

- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
How
virtualization improves efficiency and performance of a Chinese bank
In June 1997, Fubon Bank
officially began operating in Pudong New Area, Shanghai, China. Since then, Fubon
Bank has operated on both sides of the Straits and has been actively promotes
economic and financial cooperation between the People’s Republic of China (PRC)
and the Republic of China (RoC).
Challenge
As the first ever commercial bank to be incorporated using joint
capital from both sides of the Straits, Fubon Bank strives to serve the whole
country from its base in Shanghai. It aims to use local services and to
continuously enhance its service quality and profitability.
The bank uses Citrix virtualization technology to optimize and
effectively consolidate its IT structure and has successfully streamlined its
virtual desktop infrastructure (VDI). With VDI deployed, Fubon Bank has
significantly reduced operating costs such as electricity, cooling,
maintenance, etc.
However, finding a solution that provides security capabilities for
both a growing VDI and virtual server environment, while retaining all the
benefits of virtualization, was not easy. The bank ran into unexpected issues
using the traditional approach to securing virtualized infrastructure, as the
non-optimized security solution led to excessive resource consumption,
dramatically decreased ROI and resulted in the virtualization program being put
on hold.
“We require an extremely high level of network security, and that
also applies to virtualization technology,” Mr Tang, who was the IT Department
Manager at Fubon Bank, recalled.
According to Mr Tang, the IT department had planned to install
traditional antivirus software on every virtual machine, but the trial
installation produced unacceptable results.
“CPU, memory and storage resources were quickly over utilized, and
left us lagging well behind the expected virtual machine density of 1:50. The
virtual desktops had to constantly retrieve updates and each virtualized
desktop had to perform all the scanning tasks independently,” he said.
“This led to end users complaining about VDI responsiveness and
forced us to look for a more effective solution that could deliver outstanding
multi-layered granular protection for our VDI environment, but preserve a high
level of platform performance,” he added.
Solution
After reviewing all the security offers on the market, Fubon Bank’s
IT team, together with the senior engineers at Citrix, chose Kaspersky
Security for Virtualization and its Light Agent technology.
“After stringent testing, Kaspersky Security for Virtualization has
proved to be an extremely effective IT security solution. It has excellent
control functions, security baseline monitoring and zero-day attack prevention,”
said Mr Tang.
Kaspersky Security for Virtualization Light Agent fully exploits the
hypervisor’s own core technologies – complementing and enhancing security in
Citrix XenDesktop VDI environments.
A Security Virtual Appliance (SVA) on each host scans all virtual
machines centrally, while a powerful but lightweight agent deployed on each VM
allows the activation of advanced security features, including application,
device and web controls, anti-malware protection for IM, mail and web, plus
advanced heuristics, to dramatically increase the overall level of security for
the VDI. The light agent also preserves the end-user experience and virtualization
platform performance at a very high level.
The unique Kaspersky Security for Virtualization cache technology
can also reduce the resource consumption of the Citrix platform during full
disc scans.
Moreover, the IT administrator can manage desktops, servers and
virtual machines from Kaspersky Lab’s single unified console.
According to Mr Tang, Fubon Bank have now performed deployment of
Kaspersky Security for Virtualization in its platform running on more than 1,200
virtual desktops.
“After officially going online, we found that the specialized
security solution for our virtualized machines resulted in efficient storage
consumption levels and has a very small resource footprint on our
virtualization hosts. This significantly enhances the use of virtual machines
and ensures security protection, allowing the cost advantage of virtualization
to be truly maximized,” he said.
All information in this case
study is provided by Kaspersky Lab.


- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
In an increasingly digitalised world, data and information are not only foundational and catalytic but fuel that drives almost everything. But more than just volumes of raw data and mountains of basic information, what is required for actionable, intelligent insights is the understanding of the complex relationships between data points and their nuanced correlations.
