TechCentralTechCentral
    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      DStv makes RWC final stream available for R19.95

      27 October 2023

      Dimension Data to be renamed NTT Data

      27 October 2023

      Karpowership gets green light for Richards Bay plant

      27 October 2023

      Why people wave on Zoom

      27 October 2023

      Microsoft gaining ground in cloud race with AWS, Google

      27 October 2023
    • World

      Huawei sees growth in cloud, digital power segments

      27 October 2023

      Intel beats expectations; manufacturing momentum builds

      27 October 2023

      Google CEO to testify on Monday in antitrust trial

      27 October 2023

      China rushes to swap Western tech for domestic options

      26 October 2023

      Alphabet, Meta deliver solid financial performances

      26 October 2023
    • In-depth

      Quantum computers in 2023: what they do and where they’re heading

      22 October 2023

      How did Stephen van Coller really do as EOH CEO?

      19 October 2023

      Risc-V emerges as new front in US-China tech war

      6 October 2023

      Get ready for a tidal wave of software M&A

      26 September 2023

      Watch | A tour of Vumatel’s Alexandra fibre roll-out

      19 September 2023
    • TCS

      TCS | Mesh.trade’s Connie Bloem on the future of finance

      26 October 2023

      TCS | Rahul Jain on Peach Payments’ big funding round

      23 October 2023

      TCS+ | How MiWay uses conversation analytics

      16 October 2023

      TCS+ | The story behind MTN SuperFlex

      13 October 2023

      TCS | The Information Regulator bares its teeth – an interview with Pansy Tlakula

      6 October 2023
    • Opinion

      Big banks, take note: PayShap should be free

      20 October 2023

      Eskom rolling out virtual wheeling – here’s how it works

      4 October 2023

      How blockchain can help defeat the scourge of counterfeit goods

      29 September 2023

      There’s more to the skills crisis than emigration

      29 September 2023

      The role of banks in Africa’s digital future

      22 August 2023
    • Company Hubs
      • 4IRI
      • Africa Data Centres
      • Altron Document Solutions
      • Altron Systems Integration
      • Arctic Wolf
      • AvertITD
      • CoCre8
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • E4
      • Entelect
      • ESET
      • Euphoria Telecom
      • iKhokha
      • Incredible Business
      • iONLINE
      • LSD Open
      • Maxtec
      • MiRO
      • NEC XON
      • Next DLP
      • Ricoh
      • Skybox Security
      • SkyWire
      • Velocity Group
      • Videri Digital
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • E-commerce
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Metaverse and gaming
      • Motoring and transport
      • Open-source software
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Sections » Information security » Don’t let cyber threats crash your OT/IT party

    Don’t let cyber threats crash your OT/IT party

    Promoted | OT/IT convergence is a challenge for local organisations, which need a comprehensive approach to ensure their networks are secure and resilient.
    By Maxtec18 May 2023
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    Over the past few years, organisations have been combining their operational technology (OT) and IT networks, mainly due to the widespread use of Industry 4.0 and the industrial internet of things (IIoT).

    However, this convergence has led to significant difficulties such as open access, lateral movement, friction between OT and IT teams, poor visibility and management, and alert fatigue.

    To overcome these challenges, organisations need to implement key solutions.

    First, they should identify their assets, classify them and prioritise their value. This involves creating a comprehensive inventory of all network assets, categorising them based on importance to the organisation. By doing so, organisations can focus their security efforts on their most critical assets, ensuring that they receive the appropriate level of protection.

    Analysing traffic and scanning environments for threats and vulnerabilities is essential

    Another critical solution is to segment the network dynamically. This involves dividing the network into smaller, isolated segments that restrict lateral movement and limit the spread of cyberattacks. By creating even smaller segments that restrict communication between devices only to what is required for their intended function, organisations can prevent attackers from moving laterally across the network.

    Analysing traffic and scanning environments for threats and vulnerabilities is essential.

