It can happen to you – NU, Indegy discuss threats to industrial control systems and how to protect OT infrastructure
Cyber criminals have proven that they are more than ready to strike critical infrastructure, with potential examples of cyber attacks ranging from power facilities, transport systems and manufacturing plants, to water treatment facilities and defence systems coming to the fore.
It is clear that the chances of a cyber-related operational breakdown are higher than ever before, meaning the time to broaden our understanding of relevant cyber security issues for industrial control systems and operational technology (OT) is now – we need to realise that it can happen to us, and know how to take the necessary steps to prevent these compromises.
This is according to Barak Perelman, CEO and co-founder of Indegy, a leader in industrial cyber security that protects industrial control system networks from cyber threats, human error and malicious insiders. Indegy solutions are now brought to South Africa and throughout Africa by African value-added distributor, Networks Unlimited Africa.
Perelman explains: “Indegy undertakes to protect industrial control systems from external cyber threats, malicious insiders and human error, and all three areas of protection are just as important to our users. People are very used to thinking about the possibility of external cyber threats, and yet we have found that the most common cyber incidents come from within an organisation. These, in turn, can be broken down into the malicious attack, and operational breakdowns caused by human error. Of these, human error is the most common – we are aware that industrial systems often use old technology, and this allows more room for mistakes. As far as intentional insider threats are considered, reasons for these can range from disgruntled employees or former staff members with an axe to grind, to people wanting to earn overtime and setting up the system for failure in order to return for additional work, and thus extra payment.
“External threats, including malware, are, in our experience, the least common cyber threat to industrial infrastructure, but they bring the most risk potential. Human errors, which bring more delicate system failures, usually result in shorter downtime than external threats. In comparison, a well-planned cyber attack will usually cause a lot more damage, which can include physical damages, financial costs and reputational threats to the business.”
Stefan van de Giessen, General Manager: Cybersecurity at Networks Unlimited Africa, adds: “In the past decade or so, factors such as the rapid introduction of the industrial Internet of things (IIOT) connectivity across production and supply lines, and the way in which OT is automating the modern world, have opened up new vulnerabilities for industrial infrastructure. With the boundaries between IT and OT blurring, industrial infrastructure operations are now no longer standalone operations, but part of the connected, online world. These new vulnerabilities to both cyber attack and also cyber error mean, in turn, that cyber security has become critical for these systems."
“Many industrial operations are running on old control systems and are very vulnerable to today’s cyber criminals,” warns Perelman. “I believe there are two main reasons why industrial technology operators are not paying more attention to cyber security, and these are a lack of knowledge and education around the risk to critical infrastructures, as well as the rapid pace of change.
“The cyber risk to critical infrastructure is a relatively new challenge. If we look at the situation five to 10 years ago, many of these systems were completely disconnected from the outside world – IOT technology was not yet in play and the systems were limited to operation within the company’s network. With the rapid pace of change, security operators did not always give much thought to cyber implications, and were unaware of the growing risks. This has begun changing in recent years and OT security operators now understand that their operational technologies are connected to the operation’s IT systems or main network.”
Perelman also extends a cautionary note to sovereign states, noting: “Education is key. Governments need to make sure that those in charge of industrial infrastructure in their countries are aware of the evolution of the cyber threat landscape. Criminals today are no longer just targeting financial services – the 2015 attack in the Ukraine, when hackers took control of the country’s power grid and plunged over 225 000 homes and businesses into darkness for hours, is proof of this.
“The attack was widely regarded as being the first example of hackers shutting off critical energy systems, and was followed a year later by another attack that cut power to hundreds of thousands of residents in the country’s capital, Kiev. Governments therefore need to encourage the adoption of new knowledge in order to protect their power and water supplies, oil and gas operations, manufacturing plants, transport systems and so on.”
He believes that Africa, as a region, is quite vulnerable to critical industry attack, explaining: “Africa overall shows very fast adoption rates of new technology. This integration of new technology means that older facilities – once outside the reach of the Internet and the world – are now open to threat. While Internet-enabled communications allow for remote access and more efficiencies, the core message is the same: the risk is increased. We therefore need to bear this in mind.“
Indegy chose to partner with Networks Unlimited Africa to bring its solutions into sub-Saharan Africa because it has found in Networks Unlimited Africa a local partner that is familiar with the region and its best business practices across several key industrial markets.
Indegy was also impressed with the company’s approach, which is not only about cyber security, but also about guiding end-users through the entire IT life cycle, including digital adoption. Networks Unlimited Africa is a partner that understands the entire landscape.
Perelman extends a reminder that attitudes need to change. “People too often believe that ‘it won’t happen to us' – but it can. The world is used to thinking about the classic external cyber attack, and yet, when we ask our customers: ‘When did you last experience downtime because of a person?’ we find that everyone has an incident to report within the past year or so, due to human error. Cyber security for operational technology is not only about external attacks, but also about insider threats and human error. OT operators, companies and governments need to understand the necessity of adopting the correct cyber security tools in order to holistically cover all eventualities,” he concludes.
Indegy, a leader in industrial cyber security, protects industrial control system (ICS) networks from cyber threats, malicious insiders and human error. The Indegy Industrial Cybersecurity Suite is powered by patented technology that arms security and operations teams with full visibility, security and control of ICS activity and threats by combining hybrid, policy-based monitoring and network anomaly detection with unique device integrity checks. Indegy solutions are installed in manufacturing, pharmaceutical, energy, water and other industrial organisations around the world.
Networks Unlimited Africa
Networks Unlimited Africa is a value-added distributor, offering the best and latest solutions within the converged technology, data centre, networking, and security landscapes. The company distributes best-of-breed products, including Altaro, Attivo Networks, Carbon Black, Cofense, Fortinet, F5, Hitachi Vantara, Indegy, Mellanox Technologies, NETSCOUT, NETSCOUT ARBOR, ProLabs, RSA, Rubrik, SevOne, Silver Peak, Tintri by DDN and Uplogix. The product portfolio provides solutions from the edge to the data centre, and addresses key areas such as cloud networking and integration, WAN optimisation, application performance management, application delivery networking, Wi-Fi-, mobile- and networking security, load balancing, data centre in-a-box, and storage for virtual machines.
Since its formation in 1994, Networks Unlimited Africa has continually adapted to today's progressively competitive and evolving marketplace, and has reaped the benefits by being a leading value-added distributor (VAD) within the Sub-Saharan Africa market.