Cyber Savvy: Securing Operational Technology Assets
Businesses with OT networks need to be in a position to assess, identify and rectify cyber security vulnerabilities if they are to prevent malicious attacks that exploit these flaws. PwC's latest article draws on experience conducting cyber security assessments and penetration tests across the globe to identify the 10 most common security flaws in OT networks.
Business leaders who have security as part of their overall business strategy discussion are better positioned to balance the technologies, processes and resources needed to anticipate constantly evolving cyber risks.
The term ‘operational technology’ (OT) refers to the hardware and software used to control industrial processes and infrastructure, particularly in industries such as energy, mining, utilities, manufacturing and transport. A cyber-attack on an OT environment can have serious and wide ranging consequences beyond just financial losses – including prolonged outages of critical services, environmental damage and even the loss of human life. There are highly skilled and motivated adversaries actively seeking to exploit the security weaknesses in OT networks, process control systems and critical infrastructure. Their motivations range from economic benefit and espionage through to malicious disruption and destruction.