1660240104529 Bacidore

How risk-resistant are you?

April 29, 2019
The IIoT is coming; you will be assimilated

How secure is your sensitive data? As the benefits of the Industrial Internet of Things (IIoT) become more apparent, data-sharing practices continue on a path toward Borg-like ubiquity.

Resistance may be futile, but it’s important to understand and manage the risks of assimilation.

The 2018 Global State of Information Security Survey (GSISS) from PwC indicates two-thirds of organizations have an IoT strategy either in place or currently being implemented. But only around one-third have uniform cybersecurity standards and policies for IoT devices and systems; new data collection, retention and destruction policies; or assessment practices for device and system interconnecticity and vulnerability across the business ecosystem. That would seem to identify a 33% gap between understanding and managing cybersecurity risks.

A new study from Varonis reveals the manufacturing industry still has a long way to go locking down sensitive data. The study, Data Gets Personal: 2019 Global Data Risk Report, includes results from data-risk assessments performed on more than 700 companies in 30+ industries. It shines a spotlight on data breaches, insider threats and crippling malware attacks. The report reveals manufacturing organizations had more than 20% of sensitive files and folders exposed. Additionally, manufacturing companies had an average of 2,264 exposed, sensitive files and 32,146 exposed folders per terabyte of data.

Some noteworthy findings include:

  • 38% of users had passwords that never expire, up from 10% the previous year

  • 22% of a company’s folders are accessible, on average, to every employee

  • 53% of companies made more than 1,000 sensitive files accessible to every employee, up from 41% in 2018

  • 38% of users had passwords that never expire, up from 10% the previous year

  • 50% of accounts are stale “ghost” users that allow former employees to log in and access information.

That’s the scariest finding of all—half of user accounts are no longer employees. We’re constantly worrying about threats from disgruntled or careless internal employees, but what about those workers who’ve gone rogue and already left the company?

It’s time to stop resisting the IIoT and start resisting the risks that come with indifferent data-security policies. One way or another, you will be assimilated.

About the author: Mike Bacidore
About the Author

Mike Bacidore | Editor in Chief

Mike Bacidore is chief editor of Control Design and has been an integral part of the Endeavor Business Media editorial team since 2007. Previously, he was editorial director at Hughes Communications and a portfolio manager of the human resources and labor law areas at Wolters Kluwer. Bacidore holds a BA from the University of Illinois and an MBA from Lake Forest Graduate School of Management. He is an award-winning columnist, earning multiple regional and national awards from the American Society of Business Publication Editors. He may be reached at [email protected] 

Sponsored Recommendations

Power Distribution Resource Guide

When it comes to selecting the right power supply, there are many key factors and best practices to consider.

Safe Speed and Positioning with Autonomous Mobile Robots

Here are some tips for ensuring safe speed and positioning for AMRs using integrated safety technology – many of these tips also apply to automated guided vehicles (AGVs).

Faster, Accurate and Reliable Motion Control With Advanced Inductive Technology

This white paper describes new technology offering improved position measurement capabilities in reliability, speed, accuracy and more.

The Value of Dual Rated AC/DC Disconnect Switches

Why is it necessary for me to have a disconnect switch installed in my application?