As organisations across the public and private sectors become increasingly reliant on AI tools and platforms for decision-making, knowledge graphs take on more significance. They offer a comprehensive way to represent data relationships and derive meaning. Knowledge graphs embed intelligence into the data itself and offer AI the tools to make sense of it all – to be more explainable, accurate and repeatable.
THE FUTURE OF AI: Machine Learning and Knowledge Graphs is a great read for forward-thinking organisations that are keenly aware of the power their data represents and who understand that its proper use empowers intelligent decision making.
Read more to gain a better understanding of the power of knowledge graphs that can vastly improve decision-making and impact business performance and outcomes.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
As cyber threats increase, becoming ever more sophisticated and evolving to match cyber resilience measures, new approaches and strategies are needed. Traditional ideas and methods that protect a tangible periphery no longer work, more so in the increasingly common remote workforce. These plans cannot be static but must be revisited periodically, upgraded frequently and monitored constantly.
Organisations that support the public and private sectors must be far more proactive than before, keeping a vigil on bad actors, both internal and external, foreign and domestic. Cyber resilience systems must learn to adapt to ever-morphing and clever attacks against core systems, infrastructure and equipment.
The cyberattack on the SolarWinds software build environment in December 2020 emphasises how dangerous the current landscape is and how concerned cyber resilience teams should be. The risk is no longer limited to a department or organisation but now threatens entire national functioning.
There is no doubt broad consensus and common development of sound practices across industry and government. Firm in their belief that transparency and cooperation are the best tools to help prevent and protect against future attacks, SolarWinds remains committed to sharing their learnings from the attack. Secure by Design is their guiding set of principles, with a focus on people, infrastructure and software development.
Their whitepaper, Setting the New Standard in Secure Software Development: The SolarWinds Next-Generation Build System is an excellent resource. Read on the learn more on software development and the build process improvements they’ve made in an accelerated timeline this year.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Smart cities are here to stay and are fast becoming the norm rather than an outlier. Smart cities use ICT to improve the lives of residents through more efficient utilisation of resources, assets and funds in an effort to better serve citizens. Smart cities optimise services and operations to enhance the overall citizen experience while simultaneously driving development and growth. Cutting edge technology is used to plan, design and manage resources and infrastructure in the best way possible.
According to a report, cities can use smart technologies to improve some key quality-of-life indicators by 10% to 30%. These increases could mean more lives saved, lesser crime, lowered health system burden and a cleaner, green environment.
There are, of course, challenges in creating smart cities. These challenges can seem overwhelming, as they range from things like legislative and policy roadblocks to funding challenges to technology infrastructure and security. The fact is, in as much as smart cities rely on technology, the key is not necessarily in how much technology is available but rather how well the available technology is deployed and exploited – Smart City Technology Management.
Read on to know about the five primary technologies required for a highly successful smart city environment and how all the pieces of the city’s infrastructure can work together as a cohesive whole.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
2018 has been a year of technological breakthroughs and developments across the IT world. The highs of this period aren’t limited to the private sector. The Australian Institute of Health & Welfare has had its share of big wins, challenges, and is ready for more digital transformation in the new year.
The Man with the Data
OpenGov Asia had a chance to speak to Geoff Neideck, Group Head, Data Strategies and IT, Australian Institute of Health and Welfare. In what he calls, “a very interesting role”, he gives us an inside look as to how his organisation has progressed and where they are investing in for 2019.
Geoff describes the Australian Institute of Health and Welfare as a major information and data agency. Housing a repository of data, it helps stakeholders get a national picture of health and welfare issues and topics. Government, researchers, policymakers and the community can access the information to inform themselves about healthcare and welfare issues, as well as start a conversation around the data.
As Group Head, Geoff has the combined duties of a Chief Data Officer and a Chief Information Officer. Hence, he oversees the organisation’s IT functions as well as its data strategies to support the needs of itself and its many stakeholders.
2018 In Review
With such a dynamic role, it comes as no surprise that the Institute has a good number of technology projects under its belt. Although many are a work in progress, Geoff begins by sharing a meaningful one – the Veterans’ Health and Welfare Program.
