Electronic Products & Technology

Manufacturers / OEMs under cyberattacks

July 31, 2021  EP&T Magazine

According to U.S.-based cybersecurity firm Onclave Networks, more than 40% of manufacturing firms suffering a cyberattack last year. In addition, the company says ransomware attacks have increased 158% increase in North America (62% globally) since 2019.

As a result, the firm recommends manufacturers adopt the Zero Trust Architecture and security guidelines supported by the U.S. National Security Agency (NSA), the Biden Administration executive order 14028 and National Institute of Standards Technology (NIST) SP 800-207 Cybersecurity Framework.

Source: Onclave Networks

The goal of a Zero Trust framework deployed in an enterprise is to verify trust in people, devices, systems and networks before engaging/interacting with them – and continuously verify that trust to ensure nothing is compromised. It changes the old saying of ‘trust, but verify’ to ‘never trust, and always verify’ and that any request for network access must be continuously authorized.

“Most of the IT security methods that manufacturers have relied on for years are not designed to identify or protect Operational Technology,” said Onclave Networks CEO, Don Stroberg. “Manufacturers need to be aware that layering IT solutions on top of one another is not adequate protection for these IoT, IIoT and ICS systems and devices.”



Print this page

Related Stories

1 Comment » for Manufacturers / OEMs under cyberattacks
  1. And such are the issues of everybody connected to everybody. In our efforts to streamline how businesses react with each other using the internet businesses leave themselves wide open to attack. Don’t want to get hacked, take all your company and connect them on an internal air gapped network that has no connection to the internet, no wireless or hard wire connections and if possible with it’s own independent power source. My rule of thumb is, so long as someone has access then someone can hack your system. Maybe those old paper based systems were better as no one can hack a piece of paper remotely.

Leave a Reply

Your email address will not be published. Required fields are marked *