• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

OT Is The Next Target Of Cyber Crooks


By VARINDIA - 2018-05-30
OT Is The Next Target Of Cyber Crooks

As everything turns into a computer, computer security becomes everything security. The rise of a global Internet of Things network is ultimately creating a giant, internet-connected global robot which is so disparate and insecure that cyberattacks against it are going to cause major societal problems if it isn't regulated.

 

There is growing concern on how ICANN will comply with the GDPR. A key question on how the trademark owners is ‘how will ICANN comply with GDRP without unduly restricting global Internet users’ access to the public WHOIS database?’ For nearly the past 2 decades, Internet users, businesses, law enforcement and consumer protection agencies have relied on WHOIS as a necessary resource. However, if it restricts access to such data, the GDPR could seriously hamper the ability of brand owners to enforce their rights and protect consumers from infringement and online fraud.

 

With the growing IoT devices, where sensors to collect data, sensors which sense movement, smart televisions and digital personal assistants which are always watching and listening to potential commands and there are internet connected devices which perform manual tasks. IoT to connect billions of physical devices around the world that are now connected to the internet, collecting and sharing data. We can’t deny the fact ,for the companies to bring cheap products /processors and wireless networks, it's possible to turn anything, from a pill to an aeroplane, into part of the IoT.

 

Cyberattacks are increasing at every second and probably they are well connected and like organised crime. The record says, Equifax (Credit monitoring firm), said information on about 146.6 million names, 146.6 million dates of birth, 145.5 million U.S. social security numbers, 99 million addresses and 209,000 payment card numbers and expiration dates, were stolen in a cyber attack. In a recent hacking, Bank of Montreal (Canada's fourth biggest lender ) and Canadian Imperial Bank of Commerce said , cyber attackers may have stolen the data of nearly 90,000 customers in what appeared to be the first significant assault on financial institutions in the country, claimed in possession of the personal and financial information of a limited number of the bank's customers.

 

It is the high time to Securing OT Networks Against Rising Attacks:

 

Operational Technology (OT) networks, OT systems are often tasked with monitoring and managing the highly sensitive processes associated with critical infrastructure, plays a critical role in manufacturing, defense, emergency services, food and agriculture, financial systems, and critical infrastructure, just to name a few. OT networks and devices include supervisory control and data acquisition (SCADA) systems and industrial control systems (ICS). As Ot generally separate from IT networks, means they sometimes run on aging operating systems and obsolete hardware using home grown applications. Since the goal for an OT system is to run exactly as designed, even patches are only applied if they do not hinder the process of the OT system.

 

The impact of cyber attacks on critical infrastructure. In information hacking, most often the crooks are looking to make a quick buck. When it comes to critical infrastructure, the goals of hackers are different, and the risk for oil and gas, utilities, transportation and even healthcare have much higher and dire consequences on human life, assets and the environment than a data breach. Fact of the life is, attacks on operational technology (OT) such as ICS and SCADA systems are real and growing. It is time for the CXO’s to safeguard critical infrastructure and industrial plant control systems are coming under scrutiny from both attackers and defenders.

 

Poor cybersecurity in IoT devices , poses potential risks to both the wellbeing of patients as well as to the infrastructure that keeps hospitals running, as one move very fast towards adoption of digital technologies, Machine learning and the message is that more work needs to be done to improve the security of connected systems. Specially, with the connected and implanted medical devices to the last mile in the hospital network so that doctors can monitor remotely, including cardiac pacemakers, drug administration devices, and monitoring devices, as well as infusion pumps, defibrillators, glucometers, and blood pressure measurement devices -- can help patient care, the report says, the connectivity inherent in these devices also bring risks. Cyber-attacks on connected devices could result in severe consequences on patient safety, which could even result in injury or worse. Also, took some hospital IT systems down of weeks.

 

In a recently held event, Infotech Forum it says, receiving email,message over the whatapp is also can be challenged over the court of law, when the whatapp says,it is end to end encryption,it means whatapp keeps all our database,then the question comes on how someone can decrypt the message before we receive. It comes to a big question. It means whatapp message can’t be trustable. A Chrome plug –in titled “PassProtect”by OKTA can warn you in prior if your password has been stolen by hackers. Password can hacked with the advent of advanced technologies. Now, on entering your password with”passProtect” the plug-in instantly warns you with a window pop-up,showing haw easily the particular password could be hacked.

 

In order to improve the cybersecurity of IoT devices, UK government has released an interim report, it aims to reduce this risk and provides a basis to improve the security of IoT devices. It calls on the security community to adopt a code of practice to reduce the harm to consumers and organisations by shifting responsibility of security away from the user and to ensure devices are secure over their entire life cycle. The report contains a number of guiding principles and proposed guidelines.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.