PR Newswire
15 Dec 2022, 12 GMT+10
SINGAPORE, Dec. 15, 2022 /PRNewswire/ -- Microsoft has released its third edition of Cyber Signals, a regular cyberthreat intelligence brief spotlighting security trends and insights gathered from Microsoft's 43 trillion daily security signals and 8,500 security experts. This edition highlights new insights on the wider risks that converging IT, Internet-of-Things (IoT), and Operational Technology (OT) systems pose to critical infrastructure, and how enterprises can defend against these attacks.
OT is a combination of hardware and software across programmable systems or devices that interact with the physical environment (or manage devices that interact with the physical environment). Examples of OT can include building management systems, fire control systems, and physical access control mechanisms, like doors and elevators.
With increasing connectivity across converging IT, OT, and IoT, organizations and individuals need to rethink cyber risk impact and consequences. Similar to how the loss of a laptop or modern vehicle containing a homeowner's cached Wi-Fi credentials could grant a property thief unauthorized network access, compromising a manufacturing facility's remotely connected equipment or a smart building's security cameras introduces new vectors for threats like malware or industrial espionage.
Vasu Jakkal, corporate vice president, security, compliance, identity, and management at Microsoft, said: "As OT systems underpinning energy, transportation, and other infrastructures become increasingly connected to IT systems, the risk of disruption and damage grows as boundaries blur between these formerly separated worlds. For businesses and infrastructure operators across industries, the defensive imperatives are gaining total visibility over connected systems and weighing evolving risks and dependencies."
Key insights shared in this edition of Cyber Signals include:
For businesses and individuals, securing IoT solutions with a Zero Trust security model starts with non-IoT specific requirements. This can be achieved by specifically ensuring they have implemented the basics to securing identities and their devices and limiting their access. These requirements include explicitly verifying users, having visibility into the devices on the network, and real-time risk detections.
To learn more about IT, OT, and IoT threats, read the third edition of Cyber Signals today. To learn more about Microsoft Security solutions and keep up with expert coverage on security matters, visit the Microsoft Security website and Microsoft Security blog.
[1] Methodology: For snapshot data, Microsoft platforms including Microsoft Defender for IoT, Microsoft Threat Intelligence Center and Microsoft Defender Threat Intelligence provided anonymized data on device vulnerabilities, such as configuration states and versions, and data on threat activity on components and devices. In addition, researchers used data from public sources, such as the National Vulnerability Database (NVD) and Cybersecurity & Infrastructure Security Agency (CISA). The cover stat is based on Microsoft engagements in 2022. Control systems in critical environments include electronic or mechanical devices which utilize control loops for improved production, efficiency, and safety. |
Note to editors: For more information, news and perspectives from Microsoft, please visit the Microsoft News Center at http://news.microsoft.com/. Web links, telephone numbers and titles were correct at time of publication, but may have changed. For additional assistance, journalists and analysts may contact Microsoft's Rapid Response Team or other appropriate contacts listed at Microsoft Public Relations Contacts - Stories.
For more information, please contact: Edelman (Partner Agency for Microsoft Asia)
Woo Jia Min / Farhansyah Musa
EdelMSFTCorp@edelman.com
Get a daily dose of Kuala Lumpur Times news through our daily email, its complimentary and keeps you fully up to date with world and business news as well.
Publish news of your business, community or sports group, personnel appointments, major event and more by submitting a news release to Kuala Lumpur Times.
More InformationJERUSALEM - Israel on Sunday announced plans to build a new town on the Gaza border .The town, temporarily named ...
CHICAGO, Illinois: After an ice storm ravaged states from Texas to West Virginia, this week, airlines canceled over 1,800 flights ...
PRAGUE, Czech Republic: Ahead of her visit to Taipei, Marketa Pekarova Adamova, Speaker of the Czech Lower House, reiterated to ...
TRENTON, New Jersey: A federal judge has blocked a New Jersey law allowing the state's attorney-general to sue gun manufacturers ...
WASHINGTON D.C.: The Biden administration said this week that it will end US COVID-19 emergency declarations on 11th May, nearly ...
WASHINGTON D.C.: In a letter to lawmakers last week, the US Federal Aviation Administration (FAA) said it had put in ...
PRAGUE, Czech Republic: Ahead of her visit to Taipei, Marketa Pekarova Adamova, Speaker of the Czech Lower House, reiterated to ...
WASHINGTON D.C.: The Biden administration has stopped issuing export licenses to US companies seeking to ship most items to China's ...
NAYPYITAW, Myanmar - According to an announcement broadcast by state-run media on Wednesday evening, members of Myanmar's National Defence and ...
LAHORE, Pakistan - Former Prime Minister Imran Khan questioned Prime Minister Shehbaz Sharif's "shamelessness" in a social media post criticizing ...
TOKYO, Japan: In light of a tense security environment following Russia's invasion of Ukraine and Moscow's growing military cooperation with ...
TOKYO, Japan: In a statement posted on the website of the Chinese Embassy in Tokyo, Beijing announced that it will ...