{"id":10602,"date":"2017-06-13T11:42:48","date_gmt":"2017-06-13T10:42:48","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=10602"},"modified":"2022-05-05T08:26:18","modified_gmt":"2022-05-05T07:26:18","slug":"ics-report-2017","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/ics-report-2017\/10602\/","title":{"rendered":"ICS cybersecurity: A view from the field"},"content":{"rendered":"<p>Over the past few years, even mass media have been writing about industrial control systems (ICS) cybersecurity incidents with increasing frequency. Unfortunately, the problem lies not only in targeted attacks, such as BlackEnergy or Operation Ghoul, aimed at the industrial sector, but also in more common cyberthreats that do not target specific victims. The latest example is WannaCry ransomware, which was not explicitly designed to target industrial control systems yet managed to infiltrate a number of ICS networks and in some instances, led to the downtime of industrial processes.<\/p>\n<p>But how are those in charge of ICS security responding to the threats? How do those cybersecurity practitioners perceive the risks, and do they have the skills to address them? How do perception and reality align? We observed a certain gap between the perception of ICS incidents inside industrial companies and the reality. That is why we, with the help of Business Advantage, conducted a global survey of 359 industrial cybersecurity practitioners. Here is what we found.<\/p>\n<h2>ICS cybersecurity findings<\/h2>\n<p>\u2022 83% of respondents believe they are well prepared to face an ICS cybersecurity incident. At the same time, half of the companies surveyed experienced one to five IT security incidents in the past 12 months, and 4% experienced more than six.<br \/>\n\u2022 ICS security practitioners have a good sense of the realities, but they&#8217;re not convinced their feelings are shared: 31% say ICS cybersecurity is a low priority for senior management.<br \/>\n\u2022 Ineffective cybersecurity costs industrial organizations $497K per year on average.<br \/>\n\u2022 For the majority of ICS organizations, conventional malware remains the biggest pain point: 56% of respondents consider it the most concerning vector. Here, perception meets reality; half of all respondents had to mitigate the consequences of conventional malware last year.<br \/>\n\u2022 The top three incident experience consequences include damage to product and service quality, loss of proprietary or confidential information, and reduction or loss of production at a site.<br \/>\n\u2022 Half of the ICS companies surveyed admit that external providers have access to industrial control networks in their organization, widening the threat perimeter.<br \/>\n\u2022 81% of companies report increased use of wireless connections to the industrial network. It signals the end of any realistic air gap security strategy.<br \/>\n\u2022 The top three most popular types of security solution are the usual suspects: antimalware, network monitoring, and device access controls. But at the same time, 54% haven&#8217;t considered vulnerability scanning and patch management, and of those that have, 41% issue patches once a month or even less frequently. As WannaCry showed, that is not a solid strategy.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-10605\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2017\/06\/09135019\/ICS-state-edited-821x1024.png\" alt=\"\" width=\"821\" height=\"1024\" \/><\/p>\n<h3>Our conclusions<\/h3>\n<p>Although the research shows that practitioners are aware of threats, their perceptions and responses to them indicate a need for better understanding of the nature of the threats and how to fight them. Current industrial cybersecurity strategies are largely inconsistent, with organizations putting solutions in place but not following up with strong processes, guidance, and properly implemented software.<br \/>\nKaspersky Lab recommends that industrial organizations invest in their people by raising awareness of the issues and educating users to understand the threats and behaviors that put the business at risk. The skills gap can be addressed by outsourcing industrial cybersecurity-specific management to specialized external teams that understand the unique requirements of the sector.<br \/>\nAdditionally, cybersecurity solutions developed specifically for the sector provide far more effective protection than generic solutions, which, as we&#8217;ve seen, leave at least 50% of organizations exposed to breaches.<br \/>\nFor our complete report on the survey, please fill out this form.<\/p>\n<div class=\"interactive\"><form id=\"mktoForm_12637\"><\/form><script>MktoForms2.loadForm(\"\/\/app-sj06.marketo.com\", \"802-IJN-240\", 12637);<\/script><script>\n            MktoForms2.whenReady(function(form) {\n                form.onSuccess(function(vals, tyURL) {\n                    document.location.href = tyURL;\n                    dataLayer.push({\n                        'event': 'addEvents_makeConversions',\n                        'event_id': 'd-n01-e11',\n                        'conversion_name': 'Marketo Form',\n                        'conversion_step': 'Form Fill Out',\n                        'conversion_param': jQuery(location).attr(\"href\"),\n                        'eventCallback' : function() {\n                            jQuery(location).attr('href',tyURL);\n                        }\n                    });\n                    return false;\n                });\n            });\n            <\/script><\/div><!