Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

0 24
Global surveys show that despite the increasing number of cyberattacks against m...

Global surveys show that despite the increasing number of cyberattacks against manufacturing companies, fewer than half of the companies are prepared.

Enterprises have insufficient response capabilities, and the cybersecurity of the manufacturing industry faces severe challenges

Omdia's latest survey shows that over the past year, 80% of manufacturing companies reported a significant increase in security incidents. However, only 45% of companies have taken appropriate measures in cybersecurity, while 13% of companies are completely unprepared. This survey covered more than 500 senior executives worldwide responsible for IT or OT security.

Most attacks first occur in IT systems

62% of the respondents have experienced outages or availability issues, usually resulting in losses of between 200,000 and 2 million US dollars. 75% of the attacks started from IT systems, not OT systems.

Researchers emphasize: 'To leverage advanced technology to drive manufacturing innovation, the need for connectivity between IT and OT is increasing. But this also increases the risk of security vulnerabilities.' However, only a few companies are well-prepared to deal with cyber risks.

The study shows that most attacks occur at the higher levels of the IT/OT stack, that is, the advanced layers of technology systems used for data processing or analysis. Advanced Persistent Threats (APT), malware, and Distributed Denial of Service (DDoS) are listed as the most common types of attacks against OT systems.

In addition, the study found that the responsibility for OT security is gradually shifting to the Chief Information Security Officer (CISO) and other senior executives with IT security backgrounds. One-fifth of the respondents said that their CISO is responsible for understanding and implementing integrated IT/OT security within the company.

At the same time, 42% of the surveyed companies plan to outsource IT/OT security.

Reference source:

Cyberattacks: The manufacturing industry is still poorly prepared

你可能想看:

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Different SRC vulnerability discovery approach: Practical case of HTTP request splitting vulnerability

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Google Android 11 Beta version officially released, Baidu Security fortification technology first fully compatible

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

最后修改时间:
admin
上一篇 2025年03月28日 19:20
下一篇 2025年03月28日 19:43

评论已关闭