https://www.miningweekly.com
Africa|Aggregate|Business|Cutting|Design|Exploration|Financial|first technology|Industrial|Mining|Resources|Safety|SECURITY|Sensor|Services|supply-chain|System|Systems|Technology|Equipment|Products|Solutions
Africa|Aggregate|Business|Cutting|Design|Exploration|Financial|first technology|Industrial|Mining|Resources|Safety|SECURITY|Sensor|Services|supply-chain|System|Systems|Technology|Equipment|Products|Solutions
africa|aggregate|business|cutting|design|exploration|financial|first-technology|industrial|mining|resources|safety|security|sensor|services|supply chain|system|systems|technology|equipment|products|solutions

Robust cybersecurity a fundamental pillar of IIoT

30th July 2019

By: Creamer Media Reporter

     

Font size: - +

Cyber-security has been placed firmly under the spotlight as South Africa prepares for the Fourth Industrial Revolution, or “Industry 4.0”.

“This Industrial Internet of Things (IIoT) will comprise hundreds, thousands and even millions of connected devices and objects that are controlled remotely, while also collecting useful and, in many instances, critical, or sensitive data with the help of various existing technologies. Robust cybersecurity is, therefore, a fundamental pillar and facilitator of Industry 4.0, considering the potential far-reaching negative ramifications of an attack. These range from compromised physical security, equipment, as well as products and services through to devastating financial and reputational losses,” Nico Bezuidenhout, Business Development Manager of First Technology Group, says.

First Technology Group is a leading developer of sophisticated information communications technology products, as well as cutting-edge cyber-security solutions that collect, aggregate, monitor and normalise data from IoT devices to pro-actively mitigate the risk of cyber-attacks.

The company’s scalable, secure, vigilant and resilient integrated solutions are being integrated into organisations’ overall cybersecurity strategies right in the early design phases to ensure high levels of preparedness. These are complemented by First Technology Group’s ongoing strong technical support from a large team of skilled and experienced technicians.

According to experts, the IoT is expected to comprise about 30-billion “things” by 2020 and as many as 50-billion by 2022, and of serious concern to companies and participants in the public sector are those devices with limited or no cyber security. This is in addition to other weak points, such as compromised sensor- and actuator-equipped technologies.

Certainly, one of the biggest challenges in this connected era will be managing the many different security solutions from numerous vendors.

“Organisations have had no other choice but to continuously invest heavily into multiple layers of security technologies due to the ever-evolving nature of cyber threats. This has, in turn, resulted in a serious disconnect between various security solutions,” Bezuidenhout says

“Some global security teams have managed to somewhat resolve this challenge through solutions, such as Artificial Intelligence, Behavioural Analytics and Machine learning. However, I anticipate that more organisations will start adopting synchronised or connected security solutions as the cybersecurity industry matures. These technologies will enable different security controls to ‘talk’ to one another, as well as to share and correlate information.”

Increased collaboration and extended partnerships between companies, as well as their supply-chain vendors will also be a major trend moving forward in various industrial sectors of the economy.

A case in point is the mining industry which has become increasingly vulnerable to cyber-attacks since embarking on a digitisation drive.

Its cyber footprint has grown significantly as a result of the convergence of traditional information technologies (IT) and operational technologies (OT), or otherwise referred to as Industrial Control Systems (ICS).

A hacker could, for example, exploit weaknesses in connected and networked internet protocol and telemetry devices to manipulate machinery and equipment with the intention of causing injuries and even fatalities, resulting in labour disputes and mine stoppages. This

scenario would also have cataclysmic consequences on the overall performance of the business and possibly irreparable damage to the reputation of its brand in the market.

Mining is just one of a number of important industries in the country that is also preparing for the Fourth Industrial Revolution to reduce operating costs, improve productivity and increase safety levels. IIoT is critical to the survival of the African mining industry that has been beset by a range of challenges, including declining commodity prices, labour concerns, increasing input costs, as well as a constantly evolving and volatile global political landscape.

Meanwhile, Bezuidenhout identifies limited capacity in smaller security teams as another stumbling block in the way of a smooth transition into Industry 4.0. This is evidenced by the mainly reactive response to cyber incidences, as opposed to a proactive approach that is informed by a planned robust cybersecurity strategy.

He again refers to mining as an example of an industry where complacency and a false sense of security have prevailed as is evidenced by the large investments made into non-agile security tools and processes. Examples include conventional firewalls, antivirus, intrusion detection and prevention systems that have largely been ineffective in defending against the increasingly sophisticated hacking techniques, such as encryption.

Meanwhile, limited resources have also been misallocated to lesser and more generic threats, as opposed to directing most of the attention to the detection of long dwell cyber-intrusions in both the IT and OT environments.

Certainly, the lack of preparedness of the industry for IIoT is mirrored by the damage that it has already incurred as a result of a host of well-orchestrated cyberattacks.

These include corporate espionage, such as theft of exploration data or sensitive financial information. This is in addition to the robbery of process information, as well as ICS equipment configuration files and specifications.

Worryingly, many cyberattacks have also been launched from within organisations to intentionally remove or sabotage data.

“Hacktivism” is yet another typical form of cyberattack orchestrated against mining houses that are usually committed by individuals, environmentalists, as well as socio- and geo-political organisations with various agendas.

Fraudulent e-mail communication is also a well-known technique that has been used to extort personnel into releasing sensitive information.

Industry 4.0 is critical for the reindustrialisation of South Africa and to raise its ability to compete globally, while also closely aligned with those policies aimed at significantly raising the skills levels of the labour force.

Policymakers also understand the important role that these “cyber-physical systems” are able to play in stimulating the development of new local industries that supply sophisticated services and products.

However, its facilitation is dependent on robust cybersecurity, especially in a country that ranks as the third most exposed in the world to cybercrime.

“If companies are not leveraging the best-of-breed technologies, they will simply not be able to tackle real threats in time. This could cause data loss, critical system downtime, reputational damage and, in extenuating circumstances, imprisonment and hefty fines, in

terms of General Data Protection Regulation and Protection of Personal Information Act regulations. First Technology Group can successfully challenge Industry 4.0 cyber risks with our robust cyber-security solutions,” Bezuidenhout concludes.

Edited by Creamer Media Reporter

Comments

Showroom

Yale Lifting Solutions
Yale Lifting Solutions

Yale Lifting Solutions is a leading supplier of lifting and material handling equipment in Southern Africa. Yale offers a wide range of quality...

VISIT SHOWROOM 
Rio-Carb
Rio-Carb

Our Easy Access Chute concept was developed to reduce the risks related to liner maintenance. Currently, replacing wear liners require that...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Magazine round up | 10 May 2024
Magazine round up | 17 May 2024
17th May 2024

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.267 0.308s - 96pq - 2rq
1:
1: United States
Subscribe Now
2: United States
2: