Back

Blogs

The Energy Act: Future regulation of energy smart appliances

View All

Case Studies

Powering Alt HAN Co.'s Smart Meter Rollout

View All

Upcoming Events

LEMA Summit 2024

View All

Webinars

Digital Operation Resilience Act (DORA) - Is your organisation on track?

View All

Thoughts

Why does your cyber security strategy need to include OT?

24th Oct, 2022

Historically, Operational Technology (OT) used to be purely machinery and hardware based. However, as technology has evolved, we are seeing more IT and OT connected to each other, allowing them to transmit information to each other. This allows greater efficiencies, insights and improvements to business operations.

The cyber security risks that previously affected only software and corporate IT networks have now extended into the operational technology network. Operational Networks must be evaluated with the knowledge of the threat and risk that are now present to prevent their OT from being locked, damaged, or even destroyed.

Organisations need to understand that the threat to OT assets is no longer just physical. You need to employ good cyber security practices that include your OT assets or environment.

Read the full report below.

Why Does your Cyber Security Strategy Need to Include OT? 

 

Authors