“It’s very important to our current and former Australian Defence Force (ADF) personnel,” explains Geoff. “[The program] reports on their health and welfare and looks to address information and knowledge gaps to improve the evidence base. Looking at suicide rates for current and former ADF personnel has been a recent focus in response to ongoing concern within the ADF and the Australian community. We gathered information from the partnering agencies, the Department of Veterans’ Affairs and Defence, combined with the mortality data maintained by the AIHW…It supports a very important public policy issue in terms of how we support our veterans.”
Between 2017-2018, Australia’s Department of Veteran Affairs reported that mental health and suicide prevention ranked high on its list of priorities. Monies were pledged to improve the delivery of mental health support to the overall welfare of veterans and ex-personnel through a series of policies.
The data linked and analysed by the Australian Institute of Health and Welfare will provide tangible benefits for the veteran community.
Given the impact data can have to improve citizen’s lives, Geoff says, “As a data agency, it is important to quality assure the data that we have. One of the recent activities we have undertaken is to develop a data validation tool which basically provides a data edit engine, data validation and data assurance processes.”
The tool generates reports and diagnostics to make improvements to the dataset. Using the information provided, quality information can be used in tandem with the commentary the agency publishes in their reports.
“In the same sphere, we are also looking at applying machine learning techniques at the point of integrating data into the organisation, and validating and preparing it for analysis,” Geoff shares.
Its application is to assist in the process of cleaning the huge sets of data. The machine learning aims to identify duplicate records, gaps in the data, and provide diagnostic information. Any manipulation which needs to be done will help improve the quality of data for research and government policy analysis.
However, the Australian Institute of Health & Welfare does not do the heavy lifting alone. The size of the organisation is a constraint on the number of experienced staff it can retain. Other agencies, such as the Australian Bureau of Statistics, and consultants collaborate with them to provide assistance to projects his team undertakes. Presently, they are recruiting individuals with advanced data science skills to support the multiple projects they are undertaking.
Challenges
This leads us nicely to what Geoff thinks is one of the biggest challenges the Australian Institute of Health and Welfare faces – plugging a talent gap.
“It’s quite a challenge finding the right people with the skills and techniques we need. Particularly, getting people who have applied techniques in the area we are in – government administrative and statistical data,” explains Geoff.
Generally, people who have good data science skills would make the cut. However, what his agency is really looking for are people with a healthcare or administrative data background.
“We often work with quite disparate datasets and bring them together to form the analytics datasets we use. It is about understanding the types of analysis our data is used for. Obviously, some of the analysis we want to support is looking at rare diseases and disease clusters. Within our data, this might require a spatial analysis to identify particular areas where there are higher levels of particular diseases or health outcomes, especially adverse ones,” adds Geoff. “It is really about how we can develop the datasets for these particular analyses, in the health and welfare sphere.”
Like other organisations in the public sector, data governance and security are a major challenge his organisation wrestles with, but ones in which they have over 30 years’ experience in. Geoff is cognisant that Australian citizens need to be assured that their data is used well through his organisation’s statistical collection and analysis. The goals of policy must be achieved while protecting the interest of citizens. It is a fine balanced which must be struck.
2019 Forecast: Cloud
In the horizons, the agency is working on a cloud strategy. For now, some activities have already been moved to the cloud, such as certain outward facing work, says Geoff. Some development work is also cloud-based.
“But we’re looking at other activities we can put into the cloud. We’re working in line with the Australian Government policy around public data and deployment into the cloud,” shared Geoff.
Another project they are looking at is the nature of accessing data. Geoff says the way people want to see data is changing. Traditionally, hardcopy publications with tables and graphs were the norm of this agency. Moving forward, Geoff and his team are looking at considerably more web-based output. Hence, data visualisation will become more important for his team.
Apart from acquiring the tools from Tableau, they are grooming the necessary talents to apply the technology. Close to 200 of their staff have been actively using data visualisation in their reports. Already, more than a thousand visualisation dashboards are available on their website. However, he believes more can be done to democratise the access of the agency’s valuable data.
