Building a Resilient World:
The ISAGCA Blog

Welcome to the official blog of the ISA Global Cybersecurity Alliance (ISAGCA).

This blog covers topics on automation cybersecurity such as risk assessment, compliance, educational resources, and how to leverage the ISA/IEC 62443 series of standards.

The material and information contained on this website is for general information purposes only. ISAGCA blog posts may be authored by ISA staff and guest authors from the cybersecurity community. Views and opinions expressed by a guest author are solely their own, and do not necessarily represent those of ISA. Posts made by guest authors have been subject to peer review.

All Posts

What Do the Recent Cyberattacks on Big Brands Have to Tell Us?

Companies Must Be Attentive to Identifying Weaknesses


Honda and Natura, two publicly traded companies, recently confirmed that they had each suffered a cyberattack.

At Honda, global production of automobiles and motorcycles was suspended to ensure that quality control systems were not compromised. Although most plants have resumed operations, operations in four countries were paralyzed for longer because ransomware would have harmed production systems.

The Brazilian brand Natura reported that some systems in its IT environment were affected, which partially interrupted operations. On 12 June, 2020, Avonone of Natura & Co.s brandswas still evaluating the extent of the attack and said it planned to resume activities on some of the systems later that week.

News like this tends to be more and more recurrent as the “attack surface” expandsthat is, the greater the digitization of business processes, the more likely it is that digital criminals will attack.

“This attack surface is directly proportional to the number of digitalized services and the level of connectivity of companies,” says TI Safe CTO Thiago Branquinho. “In addition, the SEC and CVM, responsible for the capital markets in the United States and Brazil, respectively, have clear guidelines that listed companies need to disclose. Relevant facts to the market and cyber incidents are part of the package.”

In the past three years since WannaCry, cyberattacks have improved. New vulnerabilities are being exploited. Data, in addition to being encrypted, is also stolen. The forms of distribution of malware have expanded with “fileless” attacksin which no copies of files are made to the victim's machine, making identification difficult, and backup storage becomes a measure to prevent the system from returning to operation.

Experts say that ensuring security for companies computer networks is as important as property and work security. “When it comes to business assets, you immediately remember material goods and human beings. Processes, data, and information are part of this triad of security required in the corporate world. The efficient viability of digital processes depends on cybersecurity,” says Thiago.

Weaknesses

The sophistication of techniques, tactics, and intrusion procedures require companies to pay attention to threats and identify weaknesses in the infrastructure that leave loopholes for cyberattacks.

People, technology, and services form the basis of protecting the operations of critical infrastructure industrial systems. Therefore, attention to individuals is essential. Training employees, establishing authorization levels for access to information, and investing in the improvement of IT and TA professionals are ways to protect one end of a companys vulnerabilities.

We recommend the adoption of some additional measures regarding individuals with access to a company's networks:

  • Establish the principle of least privilegeusers must access only what is necessary to carry out their work
  • Make users aware not to open emails from unknown sources, and be wary of attachments from known sources
  • Have a strict policy of using third-party machines and remote access to the networkideally, these networks should be segregated from the corporate environment by a next-generation firewall
  • Perform continuous monitoring of IT and TA security tools to continuously improve controls

 

Interested in reading more articles like this? Subscribe to the ISAGCA blog and receive weekly emails with links to the latest thought leadership, tips, research, and other insights from automation cybersecurity leaders.

Related Posts

Should ISA/IEC 62443 Security Level 2 Be the Minimum for COTS Components?

A recent white paper published by the ISA Security Compliance Institute (ISCI) and its ISASecure certific...
Liz Neiman Apr 23, 2024 5:18:27 PM

How to Secure Machine Learning Data

Data security is paramount in machine learning, where knowledge drives innovation and decision-making. Th...
Zac Amos Mar 12, 2024 11:10:47 AM

Fortifying Your Security Arsenal: A Strategic Approach to Safeguarding OT Security Assets from Adversarial Threats

Introduction Despite investing significant budgets and resources in security products and services. The c...
Mohannad AlRasan Mar 5, 2024 9:17:57 AM