Tuesday, April 23, 2024
-Advertisement-
Reimagining Public Sector Analytics
Reimagining Public Sector Analytics
HomeNewsCyber SecuritySix cybersecurity weaknesses that competitors can use to undermine your business

Six cybersecurity weaknesses that competitors can use to undermine your business

Follow Tech Observer on Google News

Unauthenticated protocols, outdated hardware, weak user authentication, weak file integrity checks, vulnerable windows operating systems, undocumented third-party relationships may help your adversaries undermine your industrial operations, says FireEye.

Google News

firm said that six key weaknesses which include unauthenticated protocols, outdated hardware, weak user authentication, weak file integrity checks, vulnerable windows operating systems, undocumented third-party relationships can be used by adversaries to undermine industrial operations. Industrial enterprises including electric utilities, petroleum companies, and manufacturing organisations invest heavily in industrial control systems (ICS) to efficiently, reliably, and safely operate industrial processes. “Without the technology operating the plant floor, their business doesn't exist. Board members, executives, and security officers are often unaware that the technology operating the economic engine of their enterprise invites undetected subversion,” said FireEye.

The company said that there are six weaknesses – unauthenticated protocols, outdated hardware, weak user authentication, weak file integrity checks, vulnerable windows operating systems, undocumented third-party relationships – which industrial firm need to address in order to mitigate any cybersecurity attack.

“Industrial plants have quickly become much more reliant on connected systems and sensors for their operations, yet the cyber security of most plants is not nearly as strong as it needs to be. As industrial initiatives such as Make in India progress, a clear understanding of the common weaknesses in plant environments will help corporate boards, executives and security officers engage in knowledgeable conversation about security, ask discerning questions, and make sound investments,” , Chief Technology Officer for APAC, FireEye said in a statement.

Unauthenticated protocols: When an ICS protocol lacks authentication, any computer on the network can send commands that alter the physical process. This may lead to incorrect process operation, which damages goods, destroys plant equipment, harms personnel, or degrades the environment, said cybersecurity firm.

Outdated hardware: ICS hardware can be operational for decades. This hardware may operate too simplistically or lack the processing power and memory to handle the threat environment presented by modern network technology.

Weak user authentication: User authentication weaknesses in legacy control systems often include hard-coded passwords, easily cracked passwords, passwords stored in easily recoverable formats, and passwords sent in clear text. An attacker who obtains these passwords can often interact with the controlled process at will.

Weak file integrity checks: Lack of software signing allows attackers to mislead users into installing software that did not originate from the vendor. It also allows attackers to replace legitimate files with malicious ones.

Vulnerable Windows operating systems: Industrial systems often run unpatched Microsoft Windows operating systems, leaving them exposed to known vulnerabilities.

Undocumented third-party relationships: Many ICS vendors may not immediately know the third-party components they use, making it difficult for them to inform their customers of the vulnerabilities. Adversaries who understand these dependencies can target software the industrial firm may not even know it has.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
EmpowerFest 2024
EmpowerFest 2024
EmpowerFest 2024
EmpowerFest 2024
- Advertisement -EmpowerFest 2024
- Advertisement -Education Sabha
- Advertisement -Veeam
- Advertisement -Reimagining Public Sector Analytics
- Advertisement -ESDS SAP Hana

Subscribe to our Newsletter

83000+ Industry Leaders read it everyday

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

How AI can enhance your workflow automation

By using AI tools like ChatGPT, DALL-E, and wearable tech, people can break past old limits, boost their skills, and keep growing and innovating in their workflow automation.

RELATED ARTICLES