Panel Builder System Integrator

 

KymeraSeptember 24, 2018

With an IIoT network that covers the entire enterprise and has dozens of machines connected to a centralized system, you can see why it’s so tempting for cybercriminals to attempt access on your network. On the other hand, it also shows where your weaknesses are and what you can do to protect it.

During recent years, healthcare, financial service, and retail industries were more “interesting” to cyber attackers than the manufacturing industry. As business disruption and intellectual property theft emerge, more and more manufacturers are becoming victims of cybercrime.

What is Behind the Attacks?

The 2018 Verizon Data Breach Investigations Report shows us that state-sponsored attackers caused more than half of the data breaches in manufacturing, and leading motive was cyberespionage. Due to the fast convergence of OT and IT networks in these manufacturing companies, they exhibit a higher rate of cyberattack activity.

The massive loads of data were collected from January to June 2018, from millions of workloads and devices from the data center, customer cloud, and enterprise environments. They show three findings that are of most interest to cyber attackers. They are the way data is stolen from manufacturing networks, the volume of internal movement between systems, and the frequency of external remote access.

Data Exfiltration

With multiple sensors that aggregate data at the IIoT network’s gateway and send it to a cloud database, an IIoT network architecture doesn’t typically indicate a cyber attack. This data exfiltration behavior is sometimes related to other threat behaviors that can point to an assault in progress. Organizations must ensure that systems are sending data to the approved and intended external systems instead to the attackers who want to steal critical assets.

Internal Movement between Systems

There are many gateways (connected to each other for a better peer-to-peer communication) in a manufacturing network that communicate with smart machines and devices. To map out a manufacturing network and find critical assets to steal, cyber attackers use the same self-discovery used by those peer-to-peer devices. Cyber attackers can thus move laterally across the entire system until they find a way to complete their mission. That type of cyber attacker behavior is known as internal reconnaissance and lateral movement. If a higher-than-normal rate of lateral movement or malicious internal reconnaissance behavior is detected, it’s an indicator of possible attacks on the network.

External Remote Access

When an internal host device connects to an external server, it is known as external remote access. One of the most common command-and-control behaviors in manufacturing is the use of external access tools. This process is also a gateway for attackers to infiltrate a network by hijacking an external remote access connection.

What Can You Do About It?

Manufacturers used to rely on exclusive and customized protocols that made it harder for attackers to mount an attack. However, after the conversion from proprietary to standard protocols, it has made it easier for them to steal, spread, and spy. Today’s factories have Internet-enabled production lines that support remote management and data telemetry. It connects their IIoT machines to networks that rely on communication with enterprise applications and computing devices.

Systems critical for supply-chain processes and thin production lines need to have the best security access controls that can isolate a manufacturing system (however, most manufacturers don’t invest in them for economic reasons.) Real-time monitoring and network visibility are vital for identifying the earliest signs of cyber attacks in any infrastructure of this kind. Also, security analysis should be performed frequently.

Cybersecurity is today’s number one problem for organizations that rely on IoT. To enhance existing cybersecurity teams, we need to use artificial intelligence solutions to detect and respond to cyber threats faster and help stay ahead of cybercriminals.

For more information https://kymerasystems.com/

 

 

Changing Scene

  • Prev
  The IoT technology shift is impacting a wide range of industries.  Along with this ...
  Brent Raynor, Sales Manager at Manufacturers Automation Inc., is pleased to announce that ...
  Autopro is very pleased to welcome new faces to our Calgary office. We are looking ...
  Graybar Canada is pleased to announce the  ...
  Emerson today announced the launch of Location Awareness, a new offering in its ...
  The new version of EPLAN Smart Wiring improves the process of wiring control cabinets ...
  ABB announced that, effective today, the Thomas & Betts Corporation will begin doing ...
  At its annual sales conference, automation solutions pioneer Omron honored four of its ...
  The ISA/IEC 62443 series of standards, developed by the ISA99 committee as American ...

 

6 FAQs about HARTING Connectors on UL 508A Panels

Harting-PBSI-Mar28-ADVERTORIAL-6-FAQs-UL-508A_Ad_0078_Kerrwil_175x120_FEB2018 (004).jpg

Using connectors on UL 508A cabinets used to be a huge hassle for the panel-builder. As a result, they often chose the older hardwiring solution in the past. Now, HARTING, in partnership with UL, has made it possible to easily connectorize UL 508A panels with existing HARTING products. Get the asnwers for the six FAQs HERE.

