Visitor Management Systems
April 15, 2024

As workplaces evolve into hybrid environments, the urgency to replace traditional paper logbooks with advanced digital visitor management systems has become a critical focus for organizations aiming to bolster security. The reliance on outdated methods poses significant security risks, a concern highlighted by increasing incidents of unauthorized access and data breaches globally. This pressing […]

Read More