{"id":453,"date":"2024-09-09T08:22:21","date_gmt":"2024-09-09T13:22:21","guid":{"rendered":"http:\/\/ause1wordpress01.aws.mot-solutions.com\/en_us\/?p=453"},"modified":"2024-10-08T12:01:41","modified_gmt":"2024-10-08T17:01:41","slug":"industrial-iot-cybersecurity","status":"publish","type":"post","link":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/","title":{"rendered":"The Dark Side Of The Industrial IoT: 4 Cybersecurity Scenarios To Consider And How They Can Be Avoided"},"content":{"rendered":"<div>\n<p>The Industrial Internet of Things (IIoT) is the environment where smart sensors connected to objects give those objects a \u2018digital voice\u2019. It\u2019s a voice that allows them to autonomously connect and share data with one another \u2013 and the back office \u2013 over an IP connection. With the increased adoption of IIoT, the world is becoming more connected, presenting great benefits for communication efficiency, but also posing significant risks when bridging technologies that were not initially designed for such connectivity.<\/p>\n<p>&nbsp;<\/p>\n<p>Every company is susceptible to cyber attacks. There are various motives for and mediums through which people can wrongfully access a network. When this is applied to industries that rely on SCADA or machine-to-machine (M2M) communications&#8211;like oil and gas, utilities, water\/wastewater and mining&#8211;the risk is amplified, as those operations were not initially built for this new highly connected world. While this danger is real, so are the solutions to keep an agency protected. Take the following scenarios for example:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"float: right\" src=\"\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/scada-systems-cyberattack-risk.jpg\" alt=\"scada-systems-cyberattack-risk\" width=\"250\" height=\"131\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cause<\/strong>: A disgruntled insider with a malicious motive to hurt the organization, or an unknowing team mate that accesses confidential information on an unsecure wifi hotspot brings malware into the network.<br \/>\n<strong>Effect<\/strong>: Control systems that were designed to be easily customizable, and many newer solutions which are standards-based and \u201coff the shelf\u201d, are vulnerable to malware attacks because they have multiple points of entry, or are built on open platforms that are more easily accessible in this IP environment. Production slows or comes to a halt, and <a class=\"jive-link-external-small\" href=\"http:\/\/www8.hp.com\/us\/en\/software-solutions\/ponemon-cyber-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\">results in an average cost of $213,542 per attack to a company<\/a>.<br \/>\n<strong>Solution<\/strong>: Basic security measures, like firewalls, antivirus software, encryption, unused port deactivation, and secured programming can help keep authorized personnel in control and information secure.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cause<\/strong>: Criminals, enemy states, or industry competitors looking for proprietary intelligence or financial information phish for information by using fake usernames, accounts, or requests for details under the illusion of being trustworthy.<br \/>\n<strong>Effect<\/strong>: A \u201cnot-so-closed\u201d network, or a workforce uneducated on phishing risks share sensitive information, putting people and operations in danger, at <a class=\"jive-link-external-small\" href=\"http:\/\/www8.hp.com\/us\/en\/software-solutions\/ponemon-cyber-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\">an average cost of $45,959 per attack to a company<\/a>.<br \/>\n<strong>Solution<\/strong>: Enabling access controls, which can be general, or role-based, identifying intrusions with man-in-the-middle protection and educating employees on the risks can protect information from seemingly \u201csafe\u201d impostors.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cause<\/strong>: Bot-Networks run by lone programmers or the cyber underground use advanced persistent threats (APT) to coordinate attacks on a system for glory, financial gain, or simply to disrupt normal service.<br \/>\n<strong>Effect<\/strong>: With intrusions coming from multiple angles, systems built with a single security layer, or with lack of security within the system itself are easily exploited, and an entire operation can go down, or become controlled by outsiders.<br \/>\n<strong>Solution<\/strong>: Set firewalls, monitor activity, whitelist authorized applications, and regularly audit data for abnormalities. This keeps you aware of who is traversing your system, and when an intruder seeks unauthorized access.