News By Tag
News By Location
Big Data Security in Manufacturing
Big Data, therefore, isn't just the domain of manufacturing CIOs. More and more CFOs are taking notice of the power of Big Data to cut costs, increase productivity and turn a bigger profit for shareholders, while simultaneously increasing brand-name recognition & building customer loyalty. Given their responsibility for maintaining control over financial reporting and planning for the future, manufacturing CFOs must also be able to track information across all sectors of the supply chain, from inventory to distribution centers, even when the supply chain is scattered across multiple floors in multiple factories on multiple continents.
And yet anywhere there is data, there are thieves trying to steal or otherwise compromise that data. Although security threats vary depending on what products a company makes, intellectual property and trade secrets will always be a source of temptation for hackers and other cyber criminals. Given the ever-increasing shrewdness & temerity of cyber-criminals, manufacturers should not just prepare for but expect to be targets.
Indeed, the Global State of Information Security Survey of 2015 found that three quarters of industrial manufacturing companies had detected security incidents over the past 12 months, and about 20% said they detected 50 or more such incidents. Stolen, damaged or otherwise compromised were employee records, personally identifiable information about customers or partners, internal records & soft intellectual property such as processes and institutional knowledge. Nearly 40 percent of those manufacturers attributed current or former employees as the likely source of the breach.
Complicating matters is the sheer number & complexity of global manufacturing operations, which often creates a fragmented data landscape that is difficult to secure. The same Industry trends that make manufacturing more streamlined - such as the Internet of Things (IoT) and Bring Your Own Device (BYOD) - also increase exponentially the potential for cyber attacks to occur.
Such attacks, whether through cyber espionage or distributed denial of service (DDOS) and Web application attacks, can wreak havoc on a manufacturing company's reputation, operations & bottom line, not to mention the consequences that arise if equipment is compromised and employees' lives are put at risk. If the breach is severe enough, a company might never regain losses - a fate made all the more painful if the fault lies with the manufacturer itself for not taking appropriate data security measures.
At the application level, any company with a notable online presence is vulnerable to a security breach. Hackers often go after a company's website or applications with denial-of-service attacks, which can greatly impact operations throughout the supply chain. According to the IBM X-Force Threat Intelligence report, these attacks were second in frequency only to SQL injection, and in some cases they are even politically motivated. Manufacturing, unlike banking or other sectors, wouldn't seem to be a natural target for politically motivated cyber attacks, but the recent experience of several agricultural equipment manufacturers proves otherwise. The manufacturers - one of which made logging equipment and another weaponized bulldozers used by resettlement operations in the Middle East - demonstrate that nearly any company can find itself under attack by not only those looking to make fast money, but also those looking to prove a point.
Cyber attacks can also affect manufacturing operations on a transactional level. The real-time or near real-time transaction processes in typical Industrial Control Systems - fetching information about current inventory, for example - affords little tolerance for long periods where services are unavailable. However, security controls & solutions for preventing such transactional latency must often be tested off-line in a non-production environment, which is not ideal for either data defense or manufacturing operations.
Furthermore, security components designed to protect data transactions are routinely neglected for years or even decades, causing them to be outdated & vulnerable to attack. These breaches are sometimes not detected for months, which can compromise a company's financial bottom line. One rule of thumb that many industries have learned the hard way is that the longer it takes a company to discover a security breach, the greater the loss in data & the greater the costs associated with fixing the problem and making things right.
At the level of infrastructure, legacy equipment is often a primary target for hackers. An ever-growing number of corporate assets and products are now linked via IoT, which provides a rich source of data for manufacturers in terms of remote asset tracking, fleet management & performance monitoring, among other data, but also presents an irresistible temptation for those with bad intentions. Security must therefore be addressed not only in security networks, but also in industrial automation systems, sensors & other technologies used to track and monitor products and machines & devices in the field.
RoundWorld Solutions Big Data 360-degree Tool can provide manufacturers with a more granular approach to diagnosing & correcting Big Data security flaws. Our customizable, top-down tool will also make it possible for you to safeguard customer information and meet regulatory compliance requirements while maintaining "business as usual" operations, allowing you to keep your cost footprint low and your company's reputation intact.
This article was provided by:
Public Information Officer
For more information on ICCG or our CXO Interview Panel, please contact:
Emi Hara, MBA, VP of Solutions & Delivery
Page Updated Last on: May 15, 2016