{"id":14010,"date":"2018-12-06T07:00:03","date_gmt":"2018-12-06T15:00:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/12\/06\/news-7777\/"},"modified":"2018-12-06T07:00:03","modified_gmt":"2018-12-06T15:00:03","slug":"news-7777","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2018\/12\/06\/news-7777\/","title":{"rendered":"Securing Smart Manufacturing with Connected Threat Defense"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Thu, 06 Dec 2018 14:00:37 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><em>By\u00a0David Tay, the CIO of Beyonics<\/em><\/p>\n<p>You\u2019d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term <a href=\"https:\/\/ec.europa.eu\/growth\/tools-databases\/dem\/monitor\/sites\/default\/files\/DTM_Industrie%204.0.pdf\">Industry 4.0<\/a> to describe the opportunities stemming from use of emerging technologies like cloud, IoT, big data, AI and robotics.<\/p>\n<p>Yet security has always been a major challenge to such projects. In a smart factory environment, the operational technology (OT) \u2014 such as the IoT devices, connected systems, and human-machine interfaces (HMIs) used for manufacturing and production \u2014 is tightly integrated with traditional IT systems like cloud platforms. This is a problem because although IT security has achieved a certain degree of maturity, the same can\u2019t be said of OT. Thanks to their connectivity, these systems become vulnerable to cross-pollinated cyber threats.<\/p>\n<p>As we\u2019ve found at <a href=\"http:\/\/www.beyonics.com\/\">Beyonics<\/a>, the answer is to build tightly integrated, layered security across endpoints, networks and servers \u2014 with each component sharing threat intelligence to make the whole more secure.<\/p>\n<p><strong>The risks to high-precision manufacturing <\/strong><\/p>\n<p>Founded in 1981, Beyonics has been a leader in precision-engineered manufacturing for almost four decades. It offers complex integrated manufacturing services such as precision metal stamping, innovative mold design and fabrication capabilities, precision plastic injection molding, aluminum die casting and machining, and electronics sub-assembly.<\/p>\n<p>Operating seven factories in Malaysia, Thailand, China, and Singapore \u2014 a total of 1.4 million square feet of manufacturing floor \u2014 we\u2019re constantly on the lookout for leading cybersecurity technologies to integrate into and protect our operations.<\/p>\n<p>Precision manufacturing is at the mercy of cyber-attacks. Deliberate data corruption could cause components to be produced with a deviation of a few microns. This might be totally invisible to the naked eye, but when you\u2019re dealing in measurements of a thousandth of an inch, even the slightest change can result in faulty products. When deployed in applications like vehicles and medical devices, the consequences could be life-threatening.<\/p>\n<p>There are also risks related to the manufacturing environment itself. If industrial control systems are hacked, production processes may be hit which could also result in workplace injuries. Just consider heavy duty equipment like the 200-ton aluminum die castings we operate, handling molten aluminum at 800 degrees. That\u2019s not something you want being remotely controlled by hackers.<\/p>\n<p><strong>The power of Connected Threat Defense <\/strong><\/p>\n<p>Yet this is just the tip of the iceberg. As Beyonics increasingly adopts Industry 4.0 best practices, we also need to be aware of the cyber risks that can stem from interconnected OT and IT systems. We\u2019ve already deployed IoT devices to monitor and measure various metrics on the manufacturing floor, such as cycle time, movements, and production rates. These could become an attractive, internet-connected target to attackers.<\/p>\n<p>That\u2019s why we\u2019ve taken a comprehensive, layered cybersecurity approach covering all aspects of the business.<\/p>\n<p>First, we sandboxed our wireless network into four zones: one for corporate operations; one for BYOD devices; one for guests; and one for any IoT devices deployed in the manufacturing environment. Next, we made sure our security solutions are integrated with one another. Previously we had separate point solutions covering endpoint protection, system protection, and firewalls. But siloes between these separate elements can lead to dangerous gaps in protection.<\/p>\n<p>That\u2019s why we\u2019ve deployed an ecosystem of integrated cybersecurity solutions, covering endpoints and networks \u2014 which are almost always the initial malware entry points \u2014 as well as our server infrastructure. Specifically, we put in place a dual firewall configuration with two different products and layered on top a suite of Trend Micro solutions, including the network-layer Trend Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Deep Discovery<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Inspector, server product Trend Micro<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> Deep Security<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/11\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/>, and OfficeScan XG for endpoint security.<\/p>\n<p>More importantly, we set up these Trend Micro solutions to \u201ctalk\u201d to each other and our firewall. This has created <a href=\"https:\/\/www.trendmicro.com\/en_gb\/business\/technologies\/connected-threat-defense.html\">Connected Threat Defense<\/a>: providing 360-degree protection, so that if a threat is detection and blocked at one layer, alerts and protective actions will be shared throughout.<\/p>\n<p><strong>Getting board-level buy-in<\/strong><\/p>\n<p>To create effective cybersecurity, it\u2019s also vital to have sponsorship from senior levels. We\u2019re lucky at Beyonics to have a C-suite very much aware of the cyber risks we\u2019re faced with as a manufacturer expanding into Industry 4.0. We often discuss security during management workshops and meetings, ensuring the management team is kept abreast of any developments and that cybersecurity and business processes are aligned.<\/p>\n<p>With management\u2019s support, we\u2019re also working with practitioners from tertiary institutions to provide both academic and hands-on training to our employees. Tools and technology are vital to good security, but so too are people, and our staff need to know they play a crucial role in our cyber defenses.<\/p>\n<p><strong>Looking ahead<\/strong><\/p>\n<p>As Industry 4.0 accelerates, the manufacturing sector needs to focus on two areas.<\/p>\n<p>Firstly, organizations need to be proactive in dealing with cybersecurity \u2014 to strengthen their defenses in anticipation of attack. They cannot afford to be reactive.<\/p>\n<p>Secondly, OT and IoT will open up new avenues for attacks, and they could have life-threatening repercussions in the physical world. Therefore, we need to approach OT and IoT security with the same \u2014 if not higher \u2014 level of urgency as we do IT.<\/p>\n<p>If we don\u2019t, then there could be some major bumps in the road ahead for manufacturers. As <a href=\"https:\/\/twitter.com\/stephanenappo?lang=en\">Stephane Nappo<\/a> said: \u201cIt takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.\u201d<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/securing-smart-manufacturing-with-connected-threat-defense\/\">Securing Smart Manufacturing with Connected Threat Defense<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/securing-smart-manufacturing-with-connected-threat-defense\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Thu, 06 Dec 2018 14:00:37 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-300x200.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-300x200.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-768x512.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-640x426.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-440x293.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800-380x253.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2018\/12\/20181205023425672-559-GhJweWC-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>By\u00a0David Tay, the CIO of Beyonics You\u2019d be hard pushed to find any organization today not involved in digital transformation projects. But the manufacturing sector was arguably one of the first to the game. Back in 2011, the German government first coined the term Industry 4.0 to describe the opportunities stemming from use of emerging&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/securing-smart-manufacturing-with-connected-threat-defense\/\">Securing Smart Manufacturing with Connected Threat Defense<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[20371,1001,12516,10495,714],"class_list":["post-14010","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-beyonics","tag-business","tag-industry-4-0","tag-iot","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14010"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14010\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}