Connect with us

Hi, what are you looking for?

HEADLINES

Industrial firms face annual $497K cybersecurity incident bill, according to study

Although majority of industrial organizations believe they are well-prepared for cybersecurity incidents, this confidence may be not well-founded: every second ICS company experienced between one and five incidents last year, according to a survey conducted by Kaspersky Lab. On average, ineffective cybersecurity costs industrial organizations up to $497K per year.

Although majority of industrial organizations believe they are well-prepared for cybersecurity incidents, this confidence may be not well-founded: every second ICS company experienced between one and five incidents last year, according to a survey conducted by Kaspersky Lab. On average, ineffective cybersecurity costs industrial organizations up to $497K per year.

Kaspersky Lab_ICS Survey Final.jpg

The emerging Industry 4.0 trend is making cybersecurity a top priority for industrial organizations globally, adding new challenges to dealing with ICS. Challenges include the convergence of IT and operational technology (OT), and the availability of industrial control networks to external providers.

To get more insight into the problems and opportunities faced by ICS organizations today, Kaspersky Lab and Business Advantage have conducted a global survey of 359 industrial cybersecurity practitioners in February – April 2017.

One of the survey’s main findings is a gap between the reality and perception of ICS incidents.

For example, despite 83% of respondents believing they are well-prepared to face an OT/ICS cybersecurity incident, half of companies surveyed experienced between one and five IT security incidents in the past 12 months, and 4% experienced more than six.

Advertisement. Scroll to continue reading.

This raises an important question – what should be changed in these organizations’ IT security strategies and protection means, so that they can protect their critical business data and technology processes more efficiently?

Incident Experience: Cyberthreats on the Shop Floor

ICS companies are well aware of the risks they’re facing: 74% of respondents believe there may be a cybersecurity attack on their infrastructure.

Despite high awareness about new threats such as targeted attacks and ransomware, the biggest pain point for the majority of ICS organizations is still conventional malware: this tops the list of incident experience concerns – with 56% of respondents considering it to be the most concerning vector.

In this case, perception meets reality: every second respondent had to mitigate the consequences of conventional malware last year.

Advertisement. Scroll to continue reading.

But there is also a mismatch surrounding employee errors and unintentional actions – which are far more threatening to ICS organizations than actors from the supply chain and partners, and sabotage and physical damage by external actors. Yet it’s the external actors that are in the top three of what ICS organizations worry about the most.

Meanwhile, the top three incident experience consequences include damage to the product and services quality, loss of proprietary or confidential information and reduction or loss of production at one site.

Security Strategies: From Air Gap to Network Anomalies Detection  

86% of organizations surveyed have got an approved and documented ICS cybersecurity policy aimed to safeguard them from potential incidents. However, incident experience proves that a cybersecurity policy alone is not enough.

Struggling with a lack of both internal and external IT security expertise, industrial organizations admit that a lack of skills is the utmost concern when it comes to ICS security.

Advertisement. Scroll to continue reading.

This is extremely worrisome as it indicates that industrial organizations are not always ready to fight attacks, while they are constantly at the edge of being compromised. Sometimes, by their own employees.

“Internal threats are more dangerous. We are well protected against external threats, but what is done internally has a direct path without a firewall in between. The threat originates unknowingly from members of staff,” admitted an ICS practitioner from product manufacturing plant in Germany.

On the positive side, the security strategies adopted by ICS practitioners look quite solid. The majority of companies have already given up on using air gap as a security measure, and are adopting comprehensive cybersecurity solutions.

In the next 12 months, respondents plan to implement industrial anomaly detection tools (42%) and security awareness training for staff. Industrial anomaly threat detection is especially relevant as every second ICS company surveyed admitted that external providers have access to industrial control networks in their organization, widening the threat perimeter.

“The growing interconnectedness of IT and OT systems raises new security challenges and requires a good deal of preparedness from board members, engineers and IT security teams. They need a solid understanding of the threat landscape, well-considered protection means and they need to ensure employee awareness.” said Andrey Suvorov, head of critical infrastructure protection, Kaspersky Lab. “With cyber threats on the ICS shop floor, it is better to be prepared. Security incident mitigation will be much easier for those who have leveraged the benefits of a tailored security solution built with ICS needs in mind”.

Advertisement. Scroll to continue reading.
Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

From January to December 2024, Kaspersky solutions used by businesses here detected and blocked more than 53 million bruteforce attacks. 

HEADLINES

According to Kaspersky experts, 2024 saw over 3 billion malware attacks globally, with a daily average of 467,000 malicious files detected. Windows systems were...

HEADLINES

Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. 

HEADLINES

Sophos Counter Threat Unit revealed the NICKEL TAPESTRY threat group’s scheme involving fraudulent workers operating on behalf of North Korea (formally known as the...

HEADLINES

PRSP is a staunch advocate of communication based on honesty and integrity. While our role is to uphold and strengthen the reputation of our...

HEADLINES

Poor password management is compounded by a reliance on common combinations of names, dictionary words and numerals. Not only are these passwords relatively easy...

White Papers

This demonstrates that despite a slight improvement from last year, cybersecurity preparedness remains low as hyperconnectivity and AI introduce new complexities for security practitioners.

HEADLINES

The Fraud Bureau is a collaborative initiative that unites banks, fintechs, and financial institutions to share data on potentially deceptive applicant activity securely. This...

Advertisement