Back

Blogs

How to Enhance your Cyber Resilience with MITRE ATT&CK Frameworks

View All

Case Studies

H2Au: Developing models and analysis on the levelised cost of hydrogen

View All

Upcoming Events

LEMA Summit 2024

View All

Webinars

Thoughts

Why does your cyber security strategy need to include OT?

24th Oct, 2022

Historically, Operational Technology (OT) used to be purely machinery and hardware based. However, as technology has evolved, we are seeing more IT and OT connected to each other, allowing them to transmit information to each other. This allows greater efficiencies, insights and improvements to business operations.

The cyber security risks that previously affected only software and corporate IT networks have now extended into the operational technology network. Operational Networks must be evaluated with the knowledge of the threat and risk that are now present to prevent their OT from being locked, damaged, or even destroyed.

Organisations need to understand that the threat to OT assets is no longer just physical. You need to employ good cyber security practices that include your OT assets or environment.

Read the full report below.

Why Does your Cyber Security Strategy Need to Include OT? 

 

Authors