Industrial control security practitioners 'working blind' to protect their network

virus spreading network devices nodes connected Internet of Things malware hacked bot

Four out of 10 industrial control security practitioners don’t have proper visibility into their ICS networks. This is according to a new study by the SANS Institute.

Based on a poll of ICS practitioners and cybersecurity stakeholders across various verticals, including energy, manufacturing, oil and gas, the report says that 40 percent of defenders are actually working blind to detect a cyber attack.

And by "working blind" the report refers to finding out where the attack is coming from and trying to remediate it in a "reasonable" amount of time.

"That statistic is even scarier," the report says, "when you take into account that 67 percent say threats to the ICS systems are high, or severe and critical."

There are four types of threats that are perceived as the biggest ones. First, adding devices that can’t protect themselves on the network. Then, there are internal incidents spurred by accidental actions, and external threats from hacktivists and state-funded attackers.

And finally, there’s extortion, more commonly referred to as ransomware.

Ransomware, even though it takes up just a small share of the overall malware market share, is pulling in the most of the limelight. With the recent WannaCry and Petya/NotPetya attacks, many businesses around the world ended up locked out of their crucial data, resulting in large financial losses.

Published under license from ITProPortal.com, a Future plc Publication. All rights reserved.

Photo Credit: fotogestoeber/Shutterstock

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.