Chart your secure cyber path
Cyber security insights to strengthen resilience, drive growth and prepare for what’s next
Historically, operational technology (OT) has primarily mattered to traditional sectors like manufacturing, energy, transportation, etc. Today, however, any business with any sort of physical presence relies on OT, whether for HVAC systems, inventory management, or security and access. Historically isolated, OT has become increasingly digitised over the years, with technologies like Supervisory Control and Data Acquisition (SCADA) systems enabling real-time monitoring and automation.
However, this shift has increasingly expanded the tech surface, both physically and digitally, expanding cyber vulnerability with it. In 2024, Fortinet reported that 73% of organisations experienced an intrusion that impacted OT, up from 49% the previous year. As systems become more interconnected and interdependent, largely due to OT’s convergence with IT and IoT, the potential impact of a breach has increased massively. And with new hardware being lowest on the cyber security priority list for C-Suite leaders this year, legacy assets will require more protection than ever to avoid disruption.
Modern OT environments are no longer isolated, despite often operating on decades-old technology with limited cyber security protections. Unlike software-centric IT assets, OT hardware, such as industrial control systems (ICS), often has lifespans exceeding 20 years. Retrofitting these systems with modern security controls can be costly and technically challenging, so to maximise efficiency, businesses integrate OT with enterprise IT networks and IoT devices, creating interconnected ecosystems, inadvertently creating new entry points for attackers.
Whilst this improves operational visibility and efficiency, it also blurs the boundaries between administrative and production systems. Cyber attackers can exploit these connections to pivot from IT networks to OT systems, enabling physical disruption. For instance, unpatched vulnerabilities in third-party IoT gateways have been exploited to infiltrate manufacturing systems.
Geopolitical threats amplify these risks. Critical infrastructure operators – energy providers, water treatment facilities and transportation networks, for example – are prime targets for state-sponsored actors seeking to destabilise services. In 2021, a ransomware attack on a US fuel pipeline caused widespread shortages, demonstrating how OT breaches can have real-world consequences. Enisa in the EU has reported documented incidents of state-sponsored DDoS attacks against utility companies and other critical infrastructure.
The proliferation of IoT devices in OT environments introduces three notable risks:
To effectively reap the benefits of IoT without creating unacceptable cyber risk, IoT should be assessed for cyber risk like any other piece of technology, and mitigating action taken where necessary. For example, enforcing network segmentation to isolate IoT devices from critical OT and IT systems, requiring multi-factor authentication for device access, and conducting regular firmware updates and vulnerability assessments.
As OT becomes increasingly digitised, whether through the introduction of new assets or the connection of old assets to other systems, the associated cyber risk should be assessed and addressed like any other technical system in the organisation. Here are some tips for doing this effectively:
The digitisation of OT has unlocked unprecedented efficiency, but it has also introduced new systemic risks. As cyber-physical attacks grow more sophisticated, organisations must move beyond reactive measures. By integrating OT into broader cyber security strategies, enforcing segmentation and modernising legacy systems in a cyber-conscious way, businesses can safeguard their operations.
Explore how to chart your secure cyber path here or contact our experts to learn more.
This website uses cookies.
Some of these cookies are necessary, while others help us analyse our traffic, serve advertising and deliver customised experiences for you.
For more information on the cookies we use, please refer to our Privacy Policy.
This website cannot function properly without these cookies.
Analytical cookies help us enhance our website by collecting information on its usage.
We use marketing cookies to increase the relevancy of our advertising campaigns.