Jack O'Sullivan
March 22 2021
Are you taking steps to protect your ICS?
Industrial Control Systems (ICS) have been a prized target for attackers ever since Stuxnet hit the headlines back in 2009. Since then the threat has continued to grow, attacks have become more sophisticated and it’s only a matter of time before another critical industrial system is compromised.
Whether you’re operating a food production line or a nuclear energy plant, no industrial system is immune. The potential consequences of an attack go beyond monetary loss and reputation, there’s a physical impact and lives are potentially at risk.
But are you taking security seriously?
According to a recent global study by antivirus provider Kaspersky, 54% of the sampled organisations have experienced at least one ICS security incident in the last 12 months. ICS professionals who took part in the study also explained that they did not have sufficient plans in place to deal with them.
The need for action is clear, yet we continue to see organisations failing to put in place the necessary security measures. And even if they do, they often lack the robustness required.
So, why is this the case? For many organisations it’s the fear of downtime that is stopping them from assessing their ICS security. Take for example car manufacturers: in 2005 a survey showed that just one minute of unplanned downtime would cost as much as $22,000. With costs like these it’s no wonder companies don’t want to do anything to jeopardise critical operations, and that includes implementing security measures.
Overcoming such barriers is essential in protecting your critical systems and security inaction is simply no longer an option. But where do you start and how do you go about it?
This is where our guide comes in, giving you seven practical steps to help improve your security and protect your all-important industrial control systems.
Step 1: Map your network
When it comes to industrial systems the stakes are even higher and you certainly don’t want your first Board conversation about ICS security to be after a breach. But for many, getting upper management level support can often be the biggest obstacle to any security improvement.
Education is the key and the onus is on ICS managers to translate key technical information in a way that is clear, digestible and easy to understand. An up-to-date network map can assist in this and can provide upper management with a tangible view of security concerns, risks and threats. It’s also important to share any recent news on cyber-attacks, as this is a good way to explain the scale of impact that poor system security can have.
Whatever way you choose, you need to ensure that the Board are fully aware of the potential risks the company is facing and the consequences of security inaction.