Panel Builder System Integrator

 

KymeraSeptember 24, 2018

With an IIoT network that covers the entire enterprise and has dozens of machines connected to a centralized system, you can see why it’s so tempting for cybercriminals to attempt access on your network. On the other hand, it also shows where your weaknesses are and what you can do to protect it.

During recent years, healthcare, financial service, and retail industries were more “interesting” to cyber attackers than the manufacturing industry. As business disruption and intellectual property theft emerge, more and more manufacturers are becoming victims of cybercrime.

What is Behind the Attacks?

The 2018 Verizon Data Breach Investigations Report shows us that state-sponsored attackers caused more than half of the data breaches in manufacturing, and leading motive was cyberespionage. Due to the fast convergence of OT and IT networks in these manufacturing companies, they exhibit a higher rate of cyberattack activity.

The massive loads of data were collected from January to June 2018, from millions of workloads and devices from the data center, customer cloud, and enterprise environments. They show three findings that are of most interest to cyber attackers. They are the way data is stolen from manufacturing networks, the volume of internal movement between systems, and the frequency of external remote access.

Data Exfiltration

With multiple sensors that aggregate data at the IIoT network’s gateway and send it to a cloud database, an IIoT network architecture doesn’t typically indicate a cyber attack. This data exfiltration behavior is sometimes related to other threat behaviors that can point to an assault in progress. Organizations must ensure that systems are sending data to the approved and intended external systems instead to the attackers who want to steal critical assets.

Internal Movement between Systems

There are many gateways (connected to each other for a better peer-to-peer communication) in a manufacturing network that communicate with smart machines and devices. To map out a manufacturing network and find critical assets to steal, cyber attackers use the same self-discovery used by those peer-to-peer devices. Cyber attackers can thus move laterally across the entire system until they find a way to complete their mission. That type of cyber attacker behavior is known as internal reconnaissance and lateral movement. If a higher-than-normal rate of lateral movement or malicious internal reconnaissance behavior is detected, it’s an indicator of possible attacks on the network.

External Remote Access

When an internal host device connects to an external server, it is known as external remote access. One of the most common command-and-control behaviors in manufacturing is the use of external access tools. This process is also a gateway for attackers to infiltrate a network by hijacking an external remote access connection.

What Can You Do About It?

Manufacturers used to rely on exclusive and customized protocols that made it harder for attackers to mount an attack. However, after the conversion from proprietary to standard protocols, it has made it easier for them to steal, spread, and spy. Today’s factories have Internet-enabled production lines that support remote management and data telemetry. It connects their IIoT machines to networks that rely on communication with enterprise applications and computing devices.

Systems critical for supply-chain processes and thin production lines need to have the best security access controls that can isolate a manufacturing system (however, most manufacturers don’t invest in them for economic reasons.) Real-time monitoring and network visibility are vital for identifying the earliest signs of cyber attacks in any infrastructure of this kind. Also, security analysis should be performed frequently.

Cybersecurity is today’s number one problem for organizations that rely on IoT. To enhance existing cybersecurity teams, we need to use artificial intelligence solutions to detect and respond to cyber threats faster and help stay ahead of cybercriminals.

For more information https://kymerasystems.com/

 

 

Changing Scene

  • Prev
JMP Solutions and Control Station are joining forces to provide process and control loop audit ...
JMP Solutions is helping in the fight against COVID-19 by contributing its manufacturing and ...
  With Rittal celebrating 25 years in Canada in 2020, and Franklin Empire shaping the ...
Pilz will be hosting several conferences for their 2020 Virtual Trade Show starting on Tuesday May ...
Koch Engineered Solutions (KES), a unit of Koch Industries Inc., recently announced it has acquired ...
Festo Canada is pleased to announce Electrozad, the largest independently owned electrical ...
Littelfuse, Inc., a global manufacturer of technologies in circuit protection, power control and ...
Allied Electronics & Automation has added more trusted suppliers to its 300-strong network, ...
Rockwell Automation announced that it has signed an agreement to acquire privately held Avnet Data ...