 

 

 

Kymera

With an IIoT network that covers the entire enterprise and has dozens of machines connected to a centralized system, you can see why it’s so tempting for cybercriminals to attempt access on your network. On the other hand, it also shows where your weaknesses are and what you can do to protect it.

During recent years, healthcare, financial service, and retail industries were more “interesting” to cyber attackers than the manufacturing industry. As business disruption and intellectual property theft emerge, more and more manufacturers are becoming victims of cybercrime.

What is Behind the Attacks?

Read More

 

Tools for the Trade

  • Prev
  The new Crimpfox DUO 10 crimping pliers from Phoenix Contact are perfect  when ...
  As easy as pick, slip and apply!  This intuitive multi-tool is designed to help ...
  Strong Hand Tools®, manufacturer of innovative Strong Hand Tools® Welding Clamps, ...
  Strong Hand Tools®, manufacturer of innovative Strong Hand Tools® Welding Clamps, ...
  Keeping your bins full just got a lot easier – and a lot faster. Each IRWIN ...
Using connectors on UL 508A cabinets used to be a huge hassle for the panel-builder. As a result, ...
  Delta Controls launches support page for CP2000 variable frequency drives and bypass ...
  ABB Automation Builder is the integrated software suite for machine builders and system ...
  Eaton's Power Xpert Branch Circuit Monitor (PXBCM) provides remote access to live energy ...
  The Fluke 438-II Power Quality and Motor Analyzer adds key mechanical measurement ...

Peers & Profiles

  • Prev
  Few industrial innovations have weathered the years as well as heavy duty connectors. ...
As our population grows and consumers continue to rely on technology for both essentials and ...
  Engineers play a key role in the advancement of our infrastructure and the development ...
  Kymera Systems is located in Leduc, Alberta and provides scalable IIoT solutions and the ...
  JAE Automation is proof positive that a cutting-edge, high-tech company can work with ...
  Nivek Automatisation is a forward-thinking company focused on providing advanced ...
Recently Panel Builder & Systems Integrator was invited to Rittal Canada’s Head ...
  New Electric first opened its doors in 1970, in Burlington, Ontario. The electrical ...
  Changes are coming hard and fast to the control and automation sectors, obligating a rise ...
  OPUS Automation was founded in 1998 in Ancaster, On and provides robotic and automation ...

 

Siemens is setting the course for long-term value creation through accelerated growth and stronger profitability with a simplified and leaner company structure. The main aim of the Vision 2020+ company strategy is to give Siemens' individual businesses significantly more entrepreneurial freedom under the strong Siemens brand in order to sharpen their focus on their respective markets. Plans also call for strengthening the company's growth portfolio through investments in new growth fields such as IoT integration services, distributed energy management and infrastructure solutions for electric mobility.

Read More

 

Linear Transfer

From Modular Enclosures to Energy-Saving Cooling Systems, Rittal & Linear lead the way!

Linear, part of The Flodraulic Group of companies, is the world’s leading supplier of specialized press transfer automation solutions, backed by world class 24/7 support from many global locations.  In order to provide world-class service to their international clients, including 5 of the global top 10 automotive OEMs, global appliance and HVAC manufacturers, Linear has established service and support center in all regions where their equipment is installed.

Read More

 

 

Product News

  • Prev
  Despite automated solutions, switchgear manufacturing still involves a great deal of ...
Pilz is launching a new generation of field level devices with the decentralised I/O system ...
  Our service robotics modules give you an easy start in robotics. Assemble ...
  SecuriTEST IP is an installation and troubleshooting tester for digital/IP, HD coax and ...
  Like all EVO housings, the M1 single-module housings also feature a swivel cable gland ...
  For example, set up potential distributions consisting of CLIPLINE complete terminal ...
  HARTING is driving the development of the standardisation of the new Single Pair Ethernet ...
  Industry-leading automation solutions provider Omron Automation Americas recently ...
  With their compact and uniform design, the splice boxes provide ample interior space for ...
   Eaton’s SmartWire-DT is the intelligent machine wiring solution that reduces ...
Kerrwil Publications

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2018 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil