Meet Us at ISC West!

SHARE THIS

Back to Blog

IT/OT Convergence in Manufacturing: The Secret to Strong Cyber Hygiene

The convergence of information technology (IT) and traditional operational technology (OT) – or physical systems – is a natural development in today’s connected world. Exciting developments in the areas of AI, Internet of Things (IoT), and the cloud are transforming the way businesses operate. Convergence can help organizations work better, respond faster, and scale as needed. However, the reality is that it also creates more opportunities for cyber exploitation. The manufacturing industry has been particularly hard hit by bad actors in recent years.

Ransomware attacks on manufacturing: By the numbers

  • $17b in downtime since 2018
  • $1.9m price tag per day of downtime
  • 11.6 days average downtime per attack 

How is convergence playing out for manufacturers today?

Omdia and Telstra International partnered to survey 500+ tech executives across the globe on the convergence of IT and OT – how it affects their core operations, how they address cyber security challenges, and more. Key takeaways include:

  • 80% percent of manufacturing firms experienced a significant increase in overall security incidents or breaches in 2024
  • Only 45% feel they are adequately prepared to handle cyber threats
  • Cyberattack resilience or availability issues cost individual firms between $200,000 and $2m

Given the enormous value of convergence, how can manufacturers unlock its potential while mitigating risks?

How to leverage the right tools for stronger cyber hygiene

Proactive planning and remediation are key for protecting physical security devices – and automation can help you make it happen. Use management tools to implement these seven steps for strong cyber security:

  1. Map your assets
  2. Update firmware – don’t wait!
  3. Identify and manage vulnerabilities 
  4. Harden your devices
  5. Regularly rotate passwords
  6. Manage SSL and 802.1x certificates
  7. Replace physical security devices before they reach end of service (EOS)

Sounds daunting? It doesn’t have to be. Adopt SecuriThings to do the heavy lifting. Learn more about our Cyber Protection module.

Blog posts you might also like