• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • Home
  • Subscribe
  • Your Membership
    • Edit Your Profile
  • Services
    • Advertising
    • Case studies
    • Design
    • Email marketing
    • Lead generation
    • Magazine
    • Press releases
    • Publishing
    • Sponsored posts
    • Webcasting
    • Webinars
    • White papers
    • Writing
  • Shop
    • My Account
    • Cart
  • About
    • Contact
    • Privacy
    • Terms of use
  • Events

Robotics & Automation News

Market trends and business perspectives

  • News
  • Features
  • Video
  • Webinars
  • White papers
  • Press releases
  • Featured companies
    • AMD Xilinx
    • BlueBotics
    • Elite Robot
    • RGo Robotics
    • SICK Sensor Intelligence
    • Vicor Power
copa-data Automotive_Bodyshop

Protecting connected manufacturing: Three steps to industrial internet security

August 31, 2016 by Sam Francis

copa-data Automotive_Bodyshop

Martyn Williams, managing director of industrial automation software supplier, Copa-Data UK, discusses three steps manufacturers should take to stay safe in the cloud

You wouldn’t allow an intruder to spend 229 days in your house undetected, so why would you do that with your manufacturing facility?

As incredible as that sounds, the average time between a cyber security breach and its detection is 229 days. Manufacturing facilities are leading the list of potential targets for cyber espionage, denial of service (DoS) and web-application attacks.

As the manufacturing sector moves towards industrial automation, the Internet of Things (IoT) and the cloud, the number and nature of cyber threats is also growing. A decade ago, user security was the IT department’s responsibility. 

Martyn Williams, managing director of Copa-Data UK
Martyn Williams, managing director of Copa-Data UK

Connected devices, the collapse of traditional industrial automation architecture and the move to the cloud means cyber security needs to take centre stage in any manufacturing facility.

Hackers traditionally targeted the IT and enterprise systems, but now manufacturers are seeing the same threats on their production lines, sensors, PLCs and SCADA systems. Traditional security focussed on passive defence, but increasingly advanced attacks require a different approach.

The one thing manufacturers need to understand is that any industrial automation system today is vulnerable to cyber attacks. The only way of taking advantage of the benefits of IoT and the cloud is to stay vigilant and use industry best practice.

Industrial security is no longer the IT department’s concern, but a 24/7 job for everyone, including those in the boardroom.

Identify and protect valuable data

From intellectual property (IP) to trade secrets or critical production data, most departments in your organisation have sensitive information that could be the target of cyber-attacks.

The first step is to identify these valuable data assets and restrict access to them by “hiding” them behind additional layers of protection and encryption.

Manufacturers can protect valuable production data using industrial automation software that has comprehensive security features, such as strong encryption, secure user administration and digital file signatures to recognise bogus programs.

Software that allows you to allocate password-protected access to individual users is particularly beneficial because it empowers manufacturers to create individually configured access levels for different users. This means only authorised users gain access to valuable information.

Best practice

One of the biggest concerns many people have about cloud computing is that once data is in the cloud, it can be accessed by unauthorised users with malicious intentions. However, there is a significant distinction to be made.

Validated software and cloud computing providers help ensure that their cloud is protected at the physical, network, application and data layers so that their services are as resilient to attack as possible and client data remains safe.

The problem arises when users store or access company data through alternative devices or consumer cloud solutions. The most common ones are personal smart phones, tablets or e-mail addresses.

Bring Your Own Device (BYOD) was an industry trend five years ago – today it is a reality. Employees everywhere use their own devices to access work e-mails, remote monitoring applications, CAD designs and other sensitive information. Unfortunately, this practice exponentially multiplies the risks of a cyber attack.

However, manufacturers can’t afford to hide their heads in the sand and hope BYOD will go away. Your best bet is to train your employees on the best-practice use of BYOD and reduce the number of devices and applications used to access company data. BYOD is not a replacement of corporate devices; it should be a controlled strategy to enable mobility.

Industry standards

Slowly, but surely, industry is starting to outline and implement cyber security standards to make industrial networks, devices, software, processes and data more secure. For example, the NIST Cyber Security Framework published in the US compiles leading practices from several standard bodies. There is no such thing as a foolproof formula, but NIST is a good place to start.

For Industrial Automation and Control Systems (IACS), IEC-62443 offers industry guidance that allows end users, systems integrators, security practitioners and the designers and manufacturers of industrial automation and control systems to work to the same standards. This results in a comprehensive and secure hardware and software system — the basis of any cyber-secure manufacturing facility.