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Cause<\/strong>: For the thrill of disrupting others, as a part of a larger scale attack, or to just intentionally wreck havoc, terrorists can paralyze a network.<br \/>\n<strong>Effect<\/strong>: A denial of service attack can incapacitate a system by inundating it with useless traffic. It exploits weaknesses in the system to disrupt operations, at <a class=\"jive-link-external-small\" href=\"http:\/\/www8.hp.com\/us\/en\/software-solutions\/ponemon-cyber-security-report\/\" target=\"_blank\" rel=\"nofollow noopener\">an average cost of $166,545 per attack to companies.<\/a><br \/>\n<strong>Solution<\/strong>: Attacks with pure mal-intent are often highly sophisticated, but application control software (whitelisting software) allowing only pre-identified programs to run and time-window command limits can block pernicious activity.<\/p>\n<p>&nbsp;<\/p>\n<p>The Industrial Internet of Things (IOT) has the potential to revolutionize operations by automating complex processes, communicating data to teams in the field or back office, alerting of potential issues before they come to fruition and enabling organizations to take greater control to work smarter. However, if a system is not prepared for increased connectivity, the results can be disastrous.<\/p>\n<p>&nbsp;<\/p>\n<p>Fortunately, as connectivity has improved, so have the ways to keep information and operations secure. Motorola\u2019s <a class=\"jive-link-external-small\" href=\"http:\/\/www.motorolasolutions.com\/en_us\/products\/industrial-internet-of-things\/scada\/ace3600-rtu.html?utm_medium=blog&amp;utm_source=fresh_ideas_enterprise&amp;utm_campaign=Q415_%20NA_%20MUL_%20CO_%20DR_%20SOC_%20MUL_%20AB_%20cybersecurity_iiot-threats\" target=\"_blank\" rel=\"nofollow noopener\">ACE3600<\/a> aims to make automation and monitoring of your complex processes seamless and secure with a variety of security features built in and <a class=\"jive-link-external-small\" href=\"http:\/\/www.networkworld.com\/article\/2188423\/data-center\/u-s--israel-project-with-motorola-leads-to-security-hardened-industrial-control-system.html\" target=\"_blank\" rel=\"nofollow noopener\">certified both internationally and domestically<\/a>. Furthermore, by running your SCADA or M2M data over an <a href=\"https:\/\/www.motorolasolutions.com\/en_us\/products\/p25-story.html\">ASTRO 25 network<\/a> you can take advantage of many of the same end-to-end security features applied to your voice communications.<\/p>\n<p>&nbsp;<\/p>\n<p>Learn more about the ACE3600, our secure networks and Motorola\u2019s entire IIoT portfolio by visiting <a class=\"jive-link-external-small\" href=\"http:\/\/www.motorolasolutions.com\/en_us\/products\/industrial-internet-of-things.html?utm_medium=blog&amp;utm_source=fresh_ideas_enterprise&amp;utm_campaign=Q415_%20NA_%20MUL_%20CO_%20DR_%20SOC_%20MUL_%20AB_%20cybersecurity_iiot-threats\" target=\"_blank\" rel=\"nofollow noopener\">www.motorolasolutions.com\/industrialiot<\/a>.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"The Industrial Internet of Things (IIoT) is the environment where smart sensors connected to objects give those objects a \u2018digital voice\u2019. It\u2019s a voice that allows them to autonomously connect and share data with one another \u2013 and the back office \u2013 over an IP connection. With the increased adoption of IIoT, the world is&#8230; <a class=\"btn-featured test\" href=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/\" data-uet=\"{&#39;event_category&#39;:&#39;blog featured post interaction&#39;,&#39;event_action&#39;:&#39;blog read more button click&#39;,&#39;event_label&#39;:&#39;The Dark Side Of The Industrial IoT: 4 Cybersecurity Scenarios To Consider And How They Can Be Avoided&#39;,&#39;event_page_area&#39;:&#39;body&#39;,&#39;restriction_status&#39;:&#39;public&#39;,&#39;link_text&#39;:&#39;The Dark Side Of The Industrial IoT: 4 Cybersecurity Scenarios To Consider And How They Can Be Avoided&#39;,&#39;link_url&#39;:&#39;https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/&#39;,&#39;tealium_event&#39;:&#39;link_click&#39;,&#39;page_type&#39;:&#39;&#39;}\" >Read More<\/a>","protected":false},"author":11,"featured_media":455,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3],"tags":[],"class_list":["post-453","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-energy-industries"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity &amp; The Darkside of Industrial IOT - Motorola Solutions<\/title>\n<meta name=\"description\" content=\"The adoption of industrial IoT presents great benefits for communication efficiency, but also poses significant cybersecurity risks. Learn more at MotorolaSolutions.com.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity &amp; The Darkside of Industrial IOT - Motorola Solutions\" \/>\n<meta property=\"og:description\" content=\"The adoption of industrial IoT presents great benefits for communication efficiency, but also poses significant cybersecurity risks. Learn more at MotorolaSolutions.com.