OT Security Is Mission Critical
Old OT systems are vulnerable to cybercriminal attacks because they were built during “the air-gap age,” a time when there were virtually no connections between OT and IT. Back then, OT networks were able to implicitly trust everything within them.
But, with digital acceleration, an increasing amount of OT devices are connected beyond their network boundaries. A recent study found that nearly 80% of organizations have more than 100 IP-enabled OT devices in their industrial environments. That’s a lot of devices built without security in mind that need to be protected.
And bad actors are taking advantage of unsecured OT devices. In that same study, we found that three-fourths of OT organizations reported at least one intrusion in the last year, and a third had been victims of a ransomware attack in the last year.
Securing OT environments, however, is complex. Deploying point solutions to protect individual connected devices is tempting, but vendor sprawl is expensive and challenging to manage. Organizations must also contend with the convergence of IT and OT and create a security strategy that addresses the differences in these environments and where they blend together.