{"id":35990,"date":"2020-06-29T06:18:29","date_gmt":"2020-06-29T10:18:29","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=35990"},"modified":"2021-08-02T05:40:05","modified_gmt":"2021-08-02T09:40:05","slug":"industrial-cybersecurity-training","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-cybersecurity-training\/35990\/","title":{"rendered":"Industrial cyberattacks are on the rise. Technology and your people can stop them."},"content":{"rendered":"<p>The industrial sector didn\u2019t have much cause for cybersecurity before. In the 20th century, there were few computers and little use of the internet in the manufacturing process. The <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/category\/internet-of-things\/\" target=\"_blank\" rel=\"noopener nofollow\">internet of things<\/a> (IoT) and the rise of operational technologies (OTs) \u2013 automated systems responsible for operating machinery safely \u2013 has changed all that. With fatal cyberattacks on the rise, it\u2019s time to take your cybersecurity seriously and work with your people to help minimize the risks.<\/p>\n<h2>Digital transformation is transforming cyber-threats<\/h2>\n<p>As manufacturing plants and sites are becoming more digital, cyber-threats are growing. There\u2019s a significant rise in devastating cyberattacks, for example, <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/how-to-ransomware\/34227\/\" target=\"_blank\" rel=\"noopener nofollow\">ransomware<\/a> like <a href=\"https:\/\/www.kaspersky.com\/blog\/hydro-attacked-by-ransomware\/26028\/\" target=\"_blank\" rel=\"noopener nofollow\">LockerGoga<\/a> crippling industrial organizations, either by shutting down operations or demanding costly ransoms. The good news? There are simple steps to take, which can limit the chances of it happening to you.<\/p>\n<p>Corporate revenge? Hackers for hire? <a href=\"https:\/\/www.forbes.com\/sites\/kateoflahertyuk\/2018\/05\/03\/cyber-warfare-the-threat-from-nation-states\/#6201d62c1c78\" target=\"_blank\" rel=\"noopener nofollow\">Cyberwarfare<\/a>? Collateral damage of malware? Motivations and reasons behind industrial cyberattacks vary, but the stakes are sky-high for plants and businesses. If industrial OT systems are hacked and large machinery is compromised, there could be fatalities.<\/p>\n<h2>Triton: Why industrial cyberattacks could cost lives<\/h2>\n<p>Let\u2019s explore a previous industrial cyberattack.<\/p>\n<p>Triton is malicious software (malware) used to target Triconex, a Safety Instrumented System (SIS) \u2013 sensors and software to reduce safety risks in industrial settings \u2013 used in power stations and petrochemical plants. In 2017, <a href=\"https:\/\/www.nytimes.com\/2018\/03\/15\/technology\/saudi-arabia-hacks-cyberattacks.html\" target=\"_blank\" rel=\"noopener nofollow\">hackers attacked a Saudi Arabian petrochemical plant with Triton<\/a>. But, luckily (and somewhat ironically), a bug in the malware halted the attack in its tracks.<\/p>\n<p>The hackers\u2019 intentions were unknown, but the infiltration of the system could have put the plant and its workers in jeopardy.<\/p>\n<p>Could it have been stopped otherwise? Yes, but only with the right cybersecurity measures.<br>\nThere\u2019s a significant challenge here: IT security is new to industrial workplaces, and it\u2019s only been a requirement in the last decade; in some cases, it\u2019s non-existent. Plus, many IT teams and engineering squads don\u2019t have the training to work effectively together to spot a threat that\u2019s unfolding in real-time. OT engineers may be unaware of how to detect the signs of an attack and look for other faults like machinery, human error or asset misconfiguration.<br>\nWant to protect your business? Update your security systems and start training your workforce.<\/p>\n<h2>How to minimize the chances of a cyberattack<\/h2>\n<p>Let\u2019s explore how to defend operational technologies (OT) that operate machines and make them easier to manage and monitor plant safety, among other things.<\/p>\n<p>To start, you need an industrial endpoint security product \u2013 software that can help you protect <em>all<\/em> your devices and network from hackers. This is crucial. Once you have this, you need to use <em>all<\/em> the endpoint features effectively (this is called <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/system-hardening-reduce-cyberattacks\/35812\/\" target=\"_blank\" rel=\"noopener nofollow\">system hardening<\/a>) to make it harder for hackers to get into your network.<br>\nAlso, use an OT network security monitoring solution (this is usually hardware) to detect the signs of attack on controllers and other equipment.<\/p>\n<h2>Why training employees to be cyber-aware is crucial for defending your business<\/h2>\n<p>Kaspersky <a href=\"https:\/\/go.kaspersky.com\/rs\/802-IJN-240\/images\/GL_Kaspersky_Report-IT-Security-Economics_report_2019.pdf\" target=\"_blank\" rel=\"noopener nofollow\">reported 52 percent of enterprise breaches<\/a> happen after employees\u2019 inappropriate IT use.