• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Critical Industries Failing at IIoT/OT Security

You are here: Home / General Cyber Security News / Critical Industries Failing at IIoT/OT Security
July 14, 2022

Most critical expert services providers are struggling to secure their industrial internet of factors (IIoT)/operational technology (OT) systems and acknowledge the need to have to commit much more seriously in these places, mentioned a report from security business Barracuda Networks this week.

The firm surveyed 800 senior IT supervisors, senior IT security managers, and challenge supervisors liable for IIoT/IoT security assignments from a array of industries, together with agriculture, biotechnology, building, energy, governing administration, health care and manufacturing.

The impetus for IIoT security is escalating as governments warn about threats towards critical infrastructure from Russia. Firms are especially involved about this recent geopolitical scenario, with 89% citing it as a factor.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Towards this backdrop, 96% of respondents acknowledged the want to make investments more in IIoT and OT security.

Barracuda’s State of Industrial Security 2022 report found that companies are managing into challenges when utilizing IIoT/OT security initiatives, with 93% admitting failure. The most significant induce of failure was that technology took too extensive to carry out, though price was the 2nd. Almost 4 in 10 firms also reported that no just one in the group had taken obligation for the challenge.

The higher failure price does not indicate that these providers failed completely at IIoT security, as there are usually various this sort of security projects in a one corporation. General, just under a 3rd of providers experienced previously carried out some IIoT/OT security projects, while 40% are at present completing at minimum a single.

“The very good information is attempts are being made and acquired from to enhance IoT/OT security,” commented Bud Broomhead, CEO at Viakoo. “Even if unsuccessful, assignments aid to exhibit where by an organization’s IoT/OT security limitations exist.”

Additional usually, 94% of corporations experienced experienced a security incident in the final 12 months. Just about 9 in 10 of individuals that endured an incident noticed their operations influenced for additional than a working day, while 23% have been impacted for at least a few times.

Web apps have been the best attack vector, at 42%, followed by the use of destructive external components or removable media like USB sticks, which affected 38% of respondents.


Some parts of this report are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Microsoft Patches Windows Zero-Day as Attackers Exploit it in the Wild
Next Post: Amazon gave police departments Ring footage without permission amazon gave police departments ring footage without permission»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.