Over the past few years, we’ve all been hearing more about ransomware attacks (where a ransom is required to regain control of your data and systems) and manipulation of industrial control systems (ICS). Now, a recent study shows that these incidents may be more common than you think.
Industrial cybersecurity lessons from the Colonial Pipeline breach. |
Claroty, a supplier of industrial cybersecurity software, conducted a survey of more than 1,000 information technology (IT) and operations technology (OT) security professionals across the United States, Europe, and Asia-Pacific. According to Claroty, more than half (55%) of the organizations surveyed report at least $1B in revenue in industries such as IT hardware, oil and gas, consumer products, electric energy, pharmaceutical/life sciences/medical devices, and automotive.
该研究结果表明,裁员攻击工业组织的攻击已达到新的高度。在全球范围内,80%的受访者经历了攻击,47%表示这影响了运营技术/ ICS环境。超过90%的攻击组织报告的案件近一半(49%)的影响很大或显着。
Listen to this podcast abouthow to determine an appropriate level of cybersecurity for your operations。 |
Responses to the survey also suggest that the ransomware tactic has been very effective for hackers, as 62% of impacted companies report having paid the ransom to regain control of their systems. And 45% of respondents said the ransom was in the $500,000 to $5,000,000 range, with 48% noting the ransom was below $500,000. Nearly 7% indicate the ransom was in excess of $5,000,000.
Of note, 41% of respondents said paying a ransom should be legal if authorities are notified, 28% said it should be legal with no requirement to report, and 21% said ransomware payments should be illegal.
To access the full report from Claroty, visit:https://security.claroty.com/report/global-state-industrial-cybersecurity-survey-2021.。无法访问该报告,但它确实需要输入您的姓名,公司和联系信息。
Read this story aboutsecuring remote access into your plant。 |