• Latest
  • Trending
  • All
  • News
  • Business
  • Politics
  • Science
  • World
  • Lifestyle
  • Tech

The role of cyber security in the manufacturing environment

July 1, 2016
IPR’s Dewatering Plan Saves the Day at Iron Ore Mine

IPR’s Dewatering Plan Saves the Day at Iron Ore Mine

March 28, 2023
Pilot Crushtec Recognised Again as Top Metso Dealer

Pilot Crushtec Recognised Again as Top Metso Dealer

March 28, 2023
advertisement
ADVERTISEMENT
Digital Industries (Pty) Ltd Signs an AVEVA Select Partnership Agreement to Grow Its Footprint in The East and West Africa Regions

Digital Industries (Pty) Ltd Signs an AVEVA Select Partnership Agreement to Grow Its Footprint in The East and West Africa Regions

March 28, 2023
Flexible Power Technologies Will Make Africa’s Energy Leapfrogging a Reality

Flexible Power Technologies Will Make Africa’s Energy Leapfrogging a Reality

March 22, 2023
Critical Steps to Mitigate Harmonic Distortion

Critical Steps to Mitigate Harmonic Distortion

March 20, 2023
Energising Mine Closure Through Renewables

Energising Mine Closure Through Renewables

March 17, 2023
Senegal’s Emblematic 130 MW Malicounda Power Project Fully Operational

Senegal’s Emblematic 130 MW Malicounda Power Project Fully Operational

March 16, 2023
Dekra Institute of Learning Strengthened by Independent Examinations Board (IEB)

Dekra Institute of Learning Strengthened by Independent Examinations Board (IEB)

March 16, 2023
Success in Partnership – Schneider Electric and 4Sight to Implement a Value Chain Optimisation Solution at SA Mine

Success in Partnership – Schneider Electric and 4Sight to Implement a Value Chain Optimisation Solution at SA Mine

March 16, 2023
New High-Performance Circle for Cat® 24 and 24M Motor Graders

New High-Performance Circle for Cat® 24 and 24M Motor Graders

March 12, 2023
Celebrating Equal Opportunities: Three ABB South Africa Women Share Their Inspirational Stories

Celebrating Equal Opportunities: Three ABB South Africa Women Share Their Inspirational Stories

March 12, 2023
Nearly 1,500 Tons of Drilling Material from the U.S. Up for Public Auction

Nearly 1,500 Tons of Drilling Material from the U.S. Up for Public Auction

March 12, 2023
  • About AMB
  • Magazine Archive
  • Contacts
Tuesday, March 28, 2023
African Mining Brief
No Result
View All Result
  • Login
  • Home
  • News
  • Events
  • Industry
  • People
  • Projects
  • Press Releases
  • Magazine Archive
MAGAZINE ARCHIVE
ADVERTISE
  • Home
  • News
  • Events
  • Industry
  • People
  • Projects
  • Press Releases
  • Magazine Archive
No Result
View All Result
African Mining Brief
No Result
View All Result
  • Home
  • News
  • Events
  • Industry
  • People
  • Projects
  • Press Releases
  • Magazine Archive
Home Cyber Crimes

The role of cyber security in the manufacturing environment

by Newton Mthethwa
July 1, 2016
in Cyber Crimes, News, Opinions, security, Technology
0
491
SHARES
1.4k
VIEWS
Share on FacebookShare on Twitter

Cyber security has become an integral component of any organisational strategy. With intellectual property becoming even more essential in a highly competitive world, no company can afford not to ensure that this critical asset is protected. For manufacturers, with complex supply chains, the need to prioritise security is even more important, says Tiaan van Schalkwyk at Deloitte South Africa.

“The world is becoming increasingly connected. As new mobile devices are released and more bandwidth becomes available, employees are more reliant than ever on accessing sensitive corporate data irrespective of their physical location. Business is well and truly real-time but what impact does this have on security, especially in such a dynamic environment as manufacturing?”

One of the biggest challenges is to ensure that security of information technologies is included in all operations. The complexity of this cannot be underestimated. Systems and networks used in manufacturing environments have significantly more stringent requirements than those used in a general office.

“Manufacturers need to have the peace of mind that the safety, availability, and reliability of all aspects of their systems are nigh on guaranteed. Furthermore, the temptation exists to compromise on the security of some part of the chain in favour of usability. This does place the entire system at risk. But even if this is not the case, it is only a matter of when and not if a manufacturer will be compromised.”

Preventative measures are good, but does the organisation have the capability in place to alert the right people when an attack occurs? Even better, proactively warn of an impending attack. The frightening thing is that companies, manufacturers included, too frequently only discover that the network has been breached months, and in some instances years, after the fact. The financial and reputational impact this will have can be significant for the organisation and its directors.

“But even before OT (operational technology) security systems are put in place or upgraded, decision-makers need to conduct a cyber-security assessment. This enables them to better understand the threats and also gain insight into what the capabilities of the organisation are when it comes to cyber security.”

Adding to the pressure is the fact that an OT security breach in a manufacturing environment could potentially impact safety. Imagine the consequences of a malicious person impacting the behaviour of a machine or any part of the supply chain process. This means no manufacturer can leave OT security as something that only happens in the virtual realm. The threat to physical operations is also very real.

In this environment, preventative measures are no longer good enough. Manufacturers need to get ahead of the cyber security challenge and look at ways of being more pro-active.

“Developing more advanced monitoring and risk intelligent response capabilities provides some of the steps required to be more agile when it comes to security in a manufacturing environment. When it comes to cyber risk, it is essential to be vigilant and remain as secure as possible. This aids the manufacturer in becoming more resilient to any potential attacks both from a pro-active and a reactive basis.”

 

Tags: Cyber securityDeloitte South AfricaOT (operational technology) security systemsTiaan van Schalkwyk
Share196Tweet123Share49
Newton Mthethwa

Newton Mthethwa

Jan - March 2023 Magazine

  • About AMB
  • Magazine Archive
  • Contacts

© 2022 African Mining Brief I All Rights Reserved Powered by Clivo.

No Result
View All Result
  • Home
  • News
  • Events
  • Industry
  • People
  • Projects
  • Press Releases
  • Magazine Archive

© 2022 African Mining Brief I All Rights Reserved Powered by Clivo.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In