RS Components Launches New Season of the DesignSpark Podcast Tackling Technology With a Comedy Twist

RS Components DesignSpark PodcastRS Components (RS), a global multi-channel provider of industrial and electronic products and solutions, has released a new series of its popular ‘DesignSpark Podcast’ which explores some of the hottest topics in technology through a mix of fun facts, exuberant stand-up, outlandish sketches and foot-tapping songs. The podcast offers educational information on each technology topic, with an entertaining comedy angle.

The new weekly podcast is co-hosted by technology expert Professor Lucy Rogers PhD – former judge on BBC’s Robot Wars and a DesignSpark blogger – alongside award-winning comedians Bec Hill and Harriet Braine.

Read More

 

Module_Divider.png

JMP Solutions and Control Station Announce Exclusive Collaboration Focused on Optimizing Manufacturing Output and Efficiency

JMP SolutionsJMP Solutions and Control Station are joining forces to provide process and control loop audit services for manufacturing environments in order to identify and optimize problematic and underperforming control loops. The partnership leverages the complementary skillsets of JMP’s expert process engineering and project management competency combined with Control Station’s proprietary process analytics platform which, will work in synergy to identify and correct PID loop related sources of inefficiency and sub-optimal performance.

Read More

 

Module_Divider.png


Proax Is Now a Distributor of HIWIN

PB-34-Proax-HIWINLogo-400.jpgProax are pleased to announce that they are now a distributor of the HIWIN product line, a leader in motion control and system technology. Their product offer includes linear guideways, ballscrews, actuators, linear motors, torque motors & rotary tables, crossed roller bearings and more. This addition comes in line with the enhanced mechanical team and product offering announced last year by Proax. This newly added line will be available to all Proax's clients throughout Canada since this is going to be implemented on a national level.

Read More

Cybersecurity and Manufacturing – Keeping Critical Information Safe From Attackers

JAE AutomationWe all know that we’re supposed to back up our data and secure our devices against attack. But too often we put it off until it’s too late. We’re busy, and we’ll get to it another day. And then, one day, we turn on our device, look for a file, and realize something is wrong. We’ve been hacked.

The thought of losing our files, pictures, and data is scary. Scale that up to an entire company and the consequences can be severe. Think about the amount of critical and sensitive information the typical manufacturing facility has access to. Sensitive customer records, design and engineering data, intellectual property, and industrial control systems for high risk manufacturing processes – there’s a lot to lose. 

Read More

 

Module_Divider.png

Phoenix Contact Control Cabinet Classroom Ep. 6: How to Determine Supplementary vs. Branch Circuit Breakers

Phoenix Contact Control CabinetSometimes it can be difficult to distinguish between types of circuit breakers, especially since in appearance they look so similar. In this episode, the focus will be on the differences between two types of circuit breakers: Branch and Supplementary.

In the Control Cabinet Classroom video series, Phoenix Contact Product Specialists Zach and Karen break down some of the basics of control cabinet design, terminology and technology to be able to better understand and utilize this powerful solution.

 

 

Read More

Product News

  • Prev
Pulse Frequency Modulation (PFM) is a way to digitally represent an analog measurement value from a ...
Manufacturers Automation Inc. introduces the new SDS-3008 Smart Switch, featuring a compact and ...
A new range of pressure transmitters designed to meet key requirements in most manufacturing and ...
Parker Hannifin, a global provider in motion and control technologies, has extended its Parker ...
Hammond Manufacturing has announced its 1597DIN family of UL94-V0 flame-retardant plastic ...
Phoenix Contact, Quectel and Ericsson have worked together to develop and deploy the first ...
Sensor manufacturer POSITAL has introduced an inexpensive and flexible alternative for ...
Eight well-known manufacturers established on the market for M12 connectors ­– Phoenix Contact, ...
The AutomationDirect Productivity2000® PLC is a modular, rack-based system with a full lineup of ...
FANUC America, an automation solutions provider, is offering a free trial version of CNC GUIDE – ...
Kerrwil Publications Great Place to Work. Certified December 2019 - December 2020

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2020 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil