logo
CyberVision
logo
  • Home
  • About
  • Solutions
    • WithSecure Corporate
    • F-Secure Consumer
  • Resources
    • Articles
    • Cybervision Humour
    • eBooks
    • Glossary of Terms
    • ID Theft Checker
    • Infographics
    • Local Threats
    • Useful links
    • Useful online security tips
    • Videos
    • Webinars
    • Whitepapers
  • Press
    • Newsletters
      • Cyber Security Bulletin
      • Cybervision Partner Newsletter
    • Local News
    • International News
  • Threats
  • POPIA
    • FAQ’s
    • Use RADAR to help comply
  • Contact
  • Blog
Business Security
1st March 2019 by CyberVision 0 Comments 1076 Views
1st March 2019 by CyberVision in Business Security

Cyber risk to Industrial Control Systems (ICS)

The systems we rely on most for some of the world’s most sensitive infrastructure, such as manufacturing, oil, gas and water utilities, face cyber security threats on a daily basis. We should have an understanding of the threats we face, even if we do not have all the solutions for them yet. This lack of understanding often results in a lack of visibility into industrial networks and many organisations turn a blind eye to the extensive publicity around cyber threats.

 

In many cases the ICS that control our electric grid and water distribution systems do not have advanced security sensors. Visibility into the ICS networks has always been difficult to obtain. Running anti-virus software on systems in an ICS can in fact potentially do more damage than good by marking files as malicious and deleting them. Despite everything, hacker activity has not been as easy to observe due to a lack of information obtained from these environments. In other words, there was no understanding of how the incident happened.

 

Media organisations grab attention from their audience with catchy headlines about cyber attacks against critical infrastructure. Some security companies use the media to promote their latest cyber security products when reporting on attacks and many security practitioners believe that the hype and awareness can serve as a wake-up call to the ICS community to take security seriously. Too much hype, however, can deter organisations who would otherwise take security seriously.

 

Ultimately, society needs more practitioners in the field of ICS cyber security and there needs to be more training for employees instead of being overly focused on products. Learning how to identify threats and to draw knowledge from the media will always be beneficial to companies and their employees. There are always going to be unseen hacks in the ICS community and we will no doubt begin to see a lot more of them coming to light.

0
Recommend
  • Facebook
  • Twitter
  • LinkedIN
  • Pinterest
Share
  • cyber risks
  • cyber-security
  • f-secure cyber security
  • industrial control systems
Tagged in

Categories

  • Business
  • Business Security
  • F-Secure
  • F-Secure Life
  • Home Security
  • IoT & Technology
  • Online Marketing
  • Real life
  • Tech
  • Threats & Research

Recent Posts

  • F-Secure rises to 3rd Most Attractive Company for IT Students
  • F-Secure R&D discovers exploitable vulnerability in Apple’s macOS Gatekeeper
  • VMware vulnerability puts even more pressure on organizations relying on remote work
  • The cyber security risks of working from home
  • If your company data is breached, should you pay a ransom?

Archives

  • May 2021
  • April 2021
  • December 2020
  • April 2020
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • March 2015
  • February 2015

© CyberVision PTY Ltd | 2025 | All Rights Reserved.

View our Privacy Policy and Terms of Service.

logo