Visit our Content Hub!
Access free downloadable content curated by our editors.

The First Step to Increasing Cybersecurity

There are a number of straightforward and understandable steps companies can take to protect their operations from cyberattacks. The first is to analyze operational vulnerabilities.

The First Step to Increasing Cybersecurity is to Analyze Operational Vulnerabilities.
The First Step to Increasing Cybersecurity is to Analyze Operational Vulnerabilities.

In 2020, Cisco found that 50% of large enterprises (with over 10,000 employees) are spending $1 million or more annually on security, with 43% spending $250,000 to $999,999, and just 7% spending under $250,000.

According to “2021 Cybersecurity: Assess Your Risk,” a new report from PMMI Business Intelligence, the dangers of a cyberattack are very real for these manufacturers, and it can be daunting to keep up with rapid developments in cybersecurity. While it is easy for manufacturers to feel like they are helpless in the face of sophisticated technological attacks, there are well-defined steps to protecting operational security, with the first being a comprehensive, detailed analysis of operational vulnerabilities.

Once manufacturers understand what these operational vulnerabilities are and where they are located, they can begin to secure networks and establish and enforce cybersecurity best practices at their locations. Said one cyber partner Managing Director, “A risk assessment is key to establishing a baseline of where your vulnerabilities are today, what critical data is being collected, and how that data is being protected.”

A Comprehensive Assessment Includes:

• Manufacturers must first have a thorough understanding of what their own operational vulnerabilities are and where they exist in their organization.

• Manufacturers should conduct a thorough assessment of their systems, devices, equipment, networks, and all other connection points both inside and outside their operations.

• Manufacturers will need to understand the layout of their internal networks: how individual components (including employee devices such as phones) of networks are connected, how individual networks are connected to one another, how/if remote access is allowed, and where any external connection capability (i.e., internet connectivity) resides.

Given the increase in frequency of OT-based attacks, it is especially important for organizations to have a detailed understanding of their ICS architecture. A comprehensive view into the flow of data should also be obtained: how data is collected, where it is stored, and who has access to it – this includes all edge computing and cloud computing capabilities as well.


Read article   Read about two key areas of vulnerability in manufacturing.