<\/p>\n<p>With lives at stake, when it comes to cybersecurity, your employees need to know not just what to stay away from but how to keep secure. Here\u2019s how.<\/p>\n<h3>Train everyone in cybersecurity<\/h3>\n<p>It\u2019s not just IT teams that need cybersecurity training; everyone from engineers to finance managers need it. But, that said, your primary focus should be with your IT and IT security teams. OTs are typically not in their remit. They need time to learn how to secure them and work alongside operational engineers.<\/p>\n<p>Everyone is responsible for preventing an attack. Book in time to train everyone. Differentiate the training for IT, engineers and operations.<\/p>\n<p>Engineer, operations and other groups need theoretical teaching and practical exercises but pitched to their level of expertise. For IT security teams, exercises should include red and blue teaming. Red teams try to attack your organization while the blue teams defend it. This is an attack simulation using real-world cyberattack scenarios and case studies, like the 2015 <a href=\"https:\/\/en.wikipedia.org\/wiki\/December_2015_Ukraine_power_grid_cyberattack\" target=\"_blank\" rel=\"noopener nofollow\">attack on a Ukrainian power grid<\/a>. Here, hackers orchestrated a <a href=\"https:\/\/www.kaspersky.co.uk\/resource-center\/definitions\/spear-phishing\" target=\"_blank\" rel=\"noopener\">spear-phishing attack<\/a> to gain access to the operating system, then disabled power across the affected regions for between one and six hours. It\u2019s a practical way to assess the capabilities of your cybersecurity team.<\/p>\n<h3>Lockdown activities on corporate devices<\/h3>\n<p>Engineers or other personnel may use work devices outside the plant, like when traveling to meetings or other sites. They will most likely use corporate devices for personal use. By browsing social media on a work laptop, employees are exposed to different materials that could be malicious. Using USB sticks from outside your organization can carry a significant risk of bringing <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/malware-trends-2019\/28098\/\" target=\"_blank\" rel=\"noopener nofollow\">malware<\/a> into your network. Explain the importance of using work devices only for work and not personal use.<\/p>\n<h3>Retrain and refresh<\/h3>\n<p>Retraining is critical, especially as your organization continues its digital transformation. People forget things, especially if it\u2019s not a day-to-day task. To keep protected, your education efforts must be consistent, not just one-off.<\/p>\n<h2>The future of industrial cybersecurity<\/h2>\n<p>As the industrial sector evolves, technology like the <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-iot\" target=\"_blank\" rel=\"noopener nofollow\">internet of things<\/a> (IoT) will become more critical to the success of the industry. <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-iot\/28210\/\" target=\"_blank\" rel=\"noopener nofollow\">Industrial IOT<\/a> and smart sensors could enable anything from control systems automation to predictive maintenance. As the industrial sector becomes more connected, it will benefit society and improve business productivity. But, like any technological shift, cyber-threats will evolve with it.<\/p>\n<p>By taking measures to secure your technologies and educate your employees, you minimize the chances of falling foul of a cyberattack, saving money and lives.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exploring new horizons and technologies? Here\u2019s how to keep your industrial business safe from the growing risks and severity of cyberattacks.<\/p>\n","protected":false},"author":2606,"featured_media":36335,"template":"","coauthors":[3869],"class_list":{"0":"post-35990","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-artificial-intelligence","7":"emagazine-category-cybersecurity-training-cybersecurity","8":"emagazine-category-digital-transformation","9":"emagazine-category-industrial-cybersecurity","10":"emagazine-category-internet-of-things","11":"emagazine-tag-device-hardening"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/industrial-cybersecurity-training\/35990\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/industrial-cybersecurity-training\/22710\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/industrial-cybersecurity-training\/20803\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/35990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2606"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/36335"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=35990"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=35990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}