-- RECAPTCHA -->\n        <style>.googleRecaptcha { padding: 20px !important; }<\/style>\n        <script>\n            var GOOGLE_RECAPTCHA_SITE_KEY = '6Lf2eUQUAAAAAC-GQSZ6R2pjePmmD6oA6F_3AV7j';\n\n            var insertGoogleRecaptcha = function (form) {\n            var formElem = form.getFormElem().get(0);\n\n            if (formElem && window.grecaptcha) {\n                var div = window.document.createElement('div');\n                var divId = 'g-recaptcha-' + form.getId();\n                var buttonRow = formElem.querySelector('.mktoButtonRow');\n                var button = buttonRow ? buttonRow.querySelector('.mktoButton[type=\"submit\"]') : null;\n\n                var submitHandler = function (e) {\n                var recaptchaResponse = window.grecaptcha && window.grecaptcha.getResponse(widgetId);\n                e.preventDefault();\n\n                if (form.validate()) {\n                    if (!recaptchaResponse) {\n                    div.setAttribute('data-error', 'true');\n                    } else {\n                    div.setAttribute('data-error', 'false');\n\n                    form.addHiddenFields({\n                        reCAPTCHAFormResponse: recaptchaResponse,\n                    });\n\n                    form.submit();\n                    }\n                }\n                };\n\n                div.id = divId;\n                div.classList.add('googleRecaptcha');\n\n                if (button) {\n                button.addEventListener('click', submitHandler);\n                }\n\n                if (buttonRow) {\n                formElem.insertBefore(div, buttonRow);\n                }\n\n                if (window.grecaptcha.render) {\n                    var widgetId = window.grecaptcha.render(divId, {\n                    sitekey: GOOGLE_RECAPTCHA_SITE_KEY,\n                });\n                formElem.style.display = '';\n                }\n            }\n            };\n\n            function onloadApiCallback() {\n            var forms = MktoForms2.allForms();\n            for (var i = 0; i < forms.length; i++) {\n                insertGoogleRecaptcha(forms[i]);\n            }\n            }\n\n            (function () {\n            MktoForms2.whenReady(function (form) {\n                form.getFormElem().get(0).style.display = 'none';\n                jQuery.getScript('\/\/www.google.com\/recaptcha\/api.js?onload=onloadApiCallback');\n            });\n            })();\n        <\/script>\n        <!-- END RECAPTCHA -->\n","protected":false},"excerpt":{"rendered":"<p>We conducted a global survey of 359 industrial cybersecurity practitioners to learn more about perceptions and realities.<\/p>\n","protected":false},"author":2706,"featured_media":10603,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1836,2361],"tags":[1576,1830,594,119],"class_list":{"0":"post-10602","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-ics","10":"tag-industrial-cybersecurity","11":"tag-report","12":"tag-survey"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ics-report-2017\/10602\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ics-report-2017\/7869\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ics-report-2017\/4289\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ics-report-2017\/11514\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ics-report-2017\/10521\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ics-report-2017\/13097\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ics-report-2017\/13174\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ics-report-2017\/17812\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ics-report-2017\/16967\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ics-report-2017\/8875\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ics-report-2017\/9117\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ics-report-2017\/6904\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ics-report-2017\/16029\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ics-report-2017\/16967\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ics-report-2017\/16967\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/ics\/","name":"ICS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/10602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=10602"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/10602\/revisions"}],"predecessor-version":[{"id":17541,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/10602\/revisions\/17541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/10603"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=10602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=10602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=10602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}