Sign in or Register

Fictron Industrial Supplies Sdn Bhd
No. 7 & 7A,
Jalan Tiara, Tiara Square,
Taman Perindustrian Sime UEP,
47600 Subang Jaya,
Selangor, Malaysia.
+603-8023 9829
+603-8023 7089
Fictron Industrial
Automation Pte Ltd

140 Paya Lebar Road, #03-01,
AZ @ Paya Lebar 409015,
Singapore.
+65 31388976
sg.sales@fictron.com

Five Steps Manufacturers Can Take to Combat Cyber Attacks

08 Oct 2019
Five Steps Manufacturers Can Take to Combat Cyber Attacks
View Full Size
It’s not far-fetched to claim that the existing cybersecurity landscape is relatively tumultuous, and that is true in every single industry from retail to finance. Cyber strikes are on the rise, primarily in the manufacturing sector.
 
One of the popular motives why manufacturing has come under fire is simply because cyber threats have grown much more sophisticated in recent years. Things have advanced beyond just a software standpoint to hardware — processor vulnerabilities being a perfect example.
 
The fact is, a recent security report from SonicWall Capture Labs shown there were over 74,000 “never-before-seen” complex strikes in 2019. They were so fresh that most of those threats were without even a signature at the time of discovery.
 
This alarming information suggests that cyberattacks on manufacturers are going to grow more frequent, more advanced and more successful. There is a very clear need to protect not just for conventional manufacturing operations, but also all networks, systems and resulting data — especially as the manufacturing industry evolves into a more digital-centric ecosystem.
 
Fortunately, there are cybersecurity tips available to help manufacturers of all sizes protect themselves from cyber threats and prepare themselves for the brave new world of Industry 4.0.
 
Introducing the NIST Cybersecurity Framework
 
The National Institute of Standards and Technology (NIST) has developed a cybersecurity framework that includes some directions and best practices for coping with potential cybersecurity threats. Most importantly, it's attainable to all organizations, including small to medium-sized manufacturers.
 
Representatives of the MEP National NetworkTM, just like the Michigan Manufacturing Technology Center, offer flexible, cost-effective approaches to implementing cybersecurity programs that align with the NIST framework, making these protections accessible to even a cost-prohibited company.
 
The framework lays out five practical activities, or functions, that can be used to achieve a more secure operation. They include:
 
1. Identify
 
This first function expressly deals with understanding potential cybersecurity risks to an organization, including its systems, people, assets, data, capabilities and networks. The primary question is: What must be done to manage existing risks and mitigate the potential for damage?
 
Actions the framework recommends in this category include:
  • Controlling who has access to your information
  • Conducting background and security checks for all employees
  • Requiring individual user accounts for each employee
  • Creating cybersecurity policies and procedures
 
2. Protect
 
Commonly, learning about leads to taking action — which is the protection aspect of the framework. This is where a manufacturer must develop and implement safeguards for its operations or services. Actions you can take include to protect your operation include:
  • Limiting access to your user data and information
  • Installing surge protector and uninterruptible power supplies
  • Patching your operating systems and software regularly
  • Installing and activating software and hardware firewalls
  • Securing all wireless access points and network
  • Setting up web and email filters
  • Using encryption for sensitive business information
  • Disposing of old computers and media safely
  • Training your employees
 
3. Detect
 
A suitable monitoring system must be applied to determine either a recent cybersecurity event or one that’s ongoing. The well timed discovery of these attacks is necessary to an effective security strategy. Activities for detecting cyber attacks include:
 
  • Installing and updating anti-virus and other cybersecurity programs
  • Running anti-virus and anti-spyware programs daily
  • Conducting full system scans daily
  • Maintaining and monitoring detection logs
 
4. Respond
 
Upon discovery, every manufacturer must have controls available to respond accordingly to an attack. These include functionality to block them, together with to regain access to a system.
 
This functionality is somehow distinct for manufacturers as most providers use only limited networks or wireless connectivity. Industrial-quality access controls are crucial to monitor not merely internal processes and systems, but also that of vendors and involved partners. Dynamic, real-time policy enforcement is essential across all of the network, and not just for local operations.
 
A response program should include:
 
  • Developing a plan for information security incidents by determining:
  • Who to call in case of an incident
  • What to do with your data in case of an incident
  • When to alert senior management, emergency personnel, and others
  • The types of activities that constitute an information security incident
  • Know your notification obligations
 
5. Recover
 
Generally the same as data or systems recovery, this function deals with the restoration of impaired or damaged services and content. It should include:
 
  • Making full backups of essential business data
  • Incremental backups of important business information
  • Assessing and improving your procedures and technologies
 
One other aspect of this is opening up communications with clients or customers to reveal the impact of an event. Essentially, it would also include follow-up measures to stop future attacks.
 
How to Secure Your Company
 
At last, companies should focus on adhering to NIST’s volunteer framework not merely to prevent severe threats, but likewise to understand how they and their team can better deal with them. For many organizations — big and small — it is not a question of whether or not they will experience a cyberattack but when. Being prepared for when that happens is the best way to mitigate prospective damage and any operational impact.
 
The best course of action to secure your company — or to find out just how vulnerable it is — is to work alongside experts in manufacturing cybersecurity and the NIST Cybersecurity Framework. Manufacturers ready to take this critical step in their digital evolution should contact their local Manufacturing Extension Partnership Program (MEP) Center. They are really part of the MEP National Network, which includes hundreds of specialists who know how to address the cybersecurity concerns of small and medium-sized manufacturers, and who are well-versed in the NIST Cybersecurity Framework.
 
INDUSTRYWEEK

You have 0 items in you cart. Would you like to checkout now?
0 items
Switch to Mobile Version