Closing the Door on Third-Party Access Risks
June 19, 2024 – Published on Nexus
Even as cybersecurity breaches involving third-party access remain among the most common ways attacks succeed, the need for such access continues to grow within operational technology (OT) and industrial control systems (ICS) environments.
There are many reasons for this, including companies with OT/ICS environments increasingly relying on device-maker support, external contractors, and other service providers for their expertise. They often provide remote access for these providers. Digital transformation efforts are also under way to accelerate the convergence of IT and OT networks and the adoption of cloud and industrial (and medical) Internet of things (IoT) devices.
“Third parties are heavily involved due to the evolving demands of OT and the increasing output of operational data to enhance business efficiencies,” explains Chris Warner, senior security consultant at GuidePoint Security. “The increasing connectivity of OT to IT networks for remote operations introduces vulnerabilities typically associated with IT environments. However, integrating third-party vendors in OT environments is not straightforward,” Warner adds.
Read More HERE.