October 8, 2015 By Dave McMillen 2 min read

Endangered Services

Those of us living in developed, industrialized nations may take many modern-day services for granted. Envision this typical end-of-workday scenario: You disembark from a train that arrived on schedule at your final destination. You flip a light switch to illuminate your home. You turn on the tap and clean water flows freely.

These types of ordinary events are expected to be delivered without any hiccups. Now, imagine a world where the delivery of sustained services is suddenly interrupted, increasing the industrial risk and putting your personal safety immediately at risk due to the lack of clean water, the disappearance of electrical power, the interruption of mass transit or even a nuclear meltdown. Suddenly, safety is much harder to achieve, and industrial risk becomes more of a concern.

Vulnerability of Critical Systems

In the last 25 years, big industry has slowly attached itself to the digital age, with the intent of making their production environments much more stable and efficient. Programmable logic controllers that allow authority of industrial equipment are now largely implemented across the globe and are used extensively in almost all industrial processes.

Computerizing these industrial control systems (ICS) has ultimately led to their being highly prized targets for many threat actors, largely because of the amount of damage that can be perpetrated and the resulting chaos that may follow. Stories of such sabotage are legion and frequently make the headlines.

Download the full report: Security Attacks on Industrial Control Systems

Mitigating Industrial Risk

That’s why mitigating the industrial risk to an ICS is increasingly the focus of government and private institutions around the world. Our post-industrial societies are reinventing themselves every single day. Advances in the delivery of power and water systems often go unnoticed by the consumer until a sudden blackout occurs or the tap stops running.

Companies that deliver life-sustaining utilities need to take full responsibility for protecting their own assets and their own consumers. There should be no exceptions, especially because the solution to keeping adversaries out of an ICS is implementation of simple safeguards and risk managers.

IBM’s latest research report, “Security Attacks on Industrial Control Systems,” takes a look at the history of ICS, the susceptibility of these systems to certain attacks and how the systems can be defended.

More from Risk Management

2024 trends: Were they accurate?

4 min read - The new year always kicks off with a flood of prediction articles; then, 12 months later, our newsfeed is filled with wrap-up articles. But we are often left to wonder if experts got it right in January about how the year would unfold. As we close out 2024, let’s take a moment to go back and see if the crystal balls were working about how the year would play out in cybersecurity.Here are five trends that were often predicted for…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today