The Truth About Cybersecurity - 3

S P ON S ORE D BY

CYBERSECURITY

and even cost human lives. The Stuxnet attack
of 2010, the attacks on the Ukrainian power grid
in 2016 and the 2017 WannaCry outbreak are
just a few recent events that highlight the urgent
need for industrial organizations to fully understand and apply cybersecurity best practices.
It's time to rethink how you protect and secure
your operations in the Industrial Digital Age.

TIME FOR INDUSTRIAL
CYBERSECURITY

Cybersecurity defenses strive to thwart
attacks that target and harm operations, assets and individuals. A strong cybersecurity
strategy is increasingly important due to:
ƒƒThe pervasiveness of connectivity across
the plant and its operations, which widens the attack surface.
ƒƒAging critical infrastructure.
ƒƒAging control and safety system technologies.
ƒƒThe proliferation of cybercriminals and
their access to ever-growing tools and
knowledge.
ƒƒAn increase in nation-state and
state-sponsored cyberterrorism.
While Internet and cloud applications are
adding great value to businesses, they also
bring new challenges. A recent McKinsey
report shows that more than 100 billion lines of
code are created annually. Every year, hackers
produce some 120 million new variants of
malware. It's becoming hard to keep up, but
what are our options? Taking advantage of the
business value of the IIoT requires connectivity; and with increased connectivity comes
increased threat. With more portals into your
operations technology (OT) layer, the potential
risks of cyberattack are expanding and so is
their need to be proactively managed.
If your operations are like most manufacturing and process companies, some of the
technology you are using to control and protect
your assets, operations and processes was
designed and installed long before cybersecuri-

SCHNEIDER ELECTRIC
www.schneider-electric.us/

ty was as critical as it is now. Many distributed
control and safety instrumented systems-the
heart of your OT-were installed decades ago.
They were never built to withstand modern
cyberattacks.
Conversely, today's cyberattackers-and
there are more of them each day-leverage
the most advanced technologies and sophisticated tools. Cybercrime is ever evolving, with
cybercriminals constantly developing advanced
technology and skills to compromise your
systems.
For industrial operations, attacks on the OT
layer are unlike traditional cyberattacks. OT-focused cybercriminals are not looking for data to
ransom or sell. They seek to disrupt, even cripple, your operations. They want to manipulate
your plant. They want to create a catastrophe.
In many cases, industrial cyberattackers are not
seeking to embarrass your company, make a
name for themselves or even conduct industrial
espionage. They want to shut you down-at
substantial risk to life and environment.
State-sponsored cyberactivity and
cyberwarfare are increasingly prevalent. Five
years ago, cybersecurity meant guarding
against a hacker who wanted to shut down an
employer's workspace because he got fired.
Maybe an attacker wanted to steal your data to
sell it. Today, state-sponsored actors and terrorists, who have unlimited time and resources, are
causing chaos and harm. And they are targeting
your industrial operation.
The good news is, with a strong cybersecurity strategy that encompasses people,
processes and technology, you can safeguard
your operations and stop would-be attackers in
their tracks.

YOU ARE YOUR BEST DEFENSE

People are your first line of defense. If you
don't have a cybersecurity-awareness program, now is the time to train your employees about cyber-risk and the techniques to
mitigate it. Make sure everyone understands

2

The
Rising
Cost of
Cybercrime
$9.5 million = Average
annual loss from cybercrime
per company worldwide in
2016.

$150 million = Average cost
of a data breach in 2020.

69% of organizations have
experienced attempted or
successful data theft or
corruption by corporate
insiders during the last 12
months.

90% = success rate of
attackers sending as few as
10 phishing emails.

$1 billion = Estimated
total cost of damages from
ransomware attacks using
cryptographic file-locking
software in 2016.
$2 trillion = Cost of
cybercrime to businesses by
2019.
Noteworthy Cybersecurity
Statistics, CyberArk

AUGUST 2018


https://blog.schneider-electric.com/cyber-security/2017/05/05/cybersecurity-business-case-arduous-challenge-part-1/ https://blog.schneider-electric.com/cyber-security/2017/05/05/cybersecurity-business-case-arduous-challenge-part-1/ https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/cybersecurity-training.jsp https://www.schneider-electric.com/en/work/services/field-services/industrial-automation/industrial-cybersecurity/cybersecurity-training.jsp http://www.schneider-electric.us/

Table of Contents for the Digital Edition of The Truth About Cybersecurity

The Truth About Cybersecurity - 1
The Truth About Cybersecurity - 2
The Truth About Cybersecurity - 3
The Truth About Cybersecurity - 4
The Truth About Cybersecurity - 5
The Truth About Cybersecurity - 6
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-jan-feb-2024
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-april-2022
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-october-2021
https://www.nxtbook.com/atp/MaintenanceTechnology/efficient-plant-june-2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epjanfeb2021
https://www.nxtbook.com/atp/MaintenanceTechnology/epjulyaug2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epjune2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epmay2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epfeb2020
https://www.nxtbook.com/atp/MaintenanceTechnology/epjan2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epnovdec2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epseptoct2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epmay2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epfebruary2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epjanuary2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epdecember2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epnovember2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epoctober2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epseptember2019
https://www.nxtbook.com/atp/MaintenanceTechnology/epaugust2018
https://www.nxtbook.com/atp/MaintenanceTechnology/0818schneider
https://www.nxtbook.com/atp/MaintenanceTechnology/epjuly2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epjune2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epmay2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epapril2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epmarch2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epfebruary2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epjanuary2018
https://www.nxtbook.com/atp/MaintenanceTechnology/epdecember2017
https://www.nxtbook.com/atp/MaintenanceTechnology/epnovember2017
https://www.nxtbook.com/atp/MaintenanceTechnology/epoctober2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtsept2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtaugust2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjuly2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjune2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmay2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtapril2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmarch2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtfebruary2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjanuary2017
https://www.nxtbook.com/atp/MaintenanceTechnology/mtdecember2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtnovember2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtoctober2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtseptember2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtaugust2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjuly2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjune2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmay2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtapril2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtmarch2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtfebruary2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtjanuary2016
https://www.nxtbook.com/atp/MaintenanceTechnology/mtdecember2015
https://www.nxtbook.com/atp/MaintenanceTechnology/mtnovember2015
https://www.nxtbook.com/atp/MaintenanceTechnology/mtoctober2015
https://www.nxtbook.com/atp/MaintenanceTechnology/mtseptember2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTAugust2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJuly2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJune2015
https://www.nxtbook.com/atp/MaintenanceTechnology/M
https://www.nxtbook.com/atp/MaintenanceTechnology/0415endress
https://www.nxtbook.com/atp/MaintenanceTechnology/MTApril2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTMarch2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTFebruary2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJanuary2015
https://www.nxtbook.com/atp/MaintenanceTechnology/MTDecember2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTNovember2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTOctober2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTSeptember2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTAugust2014
https://www.nxtbook.com/atp/MaintenanceTechnology/MTJuly2014
https://www.nxtbookmedia.com