+ INFORMATION

Share on social networks!

Industrial cybersecurity, child's play for cybercriminals

According to the report on computer security of the American business sector Claroty, the 90% of the vulnerabilities detected so far this year are of low complexity, this means that many special conditions are not needed to open a breach.

Cybersecurity report

This report is an important resource for CISO, IT, and OT managers as it represents a comprehensive examination of the latest ICS vulnerabilities, where bugs have been found and fixed, who is finding them, and what it means for industrial companies in the future. future.

It also points out that the 71% of these vulnerabilities are of high or critical risk, which could cause great damage to the company, and even the total or partial paralysis of its activity. A clear example of this was what happened to the American company Colonial Pipeline, where the cyberattack caused the company to temporarily paralyze all pipeline operations as a precaution. Furthermore, we can read that their 66% does not require human intervention to open a breach.

One of the most worrying data collected by the study is that for 26%, of all those vulnerabilities detected in 2021, there is no solution, as of today, only a patch that partially fixes it.

“Systems are exposed online like never before, and with them, all their imperfections: unpatched vulnerabilities, unsecured credentials, weak configurations, and outdated industry protocols”, we can read in the report.

Claroty details that the vulnerabilities that are most repeated are those related to operations management (23.5% of the total), basic control of devices such as sensors or pumps (15.2%) and supervisory control (14.8%).

The company Claroty has detected a total of 637 vulnerabilities in industrial control systems in the first half of 2021 and indicates that cyberattacks have increased by 41% compared to the first half of 2020, the majority due to ransomware and warns that The risks of suffering cyber attacks increase as the degree of digitalization and presence of systems in the cloud increase.

The way to try to solve these vulnerabilities finally compromising the company's system and data is clear, the report indicates that prevention with periodic risk analysis, network segmentation and data encryption, both at rest and in transit, among other measures.

And you, how would you solve cybersecurity in the industry sector?

To become a Cybersecurity expert, the Master in Cybersecurity Management, Ethical Hacking and Security Offensive is the formation you need.

Subscribe to our newsletter to stay up to date with all the news

EIP International Business School informs you that the data in this form will be processed by Mainjobs Internacional Educativa y Tecnológica, SA as the person responsible for this website. The purpose of collecting and processing personal data is to respond to the query made as well as to send information about the services of the data controller. Legitimation is the consent of the interested party.
You can exercise your rights of access, rectification, limitation and deletion of data in compliance@grupomainjobs.com as well as the right to file a claim with the supervisory authority. You can consult additional and detailed information on Data Protection in the Privacy Policy that you will find in our Web page
Master Cybersecurity Professional Master

Leave a comment