With the convergence of information technology (IT) and operational technology (OT) rising among manufacturers in the last several years, the entrant of 5G, and the integration of other, more sophisticated industrial internet of things (IIoT) devices stand to expand this more rapidly.
Enclave warns that with the global ransomware increasing by 62% since 2019, and over 40% of manufacturers suffering cyberattacks in 2020, Onclave Networks warns that those modernising their digital operations will expand their attack surface and vulnerability to cyberattacks. With this in mind, Onclave Networks recommends manufacturers adopt a Zero Trust Architecture and security guidelines.
"Most of the IT security methods that manufacturers have relied on for years are not designed to identify or protect Operational Technology. Manufacturers need to be aware that layering IT solutions on top of one another is not adequate protection for these IoT, IIoT and ICS systems and devices,” said Don Stroberg, CEO of Onclave Networks.
Enclave Networks, also warns manufacturers that the rise in threats can also be attributed to the growth in internet-enabled devices and OT, as well as the greater integration between companies ad their supply chain partners. These threats can put data at risk, and jeopardize operations.
"The recent supply chain and critical infrastructure cyberattacks have opened the eyes of a lot of executives and managers who are concerned about their exposure to malware from suppliers as well as whether or not they could unknowingly spread malware across their supply chain. The potential for massive disruption to the business is greater, as is the liability these companies could face in the future - more reason why manufacturers are turning to Zero Trust to better secure their networks,” added Stroberg.
Why Should Manufacturers Adopt a Zero-Trust Principle?
A Zero Trust framework deployed in an enterprise can be harnessed to verify trust in people, devices, systems, and networks before engaging or interacting with them, as well as continuously verifying to ensure nothing is compromised.
“It changes the old saying of 'trust, but verify' to 'never trust, and always verify' and that any request for network access must be continuously authorisec,” states Onclave Netowrks.
"Onclave can support manufacturers in protecting their smart factories and supply chain. With our network, we eliminate the attack surface area for Operational Technology, while simplifying management issues and reducing their costs,” concluded Stroberg.