BusinessCybersecurityNewswireTechnology

Secure OT Systems with Continuous Operations, Not One-Time Fixes

▼ Summary

– 91% of surveyed OT security decision-makers reported at least one cyberattack-related breach or system failure in the past 18 months, causing service disruptions and financial consequences.
– Current OT security approaches are insufficient, with only 40% of organizations having comprehensive cybersecurity strategies covering all interconnected assets and systems.
– Most organizations lack visibility into their OT environments, with 64% unable to see across their connected assets and 71% acknowledging OT as a vulnerable entry point.
– The report advocates shifting from Secure by Design to Secure by Operations, emphasizing continuous monitoring and security throughout the asset lifecycle.
– Implementing Secure by Operations requires dedicated resources, with organizations hiring specialists, training staff, and partnering with MSSPs for monitoring and incident response.

New research reveals a persistent and alarming trend: cyberattacks continue to target operational technology (OT) systems that underpin critical infrastructure. A recent survey of 262 OT security decision-makers found that an overwhelming 91% experienced at least one breach or system failure due to cyber incidents within the past 18 months. These disruptions not only halted essential services but also inflicted lasting reputational harm, regulatory penalties, and significant financial losses.

The study underscores the shortcomings of conventional security methods in OT settings. Although many providers incorporate Secure by Design principles into their products, these measures alone cannot safeguard the intricate, interdependent nature of industrial environments. Experts now advocate for a strategic pivot toward Secure by Operations, an approach emphasizing continuous, lifecycle-wide protection rather than isolated fixes.

Traditional IT security practices often prove inadequate when applied to OT contexts. Survey data indicates that a mere 40% of organizations possess a comprehensive cybersecurity strategy encompassing all interconnected assets. Nearly half are still developing such plans, while 13% operate without any formal strategy. Among those lacking dedicated OT security protocols, over half depend on IT practices that may conflict with the performance and safety demands of industrial systems.

Visibility remains a critical obstacle. Sixty-four percent of respondents admitted they lack full visibility across their connected OT assets and systems. Seventy-one percent recognized that their OT environments serve as vulnerable entry points for broader network attacks. This deficiency in oversight and planning results in operational vulnerabilities: fewer than half of organizations can monitor OT systems continuously, enforce access restrictions to critical assets, or manage security controls like patching throughout an asset’s lifespan. These gaps not only invite attackers but also heighten the risk of misconfigurations that could paralyze vital services.

Industry leaders emphasize that bridging this security divide requires a blend of internal competencies and external collaboration. Specialized, operationally aware expertise is essential to fortify defenses effectively.

Secure by Operations represents an evolution from Secure by Design, extending cybersecurity vigilance beyond initial deployment. This model prioritizes ongoing monitoring, secure configuration management, and clearly defined roles for technology providers, system integrators, and asset owners. By sustaining security controls over time, organizations can diminish their exposure to threats and bolster overall resilience.

Support for this proactive framework is robust. Three-quarters of those surveyed believe adopting Secure by Operations principles is crucial for mitigating future OT cyberattacks. Anticipated benefits include accelerated recovery times, extended asset longevity, reduced capital expenditure, and stronger regulatory compliance.

Implementing such a strategy demands dedicated resources and specialized knowledge. Many firms are responding by hiring OT security specialists, upskilling current personnel, and engaging managed security service providers (MSSPs). These partnerships offer vital capabilities, such as continuous monitoring, compliance assistance, and incident response, that are challenging to develop in-house.

(Source: HelpNet Security)

Topics

ot cyberattacks 95% secure operations 92% security breaches 90% cybersecurity strategies 88% visibility issues 87% it security shortcomings 85% external partnerships 84% asset management 83% Resource Allocation 82% monitoring challenges 82%