    By monitoring network traffic for suspicious activity such as malware infections, data exfiltration and unauthorised access, organisations can identify vulnerabilities in their network and take steps to address them before they can be exploited by attackers.

    By conducting regular vulnerability scans, organisations can identify potential weaknesses and gaps in their OT and IT systems, including outdated or legacy OT systems.

    Controlling identity and access management is crucial to secure converged networks.

    Robust control

    By implementing a robust access control mechanism that restricts access to sensitive systems and data to authorised personnel only, with a strong authentication and authorisation system that ensures users are who they claim to be, organisations can prevent unauthorised access.

    Furthermore, specialist OT network access control solutions are essential to address the unique security challenges of OT/IT convergence. Traditional NAC solutions primarily designed for IT networks may not adequately cater to the specific requirements and complexities of OT environments.

    Securing wired and wireless access is essential and involves implementing strong encryption and authentication mechanisms for both wired and wireless access points. Network traffic must be monitored to identify any suspicious activity or unauthorised access attempts.

    Endpoint detection and response (EDR) solutions are an integral part of securing converged OT/IT networks. By continuously monitoring endpoints for suspicious activities and behaviours, EDR solutions enable real-time threat detection, incident response and forensics.

    They provide detailed visibility into endpoint activities, allowing for rapid identification and mitigation of advanced threats, thereby bolstering the overall security posture and resilience of OT/IT networks.

    The CISO/CIO plays a crucial role in managing the convergence of OT/IT networks. They are responsible for implementing effective security measures, ensuring compliance with regulations, identifying and mitigating risks and promoting collaboration between IT and OT teams.

    “As more companies work towards IT/OT alignment, the CIO and the IT organisation will be at the forefront of fostering relationships and changing the culture of the organisation,” said Kristian Steenstrup, distinguished analyst and Gartner fellow. “This will require a hybrid of traditional IT and OT skills and development of new intellectual property, while experience external to the company will be tapped into to assist with cross-topic education.”

    OT/IT convergence is a huge risk in South Africa, where organisations are often targeted by cybercriminals due to the perceived weakness of their security systems. This is because many companies in South Africa may not have invested sufficiently in their cybersecurity systems and infrastructure.

    Secondly, the country has a lack of skilled professionals with expertise in both OT and IT systems, which makes it challenging for companies to manage the convergence effectively. Many South African companies may also have outdated or legacy OT systems, which are more vulnerable to cyberattacks.

    Finally, South Africa has a unique regulatory environment, and there may be compliance issues that companies must consider when implementing cybersecurity solutions for OT/IT convergence. All of these factors make OT/IT convergence a challenge for local organisations, which need a comprehensive approach to address these issues and ensure their networks are secure and resilient.

    Speak to Maxtec to see how you or your clients can safeguard critical OT infrastructure from cyber threats. Contact us for a free assessment or a demo and see how you can become a converged OT/IT security leader. Alternatively, visit www.maxtec.co.za or call 011 803 6635.

    • This promoted content was paid for by the party concerned
    Kristian Steenstrup Maxtec
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleEskom warns of stage-8 load shedding this winter
    Next Article Montana to become first US state to ban TikTok

    Related Posts

    DStv makes RWC final stream available for R19.95

    27 October 2023

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    Huawei sees growth in cloud, digital power segments

    27 October 2023
    Add A Comment

    Comments are closed.

    Promoted

    Acsa aims for carbon neutrality by 2050

    27 October 2023

    Flutter vs React Native: a comprehensive comparison

    27 October 2023

    iKhokha, Shopstar pave the way for simpler e-commerce

    27 October 2023
    Opinion

    Big banks, take note: PayShap should be free

    20 October 2023

    Eskom rolling out virtual wheeling – here’s how it works

    4 October 2023

    How blockchain can help defeat the scourge of counterfeit goods

    29 September 2023

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2023 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.