Industrial organizations are concerned about IoT security, with 77% believing their ICS network will suffer an attack. Yet nearly half have no measures in place to detect such an attack. Credit: Thinkstock Industrial organizations say cybersecurity is a priority, even while most expect to become a target of a cybersecurity incident. But how big of a priority can it be if nearly half of the companies surveyed admitted in a recent survey to not having any measures in place to even detect or monitor if their industrial control networks suffered an attack?It seems everyone wants in on the Internet of Things (IoT) — and that desire for connectivity includes power plants, water treatment centers, and manufacturers — even though 65 percent of surveyed companies acknowledged that Industrial Control Systems (ICS) security risks are more likely with IoT.Nevertheless, organizations want to bump up the efficiency of their industrial processes with new IT. They are pouring money into security for IT networks, while also boosting automation efficiency by connecting their operational technology (OT) with external networks — this despite 77 percent believing their organization is likely to become a target of a cybersecurity incident involving their industrial control networks.Those are but a few insights into the concerns of 320 global professionals, across 23 countries, with decision-making power on OT-ICS cybersecurity. They were surveyed by Pierre Audoin Consultants (PAC) on behalf of Kaspersky Lab; the results can be seen in Kaspersky’s State of Industrial Cybersecurity 2018 report (pdf). More than half of the industrial companies, 51 percent, claimed they did not suffer a breach or cybersecurity incident in the past 12 months. While that seems like good news, Kaspersky Lab wondered if the companies would even have known if they were attacked, as 48 percent of the organizations admitted to having no measures in place to detect or track attacks.It is worth noting that 8 percent answered that they honestly don’t know how many cybersecurity incidents tied to OT/ICS or control system networks occurred in the last year, while 10 percent can’t be bothered to measure the number of incidents and breaches. Operational technology wide open to attackEven though a majority of the organizations are beefing up security on the IT side, they are leaving the doors to their OT “wide open,” which allows “basic threats such as ransomware and malware to step right in and catch them.”In fact, the survey revealed that organizations’ perceived risks are not always the actual pain points.What do organizations that rely on ICS fear? Sixty-six percent of the surveyed companies fear targeted attacks and APTs, 65 percent are concerned about conventional malware, 64 percent are worried about ransomware attacks, and 59 percent are concerned about data leaks and spying.What really caused security incidents? Kaspersky noted that “almost two-thirds (64 percent) of companies experienced at least one conventional malware or virus attack on their ICS in the last 12 months. Thirty percent of companies suffered a ransomware attack, and 27 percent had their ICS breached due to the errors and actions of employees. Targeted attacks affecting the sector accounted for just 16 percent in 2018 (down from 36 percent in 2017), suggesting that the concern and reality around the risks of targeted attacks is misplaced — and that companies relying on ICS are still falling victim to more conventional threats, including malware and ransomware, as well as targeted attacks.”A few other tidbits that seem to jump off the page included 16 percent of the companies opted not to report any breaches or incidents that occurred in the last year, and only 23 percent are compliant with mandatory industry or governmental regulations or guidance. Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe