We use cookies on this website to provide a user experience that’s more tailored to you. By continuing to use the website, you are giving your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.

 I accept

Blog

Your Trusted ICT Solution Partner > Blog
2021-05-14

Enterprise Information Security: Evolving Ransomware Threats to OT Networks

The largest fuel pipeline company in the United States was reported being attacked by Ransomware, and shut down all four of its major pipelines that serve the country. The hacker group called DarkSide infiltrated the pipeline’s network, extracted about 100GB of data, and threatened to leak the data onto the Internet. It demanded nearly US$5 million in order to decrypt all computers, servers and networks.

The cyberattacks on Operational Technology (OT) networks are increasing in frequency and severity, mainly due to the higher availability requirements of utilities and manufacturing industries. Due to the nature of business that requires continuous operation 24/7, there is nearly no downtime for IT infrastructure maintenance and system updates. The lack of important security updates, patches and features may cause the systems and networks vulnerable to cybersecurity threats. Another fact is such companies are more willing to pay a ransom in exchange for the opportunity to resume business after an attack, which makes the OT networks more vulnerable to cyberattacks.

In fact, the aging of OT infrastructure and the lack of effective network security solutions are the main reasons for the increase in vulnerabilities in Industrial Control Systems (ICS) and IoT infrastructure. According to Claroty's latest report, compared with the first half of 2020, ICS vulnerabilities increased by 33% in the second half of 2020, of which 71% were network vulnerabilities. In order to avoid ransomware attacks, companies should deploy OT and IT network security solutions as soon as possible to ensure network compliance, security, control and binding with industry standards. Effective ICS security solutions which consist of industrial firewall, sandbox, unified management platform, and next-generation firewall, can fully protect the OT networks from ransomware attacks and maintain business continuity.

3 Steps to defend against Ransomware: Detect, Intercept & Response! Read the related article

Analytic-driven Approach is the Solution to Cybersecurity Threats

The network convergence of OT and IT is on the rise. While protecting the security of OT systems, IT security is also unneglectable. In order to cope with the ever-changing cybersecurity threats, companies can adopt analytics-driven cybersecurity solutions, collecting big data from proactive monitoring of networks, systems and users for further analysis. These analytics help identify vulnerabilities and anomalies more accurately for remediation actions.

How can analytic-driven cybersecurity solutions close the security gap? Read the related article

CITIC Telecom CPC is ready to provide customers with comprehensive managed security services at any time. TrustCSI™ MSS solutions make use of the advanced Security Information and Event Management (SIEM) technology to detect vulnerabilities and prioritize threats for timely remediation actions. These processes allow customers to review and refine their network security measures to strengthen their capabilities to respond to cyberattacks. Please feel free to contact our security consultants for a free security consultation! For more information about TrustCSI™ 2.0 Information Security solutions, please click here.

Hot Articles

SD-WAN Reshapes Businesses and Breaks New Grounds in Connectivity

Data-driven Economy as the Future: Reforming Traditional Business

China's New Infrastructure Fuels Digital Transformation

Evolving Ransomware: A Multi-pronged Approach to Secure Your Business

Build Competitive Advantage by Intelligently Unleashing Data Values

Share this post
Select Tags

ALL AI Big Data Business Insights Cloud Connectivity Customer Experience Data Centers Data Privacy EdTech Featured Greater Bay Area Information Security Innovation New Normal OBOR SD-WAN Transformation
Related Products

If you would like to learn more about the topic, please leave us your information and we will contact you shortly.

Contact Us

Products & Services
Private Network Information Security Cloud Solutions Cloud Data Center Internet Services Managed Services Europe & CIS Solutions
Solutions
Architecture, Engineering & Construction Automobile Banking & Finance e-Commerce Logistics and Transportation Manufacturing Professional Services Retail Trading Others
Customer Service
Customer Login Services Hotline Service Center Customer Charter
Resources Center
Product Leaflets New Offering Videos White Paper Success Stories
About Us
Our Company Our Partners News Center Accreditation & Awards Success Stories Videos Contact Us Careers Blog COVID-19
Contact Us

Contact Us

General Enquiry 852 2170 7101

Sales Hotline 852 2170 7401

Contact Us

Follow Us

Sitemap | Disclaimer | Net Abuse Policy | Privacy Policy | Cookie Policy | Terms & Conditions

中信集團品牌認證 | 中信雲賦能
Copyright © 中信國際電訊(信息技術)有限公司 CITIC Telecom International CPC Limited

Follow Us

Welcome to CITIC Telecom CPC

You are about to visit our website

Please choose a location:

South Africa

South America

US & Canada

China Entercom

Asia Pacific
Europe & CIS
South Africa
South America
US & Canada
Need help? Chat with CPC Chatbot
Supported browsers: Latest versions of IE11, Firefox, Chrome and Safari.
Terms & Conditions
Welcome to CITIC Telecom International CPC Limited. Your conversation with CPC Chatbot may be recorded for training, quality control and dispute handling purposes. By clicking “Continue” and using CPC Chatbot, you accept and agree to be bound by our Privacy Policy and give your consent to receive cookies on this site. Read more about our Cookie Policy and Privacy Policy.
Continue