How secure are your systems?

Sweden is often considered to be one of the world's most cybersecure countries but despite this, it was revealed in 2017 that a security slip up made confidential police records available to IT workers in the Czech Republic. This throws into question other security systems across Sweden and the globe. Here, Sean Robinson, service leader at industrial automation provider Novotek UK and Ireland, explores how automation systems in manufacturing can be made more secure.

Industrial automation and control systems are vital in the modern manufacturing industry, whether they are physical automated assets or enterprise management systems. Regardless of their role in manufacturing plants, one thing remains the same: plant managers don't want them, or their data, compromised.


There are primarily two areas of concern with system cybersecurity. The first area is protection of intellectual property surrounding processes and recipes. Here, a more considered approach to the system design, such as separating the formulation data and control functions, will make systems more flexible and - at the same time - make it more difficult to extract key information in a simple format.

The second area of concern is the flow of outsiders, whether that be contractors or temporary staff, that can accidentally cause production losses. Security methods need to be put in place to reduce the risk of accidental interference with production systems.

When considering security solutions for these two areas, and indeed other areas of manufacturing, the common theme is that sensitive data is being handled. A mix of technical tools and human processes offer good protection and often changes can be made to existing security systems to aid this.

Technical tools are understandably most effective in safeguarding against cyber-attacks, as industrial software will often be the access point for malicious attacks on industrial systems. In this regard, it's important that plant managers ensure their industrial automation software has embedded security features, such as encryption and digital file signatures, to help prevent unauthorised access.

It is far more common for security breaches to occur internally and by accident as opposed to a malicious attack from an outsider but, even in that scenario, systems should provide an audit trail where activity can be tracked back to the source. Usually, a security breach is the result of a poor use of existing security or poor people management.

This is where the human element comes in. Engineers should be adequately trained in security process and procedures to ensure they can accurately identify and address security problems as they arise. For example, a plant might have systems in place to log all activity on the network, but this is only effective if it is regularly reviewed and acted on. Likewise, industrial software must be patched and updated to keep it effective.

Fortunately, systems are coming to market to make these requirements more streamlined and convenient for plant managers. GE Digital's OpShield, for example, is designed with in-built features to alert engineers and managers of unusual network activity. It is able to do this by establishing a baseline profile of the ordinary traffic on a network, allowing it to rapidly identify and highlight erroneous traffic.

Novotek UK and Ireland is the official UK distributor of OpShield, which is an ideal tool for customers who want to combine insight into system interaction on a network with the ability to filter data and commands between segments. It understands many industrial protocols and can inspect network traffic on a message by message basis to help enforce policies about what data can go where.

A purpose-built system to protect SCADA and industrial operation, the system monitors and blocks malicious activity and threats to secure productivity. The benefits to this system include the ability to protect unpatched systems with strong perimeter and field defence, easy-to-use graphical interfaces and the facility to deliver security alerts to the management console.

You might not be dealing in Swedish police records but it's important to keep business information and systems secure. Oversights like this are easily prevented with the right products and practices in place. To find out how Novotek can support your cybersecurity, head to https://www.novotek.com/uk/.

Featured Product

3D Vision: Ensenso B now also available as a mono version!

3D Vision: Ensenso B now also available as a mono version!

This compact 3D camera series combines a very short working distance, a large field of view and a high depth of field - perfect for bin picking applications. With its ability to capture multiple objects over a large area, it can help robots empty containers more efficiently. Now available from IDS Imaging Development Systems. In the color version of the Ensenso B, the stereo system is equipped with two RGB image sensors. This saves additional sensors and reduces installation space and hardware costs. Now, you can also choose your model to be equipped with two 5 MP mono sensors, achieving impressively high spatial precision. With enhanced sharpness and accuracy, you can tackle applications where absolute precision is essential. The great strength of the Ensenso B lies in the very precise detection of objects at close range. It offers a wide field of view and an impressively high depth of field. This means that the area in which an object is in focus is unusually large. At a distance of 30 centimetres between the camera and the object, the Z-accuracy is approx. 0.1 millimetres. The maximum working distance is 2 meters. This 3D camera series complies with protection class IP65/67 and is ideal for use in industrial environments.