In the year to come, Geoff and his team will continue to work closely with other government agencies to bounce ideas, tap on their experience, and deliver better results for the Australian community.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Another milestone was achieved by the University of the Philippines (UP) PHL-Microsat Team and the Department of Science and Technology (DOST) last 29 October 2018.
As reported, Diwata-2 was launched from the Tanegashima Space Centre in Japan via the H-II F40 rocket.
Diwata-2 is the second microsatellite built and designed by Filipinos, under the Development of Philippine Scientific Earth Observation Microsatellite (PHL-Microsat) Program.
It is funded by the DOST and monitored by the DOST-Philippine Council for Industry and Emerging Technology Research and Development (PCIEERD).
It was done through the collaboration among UP Diliman, the DOST-Advanced Science and Technology Institute (ASTI), Hokkaido University and Tohoku University.
A more technologically advanced sibling of the ground-breaking Diwata-1 microsatellite, Diwata-2 will orbit at a higher altitude of approximately 620km.
It features an increased lifespan and a sun-synchronous orbit that makes repeated environmental monitoring of specific places possible.
Like its predecessor, Diwata-2 carries a Wide Field Camera (WFC), Middle Field Camera (MFC), High Precision Telescope (HPT), and Spaceborne Multispectral Imager (SMI) with Liquid Crystal Tunable Filter (LCTF).
All these mission instruments have undergone rigorous ground calibration and testing to ensure that they will perform optimally at the new orbital conditions of Diwata-2.
But unlike Diwata-1, it features the deployable solar panels for increased power generation output and an enhanced resolution camera (ERC).
It also has two locally-made experimental modules: an Amateur Radio Unit for disaster and emergency communications and a Satellite Orientation Module for increased pointing accuracy.
Similar to Diwata-1, Diwata-2 was developed with the mentorship and support of Japan’s Hokkaido University and Tohoku University.
It has undergone major iterations since planning and design began in 2016, right after Diwata-1 was released from the International Space Station (ISS).
These include a simulation model, a mechanical test model, an engineering model, and finally, the flight model.
Diwata-2 has a plethora of sensors, called Sun Aspect Sensors (SAS), lining its body. These sensors serve two purposes.
One is to indicate location with respect to the sun. The sensor indicates which side faces the sun when struck directly by its light.
Second is the ability to calculate Diwata-2’s angle with respect to the sun, using light intensity. When it shines directly on the sensor, then that is typically when it is most intense.
Moreover, Diwata 2 also uses the stars. Since stars are fairly static landmarks, the microsatellite can utilise its Star Tracker Telescope (STT) to take a snapshot of a region of space.
It then compares this snapshot to the 360-degree star gallery included on board the satellite to estimate its current attitude and location.
Diwata-2 is a pivotal precursor to the next phase of Philippine space technology, called the Sustained Support for Local Space Technology and Applications Mastery, Innovation and Advancement (STAMINA4Space) Program.
The STAMINA4Space Program aims to build a local industrial base and enhance local space science and engineering expertise towards the establishment of the Philippine Space Agency.
Both Diwata-1 and Diwata-2 are Earth-observing microsatellites capable of capturing images of Earth for environmental assessment.
The satellite control, operation, and acquisition of experimental data will be done at the Philippine Earth Data Resource Observation Centre (PEDRO), which is housed by DOST-ASTI.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Traditional
Islamic banking principles are committed to establishing a welfare-oriented banking
system that meets the needs of low income and underprivileged citizens.
It supports the establishment of an
economic system based on social emancipation and equitable distribution of
wealth, encouraging the economic progress of socially deprived people. It also
works to create employment opportunities and the development of agriculture and
rural communities.
Whilst
creating employment opportunities and developing agriculture in rural
communities, the aim of traditional Islamic banks is to, support the
establishment of a unique economic system. This economic system is based on
social emancipation and an equitable distribution of wealth so that socially
deprived people experience economic progress. This is done through the
development and the creation of employment opportunities in agricultural and
rural communities.
