{"id":13647,"date":"2021-03-30T06:45:00","date_gmt":"2021-03-30T06:45:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/03\/30\/smart-factory-cyber-attacks-knock-out-production-for-days\/"},"modified":"2021-03-30T06:45:00","modified_gmt":"2021-03-30T06:45:00","slug":"smart-factory-cyber-attacks-knock-out-production-for-days","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/03\/30\/smart-factory-cyber-attacks-knock-out-production-for-days\/","title":{"rendered":"Smart Factory Cyber Attacks Knock Out Production for Days"},"content":{"rendered":"<p> \n<\/p>\n<div id=\"\">\n                            <!--<a class=\"format-txt\" href=\"{baseURL}\/View\/{release.id}?_download=1\">View this article in .txt format<\/a>--><\/p>\n<p class=\"subheadline\">\n                               Trend Micro research reveals lack of IT-OT collaboration is holding back security projects                            <\/p>\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media OutReach<\/a>\u00a0&#8211;\u00a030 March&#13;<br \/>\n2021 &#8211; <a href=\"https:\/\/www.trendmicro.com\/en_hk\/business.html\"\/> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\"\/>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"\/>),&#13;<br \/>\nthe leader in cybersecurity, today revealed that most (61%) manufacturers&#13;<br \/>\nhave experienced cybersecurity incidents in their smart factories and are&#13;<br \/>\nstruggling to deploy the technology needed to effectively manage cyber risk.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend Micro commissioned independent research specialist Vanson Bourne&#13;<br \/>\nto conduct an on-line survey with 500 IT and OT professionals in the United States,&#13;<br \/>\nGermany and Japan and found that over three-fifths (61%) of manufacturers have&#13;<br \/>\nexperienced cyber incidents, with most (75%) of these suffering system outages&#13;<br \/>\nas a result. More than two-fifths (43%) said outages lasted over four days.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>These&#13;<br \/>\nfindings and more can be found in the report, &#8220;<i>The State of Industrial&#13;<br \/>\nCybersecurity<\/i>: <i>Converging IT and OT with People, Process, and Technology<\/i>.&#8221;&#13;<br \/>\nA full copy of the report can be found at <a href=\"https:\/\/resources.trendmicro.com\/Industrial-Cybersecurity-WP.html\">https:\/\/resources.trendmicro.com\/Industrial-Cybersecurity-WP.html<\/a>.<b\/><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>\u00a0<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>&#8220;Manufacturing&#13;<br \/>\norganizations around the world are doubling down on digital transformation to&#13;<br \/>\ndrive smart factory improvements. <span class=\"jlqj4b\">The gap in IT and&#13;<br \/>\nOT cybersecurity awareness creates the imbalance between people, process and&#13;<br \/>\ntechnology, and it gives bad guys a chance to attack.<\/span>&#8221; said Akihiko Omikawa, executive vice&#13;<br \/>\npresident of IoT security for Trend Micro.&#13;<br \/>\n&#8220;That&#8217;s why Trend Micro has integrated IT and OT intelligence and provides a&#13;<br \/>\ncomprehensive solution from the shop floor to the office. We&#8217;re helping put visibility&#13;<br \/>\nand continuous control back in the hands of smart factory owners.&#8221;<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The results from all three countries showed that technology&#13;<br \/>\n(78%) was seen as the biggest security challenge, although people (68%) and&#13;<br \/>\nprocess (67%) were also cited as top challenges by many respondents. However,&#13;<br \/>\nfewer than half of the participants said they&#8217;re implementing technical&#13;<br \/>\nmeasures to improve cybersecurity.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Asset visualization (40%) and segmentation (39%) were the&#13;<br \/>\nleast likely of cybersecurity measures to be deployed, hinting that they are&#13;<br \/>\nthe most technically challenging for organizations to execute. Organizations&#13;<br \/>\nwith a high degree of IT-OT collaboration were more likely to implement&#13;<br \/>\ntechnical security measures than those with less cohesion. There was a particularly&#13;<br \/>\nbig gulf between organizations with high IT-OT collaboration verses those with&#13;<br \/>\nlittle to no IT-OT collaboration in the use of firewalls (66% verses 47%), IPS (62% verses 46%) and network&#13;<br \/>\nsegmentation (54% verses 37%).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Standards and&#13;<br \/>\nguidelines were cited as the top driver for enhanced collaboration in the&#13;<br \/>\nUnited States (64%), Germany (58%) and Japan (57%). The National Institute of&#13;<br \/>\nStandards and Technology&#8217;s (NIST) Cyber Security Framework and ISO27001 (ISMS)&#13;<br \/>\nwere among the most popular guidelines. <\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>The most&#13;<br \/>\ncommon organizational change cited by manufacturers in all three countries was&#13;<br \/>\nappointing a factory Chief Security Officer (CSO).<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>Trend Micro&#13;<br \/>\nrecommends a three-step technical approach to securing smart factories and&#13;<br \/>\nkeeping their operations running:<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>\u00a0<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>1)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0&#13;<br \/>\n<\/b><b>Prevention <\/b>by reducing intrusion risks at data exchange points like the&#13;<br \/>\nnetwork and DMZ. These risks could include USB storage devices, laptops brought&#13;<br \/>\ninto a factory by third parties, and IoT gateways.<b\/><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>2)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0&#13;<br \/>\n<\/b><b>Detection <\/b>by spotting anomalous network behavior like Command &amp; Control&#13;<br \/>\n(C&amp;C) communication and multiple log-in failures. The earlier the&#13;<br \/>\ndetection, the sooner attacks can be stopped with minimal impact on the&#13;<br \/>\norganization.<\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>3)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0&#13;<br \/>\n<\/b><b>Persistence&#13;<br \/>\n<\/b>is crucial to protect&#13;<br \/>\nsmart factories from any threat that has evaded prevention and detection&#13;<br \/>\nstages. Trend Micro TXOne Network&#8217;s industrial network and endpoint security&#13;<br \/>\nsolutions are purpose-built for OT environments. They work at a wide range of&#13;<br \/>\ntemperatures and are easy to use with minimal performance impact.<b\/><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p><b>\u00a0<\/b><\/p>\n<p>&#13;<br \/>\n&#13; <\/p>\n<p>To find out more about Trend&#13;<br \/>\nMicro&#8217;s security solutions for smart factories, please visit<span class=\"apple converted space\">\u00a0<\/span><a href=\"https:\/\/www.trendmicro.com\/en_hk\/business\/solutions\/iot\/smart-factory.html\" target=\"_blank\" rel=\"noopener noreferrer\">trendmicro.com\/en_hk\/business\/solutions\/iot\/smart-factory.html<\/a>.<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-03-30\/71477\/smart-factory-cyber-attacks-knock-out-production-for-days\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro research reveals lack of IT-OT collaboration is holding back security projects HONG KONG SAR &#8211;\u00a0Media OutReach\u00a0&#8211;\u00a030 March&#13; 2021 &#8211; (;),&#13; the leader in cybersecurity, today revealed that most (61%) manufacturers&#13; have experienced cybersecurity incidents in their smart factories and are&#13; struggling to deploy the technology needed to effectively manage cyber risk. &#13; &#13; &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/13647"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=13647"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/13647\/revisions"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=13647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=13647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=13647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}