A survey of nearly 4000 IT managers across 27 countries, conducted by
Malware was the most common cause of data-loss incidents for manufacturers, although other types of cyber-incidents - including software vulnerabilities, theft of mobile devices, network intrusion, etc. - were also cited as sources of intellectual property leakage.
In a highly competitive global economy, businesses rise to leadership or sink into bankruptcy on very slim profit margins. Most often, a business' most decisive advantage comes in the form of research and development insight or a proprietary high-tech solution, which, in the case of manufacturers, can help businesses produce items more efficiently than their competitors. If a competitor is able to obtain this insight, especially without incurring the initial R&D costs, then that competitor now has a significant business advantage.
The manufacturing industry clearly understands the importance of securing its intellectual property. The survey found that manufacturers ranked "Internal Operational Information" and "Intellectual Property" as the two types of non-financial data they fear losing the most. Interestingly, manufacturers ranked the fear of losing "Customer/Client Information" the lowest out of all business segments, most likely because manufacturing facilities are less likely to store this information in the first place.
When asked about the cause of their most serious data-loss event within the past 12 months, "Malware" was the most common cause, cited by 23% of manufacturers. Manufacturers also reported other sources of incidents leading to data loss, including "Software Vulnerabilities" (8%), "Network Intrusion" (8%), "Information Leaked on Mobile Devices" (5%), and "Targeted Attacks" (3%).
It also offers the Kaspersky Industrial Protection Simulation to help organisations train for cyber-attacks that could affect the infrastructure of their facility.
In general, organisations should pay attention to the following protection technologies for Industrial Control Systems environments:
- Proactive protection against unknown malicious programmes and automatic protection against exploits. The technology scans executable programmes, assessing the security of each application by monitoring its activities when in operation;
- Default-deny as a standard policy. In this mode, Industrial Control Systems work in a protected environment, which only allows programs to run that are required for the technological process to function. All unknown and unwanted applications, including malicious programs, are blocked. Thus, a secure running environment is created with minimum load on system resources;
- "Device Control" technology to manage removable devices (USB storages, GPRS modems, smartphones, USB network cards) and create limited lists of permitted devices and the users who can access them;
- An all-in-one IT Security Console helps IT managers to monitor and control all solutions to ensure IT security; and
- Integration with security information and event management (SIEM).
All rights reserved.
Most Popular Stories
- Rackspace Ends Talks About Possible Acquisition
- Mercedes Rolls Out S550 Plug-in Hybrid
- Missouri GM Plant Adding 750 jobs
- Poverty Rate Drops for First Time Since 2006
- Cedeno Named USHCC Businessman of the Year
- Aaron Hernandez: I Felt Helpless to Refuse Police
- Kohl's Hiring 67,000 for the Holidays
- Can Kobach Keep Taylor's Name on Ballot?
- Family Dollar Spurning Bid From Dollar General
- Anheuser-Busch, Visa Voice NFL Disapproval