The
Al-Arafah Islami Bank Limited (AAIBL) was established in 1995 and is
headquartered in Dhaka in Bangladesh. This bank operates on the traditional
Islamic principles and they face many key challenges. For the successful
operation of any bank, they have to ensure that the vital pillars of IT
security and confidentiality are ceaselessly infallible.
The AAIBL
has an enormous responsibility to ensure that its IT security and
confidentiality is being upheld, due to the fact that it has a customer base
that is expansive and wide-ranging. It has customers from 199 branches
throughout Bangladesh, ranging from busy city environments to remote rural
communities.
The Challenges that has Compromised the
Reputation of the Bank
The AAIBL
has, for many years faced many pertinent challenges that are both internal and
external. The external challenges include having to operate in an environment
with weak national infrastructure, making them prone to cyberattacks that could
compromise the IT security and confidentiality of the organisation. The
internal challenges include having lack of a central management or policies
that govern the individual use of PCs and other devices.
This has
regrettably caused many virus, worm and Trojan attacks on both the local head
office network and across the branch network. This resulted in the
inconvenient, time-consuming and expensive task of having to transport the
affected PCs from remote, rural branches back to Dhaka to be cleaned and
repaired.
In
particular, the uncontrolled access to virus-laden web pages and the widespread
use of unauthorised USB devices resulted in numerous large scale and
debilitating infections. At their most severe, these problems could result in
the complete shutdown of branches, with core banking software ceasing to
operate. This could be extremely inimical as it could affect customer’s
transactions, doing irrevocable damage to the organisation’s reputation. These
issues were also preventing AAIBL’s efforts to establish online banking
services.
Mr. D. M. Jahangir Rabbani, Senior
Principal Officer, ICT Division, said that whilst these events were now routine
to the organisation, it was vital that they find a solution to the problems
since it was causing severe disruptions to their consumers and creating a bad
reputation for the organisation.
The Solution
from Kaspersky Lab that Brought AAIB Back to their Feet Again
The bank selected Kaspersky Lab and its
award-winning Dhaka-based partner, Officextracts, for the performance of its
software. The systems put in place by Kaspersky included virus detection and
management. Kaspersky Lab’s world class,
multi-layered anti-malware protection for AAIB’s systems, servers and more than
1,000 individual users was combined with firewall, application, device and web
control, mobile security, device and systems management capabilities.
The solution has provided a comprehensive
remedy for the bank’s longstanding and damaging virus problems. Network traffic
is now running smoothly and centralised controls on the use of devices such as
USBs, CDs and DVDs is preventing local infections out in the branch network.
Websites and applications presenting
dangers to the bank are being identified and blocked centrally by the IT team
from head office, managing threat and risk levels and significantly reducing
bandwidth consumption. It can manage the system, monitor endpoint security,
review threat and risk levels and generate reports for executives, all from the
Kaspersky Lab central console.
The results are significant for both the
bank and its customers. Core banking services are streamlined and operating
smoothly for customers resulting in efficiency of operations allowing staff to
focus on activities that can improve customer satisfaction. The IT team can now
focus on enhancing and innovating so that their colleagues and customers can
benefit from them.
Said Mr. Rabbani that as a bank their
operations must be secure and confidential at all times. While they have
resolved their security issues thanks to Kaspersky Lab, they have to continue
to be resilient and control central access to web pages, applications and
devices.
- Like
- Digg
- Del
- Tumblr
- VKontakte
- Buffer
- Love This
- Odnoklassniki
- Meneame
- Blogger
- Amazon
- Yahoo Mail
- Gmail
- AOL
- Newsvine
- HackerNews
- Evernote
- MySpace
- Mail.ru
- Viadeo
- Line
- Comments
- Yummly
- SMS
- Viber
- Telegram
- Subscribe
- Skype
- Facebook Messenger
- Kakao
- LiveJournal
- Yammer
- Edgar
- Fintel
- Mix
- Instapaper
- Copy Link
Worried
about IoT, but hit by malware: Kaspersky Lab reveals industrial organization
constant struggle
Due to the interlinked nature of
digitalisation and cybersecurity, 65% of industrial organisations believe that
security breaches due to Industrial Control Systems (ICS) are more likely to
occur due to the Internet of Things (IoT).
