Enter your keyword

Three steps to cloud security

Three steps to cloud security

Three steps to cloud security

The average time between a cyber security breach and its detection is 229 days. Manufacturing facilities are leading the list of potential targets for cyber espionage, denial of service (DoS) and web-application attacks. Here, Martyn Williams, Managing Director of industrial automation software supplier, COPA-DATA UK, discusses three steps manufacturers should take to stay safe in the cloud.

As the manufacturing sector moves towards industrial automation, the Internet of Things (IoT) and the cloud, the number and nature of cyber threats is also growing.

Hackers used target the IT and enterprise systems, but now manufacturers are seeing the same threats on their production lines, sensors, PLCs and SCADA systems. Traditional security focused on passive defence, but increasingly advanced attacks require a different approach.

The one thing manufacturers need to understand is that any industrial automation system today is vulnerable to cyber attacks. The only way of taking advantage of the benefits of IoT and the cloud is to stay vigilant and use industry best practice. Industrial security is no longer the IT department’s concern, but a 24/7 job for everyone, including those in the boardroom.

Read more 

No Comments

Leave a Reply

Pin It on Pinterest

Share This

Never Miss An Event!

Join our mailing list to receive the latest news and updates from our team.

You have Successfully Subscribed!