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Motorola Solutions Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MotorolaSolutions\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-09T13:22:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T17:01:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"330\" \/>\n\t<meta property=\"og:image:height\" content=\"184\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:site\" content=\"@motosolutions\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/\",\"name\":\"Cybersecurity & The Darkside of Industrial IOT - Motorola Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg\",\"datePublished\":\"2024-09-09T13:22:21+00:00\",\"dateModified\":\"2024-10-08T17:01:41+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"The adoption of industrial IoT presents great benefits for communication efficiency, but also poses significant cybersecurity risks. Learn more at MotorolaSolutions.com.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg\",\"contentUrl\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg\",\"width\":330,\"height\":184,\"caption\":\"The-Darkside-of-Industrial-IoT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Dark Side Of The Industrial IoT: 4 Cybersecurity Scenarios To Consider And How They Can Be Avoided\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website\",\"url\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/\",\"name\":\"Motorola Solutions Blog\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity & The Darkside of Industrial IOT - Motorola Solutions","description":"The adoption of industrial IoT presents great benefits for communication efficiency, but also poses significant cybersecurity risks. Learn more at MotorolaSolutions.com.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity & The Darkside of Industrial IOT - Motorola Solutions","og_description":"The adoption of industrial IoT presents great benefits for communication efficiency, but also poses significant cybersecurity risks. Learn more at MotorolaSolutions.com.","og_url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/","og_site_name":"Motorola Solutions Blog","article_publisher":"https:\/\/www.facebook.com\/MotorolaSolutions","article_published_time":"2024-09-09T13:22:21+00:00","article_modified_time":"2024-10-08T17:01:41+00:00","og_image":[{"width":330,"height":184,"url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@motosolutions","twitter_site":"@motosolutions","twitter_misc":{"Written by":"","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/","name":"Cybersecurity & The Darkside of Industrial IOT - Motorola Solutions","isPartOf":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg","datePublished":"2024-09-09T13:22:21+00:00","dateModified":"2024-10-08T17:01:41+00:00","author":{"@id":""},"description":"The adoption of industrial IoT presents great benefits for communication efficiency, but also poses significant cybersecurity risks. Learn more at MotorolaSolutions.com.","breadcrumb":{"@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#primaryimage","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg","contentUrl":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-content\/uploads\/sites\/3\/2018\/09\/The-Darkside-of-Industrial-IoT.jpg","width":330,"height":184,"caption":"The-Darkside-of-Industrial-IoT"},{"@type":"BreadcrumbList","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/industrial-iot-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog-test.motorolasolutions.com\/en_us\/"},{"@type":"ListItem","position":2,"name":"The Dark Side Of The Industrial IoT: 4 Cybersecurity Scenarios To Consider And How They Can Be Avoided"}]},{"@type":"WebSite","@id":"https:\/\/blog-test.motorolasolutions.com\/en_us\/#website","url":"https:\/\/blog-test.motorolasolutions.com\/en_us\/","name":"Motorola Solutions Blog","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog-test.motorolasolutions.com\/en_us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/comments?post=453"}],"version-history":[{"count":1,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/453\/revisions"}],"predecessor-version":[{"id":2321,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/posts\/453\/revisions\/2321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media\/455"}],"wp:attachment":[{"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/media?parent=453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/categories?post=453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog-test.motorolasolutions.com\/en_us\/wp-json\/wp\/v2\/tags?post=453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}