Panel Builder System Integrator

 

KymeraSeptember 24, 2018

With an IIoT network that covers the entire enterprise and has dozens of machines connected to a centralized system, you can see why it’s so tempting for cybercriminals to attempt access on your network. On the other hand, it also shows where your weaknesses are and what you can do to protect it.

During recent years, healthcare, financial service, and retail industries were more “interesting” to cyber attackers than the manufacturing industry. As business disruption and intellectual property theft emerge, more and more manufacturers are becoming victims of cybercrime.

What is Behind the Attacks?

The 2018 Verizon Data Breach Investigations Report shows us that state-sponsored attackers caused more than half of the data breaches in manufacturing, and leading motive was cyberespionage. Due to the fast convergence of OT and IT networks in these manufacturing companies, they exhibit a higher rate of cyberattack activity.

The massive loads of data were collected from January to June 2018, from millions of workloads and devices from the data center, customer cloud, and enterprise environments. They show three findings that are of most interest to cyber attackers. They are the way data is stolen from manufacturing networks, the volume of internal movement between systems, and the frequency of external remote access.

Data Exfiltration

With multiple sensors that aggregate data at the IIoT network’s gateway and send it to a cloud database, an IIoT network architecture doesn’t typically indicate a cyber attack. This data exfiltration behavior is sometimes related to other threat behaviors that can point to an assault in progress. Organizations must ensure that systems are sending data to the approved and intended external systems instead to the attackers who want to steal critical assets.

Internal Movement between Systems

There are many gateways (connected to each other for a better peer-to-peer communication) in a manufacturing network that communicate with smart machines and devices. To map out a manufacturing network and find critical assets to steal, cyber attackers use the same self-discovery used by those peer-to-peer devices. Cyber attackers can thus move laterally across the entire system until they find a way to complete their mission. That type of cyber attacker behavior is known as internal reconnaissance and lateral movement. If a higher-than-normal rate of lateral movement or malicious internal reconnaissance behavior is detected, it’s an indicator of possible attacks on the network.

External Remote Access

When an internal host device connects to an external server, it is known as external remote access. One of the most common command-and-control behaviors in manufacturing is the use of external access tools. This process is also a gateway for attackers to infiltrate a network by hijacking an external remote access connection.

What Can You Do About It?

Manufacturers used to rely on exclusive and customized protocols that made it harder for attackers to mount an attack. However, after the conversion from proprietary to standard protocols, it has made it easier for them to steal, spread, and spy. Today’s factories have Internet-enabled production lines that support remote management and data telemetry. It connects their IIoT machines to networks that rely on communication with enterprise applications and computing devices.

Systems critical for supply-chain processes and thin production lines need to have the best security access controls that can isolate a manufacturing system (however, most manufacturers don’t invest in them for economic reasons.) Real-time monitoring and network visibility are vital for identifying the earliest signs of cyber attacks in any infrastructure of this kind. Also, security analysis should be performed frequently.

Cybersecurity is today’s number one problem for organizations that rely on IoT. To enhance existing cybersecurity teams, we need to use artificial intelligence solutions to detect and respond to cyber threats faster and help stay ahead of cybercriminals.

For more information https://kymerasystems.com/

 

 

Changing Scene

  • Prev
Hammond Power Solutions (HPS) is proud to announce the release of their newly redesigned website. ...
The Canadian Apprenticeship Forum-Forum Canadien sur l’Apprentissage (CAF-FCA) has announced ...
Intertec Instrumentation is launching a range of tough field enclosures for housing remote I/O and ...
nVent Electric plc recently announced it has signed an agreement to acquire Eldon, a privately held ...
Canada continues to be an excellent performer for HARTING, recording double digit revenue growth on ...
  For the past number of months Proax Technologies Ltd. has been in discussions with ...
  Phoenix Contact Canada is pleased to announce that Roger Hallett has accepted the ...
  Machine designers are required to design safety into more industrial systems than ever. ...
Pilz Canada officially opened their Canadian Facility surrounded by Industry Partners, colleagues ...
Allied Electronics & Automation has announced the addition of the new TM Series of ...

One of Canada’s largest wastewater treatment plants at Annacis Island provides secondary treatment to approximately 175 billion litres of wastewater every year for over 1 million residents in 14 municipalities. After almost 20 years in operation, the variable frequency drives supporting the critical pumping systems for the primary treatment and secondary treatment facilities had to be replaced to ensure that the plant’s high operational availability and reliability will not be compromised in serving the plant, the surrounding municipalities and the environment. Metro Vancouver Regional District chose to deploy Rittal’s enclosure and power distribution solutions with E-plan software to efficiently support vital infrastructure improvements by reducing equipment replacement times and thereby minimizing risk to plant operations.


Emerson’s New Easy-to-deploy Monitoring Accelerates Asset Digitalization

Emerson MonitoringEmerson recently introduced the AMS Asset Monitor edge analytics device, which digitalizes essential asset data and analytics for better operations performance and improved decision making. AMS Asset Monitor provides actionable insights into essential assets that were previously monitored only with infrequent assessments. The new edge analytics device will connect with Emerson’s Plantweb Optics asset performance platform to provide key operations personnel with instant asset health details for operations and maintenance decision making. 

 

 

Read More

Printing With Precision – Improving Existing High-Speed Equipment

JAE LogoThe Scenario

A high-speed printing company had partially completed an upgrade to their equipment. The printing machine used two alternating print heads to produce units at a rate of more than 11/s. Due to the nature of the product, speed, accuracy, and repeatability were extremely important. The process needed to be consistent as any defect would impact production further down the line.

To ensure there were no errors, the units would pass through a vision system designed to detect defects and other irregularities. A mechanical reject system would then remove any defected units from the line.

Read More

Important safety considerations for machine shop equipment

OmronIf not properly safeguarded, machine shop equipment is capable of seriously injuring an operator. Lathes, band saws and other simple machines can cut or even sever a finger or a limb. Due to the major potential for harm, it’s essential for manufacturers to comply with all mandated safety standards for the types of machines they employ.

What are the standards?

To get started with machine shop equipment safety compliance, manufacturers can look up the safety standards applicable to their region. In the United States, relevant standards are sorted into the following three categories:

Read More

Cut Startup Costs and Inefficiencies with the Right MAC

RockwellBy Simon McEntee

Reduce Integration Challenges by Embedding an OEM MAC in Your Gas Processing Facility Projects

You’ve been through it before. Just days away from a scheduled plant or platform launch and you’re scrambling to connect OEM skids and at risk of missing your launch deadline.

Almost every oil and gas company has experienced the chaos that comes with trying to finish a start-up in its final days. The good news - this doesn’t have to be your status quo.

 Read More

 

Product News

  • Prev
Aluminum and copper conductors can be installed quickly, easily, and safely in the new UL-approved ...
You will be impressed by the new TRIO POWER power supplies with IP67 protection from Phoenix ...
4mm (smooth) and 5mm (M5 threaded) round photoelectric sensors are now available from ...
The NITRA pneumatic AC Series of coalescing air filters from AutomationDirect allows finer removal ...
The smallest robot controller in its class, the ultra-compact YRC1000micro minimizes installation ...
Introduced specifically for manufacturers branching out into robotics, the new Smart Series suite ...
Yaskawa Cockpit is a new software platform that monitors, accumulates and visually delivers ...
The next generation of robot programming, Smart Pendant radically changes the way a robot is ...
Ideal for high-speed assembly and handling applications, the GP7, GP8 and GP12 robots are fast, ...
Featuring power and force limiting technology, Yaskawa Motoman’s HC10 and HC10DT robots work safely ...
Kerrwil Publications

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2019 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil