Home » today » Business » How companies effectively secure IIoT systems

How companies effectively secure IIoT systems

Eight rules from Microsoft How companies effectively secure IIoT systems

Author / Editor: Martin Hensel / Nico Litzel-

On the occasion of the European Month of Cybersecurity, Microsoft points out that the threats to the IT world have long since reached machines and systems in industry. Eight rules are supposed to ensure more safety.

Companies on the topic

Melanie Weber, Industry Executive – Chemical, Pharma & Life Science Industry von Microsoft

(Image: Microsoft)

In a detailed Blog post Melanie Weber, Industry Executive – Chemical, Pharma & Life Science Industry, explains what the threat situation is all about and how the security level can be increased. For example, increasing networking via the Internet of Things (IoT) and the use of digital tools create additional opportunities for attacks on industrial plants. Often this so-called operational technology is less protected than IT infrastructures.

Weber cites the attack on the largest gasoline pipeline in the United States in May as an example. A hacker attack led to a temporary shutdown of the Colonial Pipeline, which resulted in supply bottlenecks and panic buying at gas stations. The system only went back into operation after a ransom had been paid.

More and more targeted attacks

Such attacks on industrial plants are increasing in frequency and strength and are intended to specifically disrupt the value chains of companies. This is favored, among other things, by a growing number of industrial IoT devices, the increasing networking of operational technology and IT, and complex supply chains with a large number of different systems.

There is no easy way out of this, as Weber emphasizes. In her blog post she names eight rules with which companies can counter such threats. These include, among other things, the protection of software development systems, the physical security of the system as well as trust management, monitoring and zero trust. Overall, however, the topic remains a strategic management task that no company can avoid.

(ID:47766476)

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.