Most critical expert services providers are struggling to secure their industrial internet of factors (IIoT)/operational technology (OT) systems and acknowledge the need to have to commit much more seriously in these places, mentioned a report from security business Barracuda Networks this week.
The firm surveyed 800 senior IT supervisors, senior IT security managers, and challenge supervisors liable for IIoT/IoT security assignments from a array of industries, together with agriculture, biotechnology, building, energy, governing administration, health care and manufacturing.
The impetus for IIoT security is escalating as governments warn about threats towards critical infrastructure from Russia. Firms are especially involved about this recent geopolitical scenario, with 89% citing it as a factor.
Towards this backdrop, 96% of respondents acknowledged the want to make investments more in IIoT and OT security.
Barracuda’s State of Industrial Security 2022 report found that companies are managing into challenges when utilizing IIoT/OT security initiatives, with 93% admitting failure. The most significant induce of failure was that technology took too extensive to carry out, though price was the 2nd. Almost 4 in 10 firms also reported that no just one in the group had taken obligation for the challenge.
The higher failure price does not indicate that these providers failed completely at IIoT security, as there are usually various this sort of security projects in a one corporation. General, just under a 3rd of providers experienced previously carried out some IIoT/OT security projects, while 40% are at present completing at minimum a single.
“The very good information is attempts are being made and acquired from to enhance IoT/OT security,” commented Bud Broomhead, CEO at Viakoo. “Even if unsuccessful, assignments aid to exhibit where by an organization’s IoT/OT security limitations exist.”
Additional usually, 94% of corporations experienced experienced a security incident in the final 12 months. Just about 9 in 10 of individuals that endured an incident noticed their operations influenced for additional than a working day, while 23% have been impacted for at least a few times.
Web apps have been the best attack vector, at 42%, followed by the use of destructive external components or removable media like USB sticks, which affected 38% of respondents.
Some parts of this report are sourced from: