• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Fortress of Information

5G, Machine Learning & Artificial Intelligence

  • Home
  • AI
    • Artificial Intelligence in Telecom – From Hype to Reality – AI
    • AI vs. Human
    • Incredible Examples Of AI And Machine Learning In Practice
    • Must Have Marketing Skills to Survive in The Age of AI
  • 5G
    • What is 5G? The Ultimate Guide Available on Internet
    • 5 Reasons Why 5G is The Future
    • What is The Difference between 5G and 6G?
    • The Technology of The Year 2020 Will Be 5G
    • How Operators Should Expedite 5G Deployment
    • Evolution of 5G in Internet of Medical Things (IoMT)
    • 5G in South Asia: Opportunities & Challenges
    • Beamforming 5G – Mobile Radio With Pinpoint Accuracy
    • Scientists Warn of Health Risks From 5G
  • IoT
    • 5 Ways the IoT Can Change the Business World
    • IoT Data Security Issues Popped up in 2019
    • IoT Security Threats and How to Handle Them
    • Business Internet Of Things | IoT Applications 2019
  • ML
    • Future Technology Predictions 2020
    • Machine Learning Trend To Find Bugs
    • Secret Methods of Applying Text Analytics ( AI and Machine Learning Application )
    • The Present And Future of Machine Learning on Devices
  • Technology
    • Cloud Computing
      • What is Cloud Computing? Explained With Examples!
      • Blade Shadow Cloud Gaming Review
    • AMD
      • AMD Ryzen 9 3900X Stress Test Results – Incredible Performance Show
      • Why AMD Makes Less Sales and Profits in Q2 FY 2019
    • Cyber Security
      • 2019 Onward: Everyday Is Information Cyber Security Day
      • Russian Security Researcher Accessed Xiaomi Furry Tail Pet Smart Feeder
      • FaceApp Aging Challenge: Is FaceApp A Danger To Our Privacy?
    • Tech Business
      • 2 Steps to Ensuring Project Success
      • Public Sector vs Private Sector For IT Professional in EU
      • Healthy Employees Manage Digital Transformation Better
      • How to Protect Production Facilities Effectively in 2020
      • Great Example of Socially Responsible Business
      • Great Example of Socially Responsible Business
    • Tech Facts
      • Cutting Edge Technologies That Will Change Marketing Industry Forever
      • This is How Phone Phishing Scams Try To Fool You
      • Google is Buying Fitbit: Now What?
      • Healthy Employees Manage Digital Transformation Better
      • Privacy and Security is in WhatsApp’s DNA
      • The End of the iPhone? Apple is Planning the Next Big Thing
      • Google Wants to Do More with Chrome
  • Blog
  • Books
You are here: Home / Cyber Security / How to Protect Production Facilities Effectively in 2020

How to Protect Production Facilities Effectively in 2020

4 Ways To Defend Your Factory From Today’s Security Threats

Cyber Security Challenges: How to Protect production facilities effectively in 2020