Although cyber security in today’s connected factory is never 100 per cent airtight, best practice helps manufacturers detect threats early and address them in an effective way. This means your industrial security system will be able to spot intruders early rather than after 200 odd days when it might just be too late.

Print Friendly, PDF & Email

Share this:

  • Print
  • Facebook
  • LinkedIn
  • Reddit
  • Twitter
  • Tumblr
  • Pinterest
  • Skype
  • WhatsApp
  • Telegram
  • Pocket

You might also like…

Filed Under: Computing, Industrial robots, Industry, News Tagged With: automation, cloud, connected, cyber, devices, industrial, industry, internet, manufacturers, manufacturing, security, software, system

Join the Robotics & Automation News community

Primary Sidebar

Latest articles

  • Otto Motors launches new ‘mid-sized’ autonomous mobile robot
  • SGS introduces ‘cutting-edge testing protocol’ for robots checking furniture drawer slides
  • Europalco buys two robots from Kuka to add ‘wow factor’ to shows
  • Kivnon to launch new version of its forklift AGV at Advanced Factories Expo
  • Comau developing new mobile robot solution for three EU projects
  • What is the cost of hiring a Vue.JS developer?
  • Palletizing Systems and Robots
  • DONCEN MOTOR: Flat BLDC Motor is the Future Trend of the Robot
  • Top Benefits of Using Automation in Your Business
  • The Future of Colocation Hosting and How it is Evolving to Meet Changing Business Needs

Most Read

  • Top 20 electric vehicle charging station companies
    Top 20 electric vehicle charging station companies
  • Difference Between Three-Phase and Single-Phase Power
    Difference Between Three-Phase and Single-Phase Power
  • Scientists have found more water in space than they ever knew possible
    Scientists have found more water in space than they ever knew possible
  • Why is My Car Key Stuck in the Ignition?
    Why is My Car Key Stuck in the Ignition?
  • How to Know if Your iPhone is Being Tracked? Check This!
    How to Know if Your iPhone is Being Tracked? Check This!
  • Top 20 programmable logic controller manufacturers
    Top 20 programmable logic controller manufacturers
  • Why is Money Important in Our Lives?
    Why is Money Important in Our Lives?
  • What You Need to Know About Fixing an Engine Misfire
    What You Need to Know About Fixing an Engine Misfire
  • Otto Motors launches new ‘mid-sized’ autonomous mobile robot
    Otto Motors launches new ‘mid-sized’ autonomous mobile robot
  • Comau developing new mobile robot solution for three EU projects
    Comau developing new mobile robot solution for three EU projects

Overused words

ai applications automated automation automotive autonomous business companies company control customers data design development digital electric global industrial industry logistics machine manufacturing market mobile operations platform process production robot robotic robotics robots safety software solution solutions system systems technologies technology time vehicle vehicles warehouse work

Secondary Sidebar

Latest news

  • Otto Motors launches new ‘mid-sized’ autonomous mobile robot
  • SGS introduces ‘cutting-edge testing protocol’ for robots checking furniture drawer slides
  • Europalco buys two robots from Kuka to add ‘wow factor’ to shows
  • Kivnon to launch new version of its forklift AGV at Advanced Factories Expo
  • Comau developing new mobile robot solution for three EU projects
  • What is the cost of hiring a Vue.JS developer?
  • Palletizing Systems and Robots
  • DONCEN MOTOR: Flat BLDC Motor is the Future Trend of the Robot
  • Top Benefits of Using Automation in Your Business
  • The Future of Colocation Hosting and How it is Evolving to Meet Changing Business Needs

Footer

We are…

Robotics and Automation News was established in May, 2015, and is now one of the most widely-read websites in its category.

Please consider supporting us by becoming a paying subscriber, or through advertising and sponsorships, or by purchasing products and services through our shop – or a combination of all of the above.

Thank you.

Independent

Archivists

August 2016
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
293031  
« Jul   Sep »

Complex

Old-skool

This website and its associated magazine, and weekly newsletter, are all produced by a small team of experienced journalists and media professionals.

If you have any suggestions or comments, feel free to contact us at any of the email addresses on our contact page.

We’d be happy to hear from you, and will always reply as soon as possible.

Future-facing

Free, fair and legal

We support the principles of net neutrality and equal opportunities.

Member of The Internet Defense League

Copyright © 2023 · News Pro on Genesis Framework · WordPress · Log in

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT