Network Communications News (NCN) October 2016 | Page 21

cloud security F E AT U R E malicious intentions. However, there is a significant distinction to be made. Validated software and cloud computing providers help ensure that their cloud is protected at the physical, network, application and data layers so that their services are as resilient to attack as possible and client data remains safe. The problem arises when users store or access company data through alternative devices or consumer cloud solutions. The most common ones are personal smartphones, tablets or email addresses. Bring-your-own-device (BYOD) was an industry trend five years ago – today it is a reality. Employees everywhere use their own devices to access work emails, remote monitoring applications, CAD designs and other sensitive information. Unfortunately, this practice exponentially multiplies the risks of a cyber attack. However, manufacturers can’t afford to hide their heads in the sand and hope BYOD will go away. Your best bet is to train your employees on the best practice use of BYOD and reduce the number of devices and applications used to access company data. BYOD is not a replacement of corporate devices; it should be a controlled strategy to enable mobility. Industry standards The practice of bring-your-own-device exponentially multiplies the risks of a cyber attack. Identify and protect valuable data From intellectual property (IP) to trade secrets or critical production data, most departments in your organisation have sensitive information that could be the target of cyber attacks. The first step is to identify these valuable data assets and restrict access to them by ‘hiding’ them behind additional layers of protection and encryption. Manufacturers can protect valuable production data using industrial automation software that has comprehensive security features, such as strong encryption, secure user administration and digital file signatures to recognise bogus programs. Software that allows you to allocate password protected access to individual users is particularly beneficial because it empowers manufacturers to create individually configured access levels for different users. This means only authorised users gain access to valuable information. Best practice One of the biggest concerns many people have about cloud computing is that once data is in the cloud, it can be accessed by unauthorised users with Slowly, but surely, industry is starting to outline and implement cyber security standards to make industrial networks, devices, software, processes and data more secure. For example, the NIST Cyber Security Framework published in the US compiles leading practices from several standard bodies. There is no such thing as a foolproof formula, but NIST is a good place to start. For Industrial Automation and Control Systems (IACS), IEC-62443 offers industry guidance that allows end users, systems integrators, security practitioners and the designers and manufacturers of industrial automation and control systems to work to the s