Industrial Security Adoption Slow

Wednesday, December 6, 2017 @ 12:12 PM gHale


Industrial companies are not moving quickly to adopt cybersecurity measures to protect their data and operations, even as attacks have increased around the globe, a new report said.

“Decision makers are more aware of threats and some progress has been made to address them, but this report reinforces that cybersecurity fundamentals haven’t been adopted by a significant portion of the industrial community,” said Jeff Zindel, vice president and general manager, Honeywell Industrial Cyber Security, which sponsored the survey.

RELATED STORIES
Companies Move Ahead with Security Plans
DDoS Attack Onslaught Rages: Report
Phishing is Top Threat: Report
Botnet DDoS Attacks Grow in Q3: Report

“In order to take advantage of the tremendous benefits of industrial digital transformation and IIoT, companies must improve their cybersecurity defenses and adapt to the heightened threat landscape now,” Zindel said.

The survey, entitled “Putting Industrial Cyber Security at the Top of the CEO Agenda” was conducted by LNS Research. It polled 130 strategic decision makers from industrial companies about their approach to the Industrial Internet of Things (IIoT), and their use of industrial cybersecurity technologies and practices.

Among the findings were:
• More than half of respondents reported working in an industrial facility that already has had a cybersecurity breach.
• 45 percent of the responding companies still do not have an accountable enterprise leader for cybersecurity.
• 37 percent are monitoring for suspicious behavior.
• Although companies are conducting regular risk assessments, 20 percent are not doing them at all.

The study suggests these three immediate actions for any industrial organization to capture the value of the new technologies:
1. Make industrial cybersecurity part of digital transformation strategies
2. Drive best practice adoption across people, processes and technology, from access controls to risk monitoring, and tap external cyber expertise to fill gaps
3. Focus on empowering leaders and building an organizational structure that breaks down the silos between IT and OT.

Click here to register to download the report.



Leave a Reply

You must be logged in to post a comment.