Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267
0

OT cyber-attacks in transport and energy sectors on the rise | #cybersecurity | #cyberattack | #hacking | #aihp


20 September 2022

While most cybersecurity attacks are agnostic of the industry, impacting both IT and OT there has been a rise in the number of OT cyber-attacks on transport and energy businesses in recent months, with too many companies remaining underprepared and responding to attacks on a reactive, ad hoc basis, argues Ralph Chammah, CEO of OwlGaze.

“We are finding that many energy and transport businesses – which form the backbone of vital national public infrastructure – are woefully underprepared when it comes to cybersecurity. Organisations need to monitor their security controls constantly and proactively in line with all the most recent threat information. Which is something that can be done easily and cost-effectively with the latest advanced artificial intelligence (AI) that detects, adapts, and updates the necessary algorithms based on all threats to the company.

“Also, it’s worth remembering that energy and transport companies are not only responsible for critical public infrastructure – which means that cybersecurity vulnerabilities can potentially have a direct impact on the safety and security of millions of peoples’ lives – but they also deal with highly sensitive and private customer data, which is also at threat from the types of ‘cyber security incident’ that we’ve seen in the UK and Italy in recent weeks.

“Like most of today’s businesses, energy and transport organisations are dealing with millions of cyber threats daily, highlighting the urgent need they have to use next-gen Security Information and Event Management (SIEM) software and User and Entity Behaviour Analytics (UEBA) technologies to increase their visibility of an increasingly complex threat network. Intelligently automating their internal and external threat monitoring and detection processes means they can identify and counter any potential threats before they become victim to a costly and potentially catastrophic cyber-attack.”

Click Here For The Original Source.


————————————————————————————-

Translate