Network Communications News (NCN) October 2016 | Page 20

F E AT U R E cloud security Cloud cover You wouldn’t allow an intruder to spend 229 days in your house undetected, so why would you do that with your manufacturing facility? As incredible as that sounds, the average time between a cyber security breach and its detection is 229 days. Manufacturing facilities are leading the list of potential targets for cyber espionage, denial of service (DoS) and web application attacks. Here, Martyn Williams of Copa-Data UK, discusses three steps manufacturers should take to stay safe in the cloud. A s the manufacturing sector moves towards industrial automation, the Internet of Things (IoT) and the cloud, the number and nature of cyber threats is also growing. A decade ago, user security was the IT department’s responsibility. Connected devices, the collapse of traditional industrial automation architecture and the move to the cloud means cyber security needs to take centre stage in any manufacturing facility. Hackers traditionally targeted the IT and enterprise systems, but now manufacturers are seeing the same threats on their production lines, sensors, PLCs and SCADA systems. Traditional security focused on passive defence, but increasingly advanced attacks require a different approach. The one thing manufacturers need to understand is that any industrial automation system today is vulnerable to cyber attacks. The only way of taking advantage of the benefits of IoT and the cloud is to stay vigilant and use industry best practice. Industrial security is no longer the IT department’s concern, but a 24/7 job for everyone, including those in the boardroom. 20 20-21 Cloud Security – Copa Data.indd 20 03/10/2016 12:19