expert
OPINION
revenue loss . These attacks are opportunistic , driven by the desire to inflict maximum pain on victims .
The report stated that over 70 % of ransomware attacks are directed at manufacturers . What are the effects and impacts on supply chains ?
Firms facing downtime , whether short-term or extended , experience a noticeable decline in trust and contractual integrity , leading to potential disruptions .
Another concern during a ransomware attack is the risk of an organisation transmitting the ransomware to its customers which amplifies supply chain vulnerabilities . This extends to service providers and various connectivity avenues , posing threats to both customers and workforce rights .
What steps can industrial organisations take to strengthen their cybersecurity posture , especially where patching is not always feasible ?
In the business landscape , a company ’ s most crucial assets are its production systems , whether generating electricity or manufacturing goods . However , many IT
and cybersecurity departments , despite safeguarding email and other aspects , lack a comprehensive understanding of these operational systems . This deficiency poses significant challenges , particularly regarding cybersecurity ’ s ability to monitor and protect revenue-generating processes .
With threats like ransomware looming , earlystage attacks within these critical systems often go undetected due to a lack of visibility and understanding . So , talking about the steps industrial organisations can take to strengthen their cybersecurity posture – especially where patching is not always feasible – the starting point should be for organisations to address this visibility gap and apply efforts to enhance insights and monitoring capabilities within operational environments .
How important are coordinated efforts from government agencies , security vendors and industrial organisations in building a risk-based response to OT threats ?
At Dragos we operate an intelligence team that provides regular global insights . These insights inform technology development for detecting threats .
42 WWW . INTELLIGENTCISO . COM