Kaspersky lab, however, has unearthed a
crucial contradiction among the industrial community. Many organisations whilst
keen to boost the efficiency of their industrial processes by investing in new
IT that safeguards their IT networks, have devastatingly failed to protect
their Operational Technology (OT). This therefore allows basic but devious
threats such as ransomware and malware to attack their OT networks, These and
other findings have been unveiled in Kaspersky Lab’s ‘State of Industrial
Cybersecurity 2018’ report.
What
Should be Chosen? Efficiency or Cybersecurity?
Industrial processes are now made more
efficient due to advancing technology that is readily available and the
extensive connectivity throughout the globe.
However, these trends bring dangerous,
looming risks to organisations. This is because when organisations want to
experience these advantages, they have to keep elements of their operations
open. This makes them vulnerable to attacks. 77% of the surveyed companies
believe that they are likely to become the target of a cybersecurity incident
Most organisations have a basic
understanding of the risks that are associated with digitalization. Despite
these risks, they are willing to jump on the bandwagon and make changes to
their operations. However, they are still tragically failing to put the right
cybersecurity safeguards in place and are leaving themselves extremely
vulnerable to attacks on these operational and control networks. 48%of
organisations have admitted that they have no measures in place to detect or
monitor if they have suffered an attack concerning their industrial control
networks.
Attacks on industrial control networks
could have some serious implications on the organisation including, damaged
products, a loss of customer confidence and business opportunities, a loss of
production at one or multiple sites or even environmental damage. Amongst
organisations who have been victims to at least one ICS cybersecurity incident
over the past 12 months, 20% claimed that the financial damage to their
business has increased. They have therefore realised that they not only need to
pay more attention to the issue of cybersecurity but they also have to invest in
more reliable safeguards.
Risk
Perceptions VS Reality
The main issue according to the study is
that despite being aware of cybersecurity issues and increasing their
expenditure on cybersecurity, many industrial organisations are still falling
victim to the cyberattacks.
This is due to several facts including the
lack of awareness by employees.
Whilst organisations warn employees about
big, targeted, mass-attacks, they fail to mention the more imminent threat of
conventional attacks such as malware or ransomware attacks. The surveyed
companies have reported that they have had their networks attacked
conventionally due to the mistakes of their employees.
There is serious concern surrounding the
overexaggerated and misplaced perceptions of the risks and dangers of targeted
attacks. Companies relying on ICS are still falling victim to more conventional
threats, including malware and ransomware due to their lack of awareness that
mass attacks, while potent, is not as frequent an occurrence compared to
conventional attacks.
Future
Challenges
The adoption of Industrial Internet of
Things (IoT) and cloud-based systems have created a new security dimension,
which is proving to be a major hurdle for industrial businesses. The increased
risks associated with connectivity and the integration of IoT ecosystems is a
major cybersecurity issue for the year ahead for more than 54% of the surveyed
companies.
When it comes to cloud deployment, 15% of
industrial organisations already use cloud solutions for the Supervisory Control
And Data Acquisition (SCADA). The SCADA systems help in gathering and analysing
data in real-time. A further 25% planning to implement it in the next 12
months.
With companies investing in further smart
technologies and automation, and the adoption of industry 4.0, the trend for
connectivity and IoT is only going to increase. It is therefore vital that
cybersecurity measures keep up with the rate of technology adoption, to ensure
that the rewards of digitalisation, outweigh the risks. Business need to
consider ICS incident response systems with more seriousness, to avoid risking
severe operational, financial and reputational damage. Only by developing a
specific incident response program and using dedicated cybersecurity solutions
can businesses keep their services and products, customers and the environment
safe.