Cyber risks are increasingly posing a threat to industrial control systems and critical infrastructures. Securing these networks is a challenge for the industry as a whole. DFI CLub offers four steps solution.
 Cyber-crime attacks cause hundreds of billions of dollars worth of damage worldwide every year.
The fact that tax systems and critical infrastructures are exposed to ever-increasing cyber risks is due, on the one hand, to the changed threat landscape with state-sponsored attackers and increasing spill-over effects and, on the other hand, to the system-inherent factors, such as long lifecycles, often 20 to 30 years Complicate protection. The assurance of these networks is a challenge for the entire industry and will certainly deal the next decade. We have been aware of the vulnerabilities for a long time, but have done little but lip service to close them.
As is well known, every journey, no matter how long and arduous, begins with a first step. Companies that have been reluctant to take action to improve the security of their Operational Technology (OT) environment can take the following four steps to help them get started.
1. Identify the threat and communicate it forcefully in your business
Some time ago, the dangers were still abstract and it would probably have been difficult to convince senior management of the risks involved. Today, given the Russian infiltration of US power plants and the highly visible effects of the ransomware campaigns WannaCry and NotPetya, this should be much easier. NotPetya alone caused hundreds of millions of dollars worth of damage and caused world-renowned companies to disrupt their production.
2. Start a project to improve the security of your ICS network
One can assume that the threats to OT environments will continue to increase. It follows that the longer you wait, the risk increases further. As we approach the fourth quarter of 2019, the time has now come to plan and reserve the budget for projects that will deliver rapid results in 2020, increasing motivation for further engagement. So first, focus on practical, effective, and short-term solutions that increase your preparedness .
3. Talk to your partners, suppliers and analysts
Meanwhile, many ICS equipment suppliers are working together with cybersecurity companies. The manufacturers of the equipment you use can help you and give you valuable information on what to focus on. Talk to colleagues, including competitors, and benefit from their experience. The time has come for a cross-company exchange, especially in view of the threat which ultimately affects everyone and which can only be countered together.
4. First, tackle the biggest challenges
The crucial basis for all further actions is to first find out which assets are actually in use. That sounds banal, and most of those responsible will say that they know exactly what devices are in their networks. However, our experience of hundreds of ICS scans speaks a different language. Ultimately, you can only protect what you know. Accurate capturing of all assets, including insights into how they communicate with each other, is therefore of paramount importance. Only those who know the normal state are able to quickly identify abnormal, conspicuous behavior, to respond accordingly and to stop the accompanying threat.
Conclusion:
These four measures should help all operators of production facilities and critical infrastructures to become more secure. Of course, they can and should be supplemented by their own requirements. Above all, it is important to put them into action. We should stop discussing whether the threat is real and finally address it before it’s too late.

Author Profile

Amram David
Amram David
Amram is a technical analyst and partner at DFI Club Research, a high-tech research and advisory firm .He has over 10 years of technical and business experience with leading high-tech companies including Huawei,Nokia,Ericsson on ICT, Semiconductor, Microelectronics Systems and embedded systems.Amram focuses on the business critical points where new technologies drive innovations.
Latest entries
  • best gaming pcAMD2022.02.22Best PreBuilt Gaming PC For Money
  • ampere_nvidia_rtx_3000AMD2022.02.01Nvidia Ampere: New GPU Generation Unveiled 2022
  • 5G2021.01.10What is The Difference between 5G and 6G?
  • online food deliveryTech Business2020.06.1610 Advantages That Apps Have Over Websites For Your Business

Trending

best gaming pc

Best PreBuilt Gaming PC For Money

ampere_nvidia_rtx_3000

Nvidia Ampere: New GPU Generation Unveiled 2022

What is The Difference between 5G and 6G?

online food delivery

10 Advantages That Apps Have Over Websites For Your Business

AI robot

Is The World Better Without AI (Artificial Intelligence)?

Pinchtype-Facebook-Reality-Labs 2020

Facebook Shows The Strangest Keyboard You Have Ever Seen

AI and Corona

AI in the First Line Of Defense Against Corona

AI in medicine 2020

What AI Means For Medicine

AI 2020

Always Question AI Systems

Top Subreddits

  • Facebook
  • Instagram
  • YouTube
  • Home
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Top Subreddits
  • About

Copyright © 2023 | DFIClub | DFICLUB:ORG IS A PARTICIPANT IN THE AMAZON SERVICES LLC ASSOCIATES PROGRAM, AN AFFILIATE ADVERTISING PROGRAM DESIGNED TO PROVIDE A MEANS FOR SITES TO EARN ADVERTISING FEES BY ADVERTISING AND LINKING TO AMAZON.COM. AMAZON, THE AMAZON LOGO, AMAZONSUPPLY, AND THE AMAZONSUPPLY LOGO ARE TRADEMARKS OF AMAZON.COM, INC. OR ITS AFFILIATES. AS AN AMAZON ASSOCIATE WE EARN AFFILIATE COMMISSIONS FROM QUALIFYING PURCHASES.