61% of manufacturing companies have experienced a cyber attack and struggles to implement the technology needed to effectively manage cyber risks.
In addition, 75% of companies that have suffered an attack have faced a production stoppage and for 43% this interruption lasted more than four days.
I dati emergono da “The State of Industrial Cybersecurity: Converging IT and OT with People, Process, and Technology”, l’ultima ricerca di Trend Micro, leader globale di cybersecurity.
“Manufacturing industries around the world are doubling down on digital transformation efforts, for significantly improve their smart factories».
«The lack of full security awareness in OT environments and the divergences with IT knowledge however, they create an imbalance between the processes, technologies and people, which gives cybercriminals an advantage, ”he said Gastone Nencini, Country Manager of Trend Micro Italia.
“For this reason Trend Micro has integrated IT intelligence with OT intelligence and offers an integrated solution that guarantees greater control and visibility over the infrastructure».
The study states that technology is seen as the biggest cybersecurity challenge for 78% of the sample, following people (68%) and processes (67%). However, less than half of the companies said they did having started a technological path to improve safety.
Among the least implemented cybersecurity measures, asset visualization (40%) and segmentation (39%) capabilities, a testimony of how they are the most technically critical to adopt.
Companies with a high degree of IT-OT collaboration have shown that they are more inclined to develop cybersecurity measures compared to the others and this is reflected in the data relating to the use of firewalls (66% vs. 47%), IPS capacity (62% vs. 46%) or network segmentation (54% vs. 37%).
As for organizational changes, some organizations have appointed a Chief Security Officer (CSO). Trend Micro recommends a three-point approach to secure smart factories.
Prevent, reducing the risk of intrusion at the key points where data is exchanged, such as the network or DMZ areas. These risks could include USB sticks, external laptops, or IoT gateways
Detect, identifying abnormal behaviors in the network such as C&C communications or multiple and failed attempts to log-in. The sooner the attack is detected, the sooner the threat stops with minimal impact
To persist, it is crucial to defend smart factories from any type of threat that has escaped the levels of prevention and detection.