2016 Cybersecurity Study: Six key findings

Respondents to the Control Engineering 2016 Cybersecurity Study identified six high-level findings impacting control systems today.

05/02/2016


Seventy-seven percent of organizations inform their employees about who to contact in the event of a cyber incident or attack, compared to 67% in 2015, although fewer were taught about things that may indicate an attack. Courtesy: Control EngineeringRespondents to the Control Engineering 2016 Cybersecurity Study identified six high-level findings impacting control systems today:

  1. Threat levels: Forty-eight percent of respondents perceive their control systems to be moderately threatened by cyber attacks, while 25% say theirs are highly threatened and 9% are at a severe threat level.

  2. Most concerning threat: Malware from a random source is the most concerning control system threat for 37% of respondents. Another 21% are worried about an attack through a vulnerable device, and 17% fear theft of intellectual property or attacks as part of a larger attempt to disrupt critical infrastructure.

  3. Vulnerable system components: The top most vulnerable system components within respondents’ organizations are computer assets running commercial operating systems (70%), network devices (68%), and connections to other internal systems (64%).

  4. Vulnerability assessments: Twenty-six percent of respondents reported that their organizations have performed some type of vulnerability assessment within the past 3 months. The average facility has checked their vulnerabilities within the past 8 months.

  5. Cyber-related incidents: Six in 10 respondents have experienced a malicious cyber incident into their control system networks and/or control system cyber assets—that they are aware of—within the past 24 months. Forty-six percent of these attacks were accidental infections, 18% were targeted in nature, and 36% were both accidental and targeted.

  6. Mobile devices: Thirty-two percent of organizations do not allow mobile devices—such as smart phones and tablets—to connect to networks or enter work areas. Of the facilities that do allow mobile device use, 47% allow them to connect to networks and enter work areas.

Access the full 2016 Cybersecurity report for additional findings.



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Sensor-to-cloud interoperability; PID and digital control efficiency; Alarm management system design; Automotive industry advances
Make Big Data and Industrial Internet of Things work for you, 2017 Engineers' Choice Finalists, Avoid control design pitfalls, Managing IIoT processes
Engineering Leaders Under 40; System integration improving packaging operation; Process sensing; PID velocity; Cybersecurity and functional safety
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Flexible offshore fire protection; Big Data's impact on operations; Bridging the skills gap; Identifying security risks
The digital oilfield: Utilizing Big Data can yield big savings; Virtualization a real solution; Tracking SIS performance
click me