Zettabytes of OT data

With this massive increase in OT data expected within the next five years, and the rapid increase in cyberattacks, companies need to train employees from the C-Suite to the shop floor on safe steps to avoid opening the door for a cyberattack.

Elizabeth Engler Modic, Editor
EModic@gie.net

By 2030 4.4 zettabytes (billion terabytes) of operational technology (OT) data will be generated by the manufacturing industry globally, according to technology intelligence firm ABI Research’s “Industrial Data Generation Forecast” report.

So, what’s the concern?

When you turn to this month’s infographic, highlights from IBM’s “X-Force Threat Intelligence Index 2024” report note some of them. “The prominence of valid accounts as a preferred initial access technique among cybercriminals…was another notable development. This access technique is accompanied by an upsurge in malware designed to steal information, known as infostealer malware…[bolstering] the dark web’s stolen credentials marketplace.”

While these reports are separate in their research, results coordinate cybersecurity concerns for manufacturers small and large. “OT data in enterprises often involves conditions in extremely hazardous environments, where any data malfunction could lead to severe consequences,” says Leo Gergs, principal analyst for Hybrid Cloud & 5G Markets at ABI Research. Protection of the enterprise OT requires capabilities across three main domains: infrastructure and storage needs; data management and processing capabilities; and cybersecurity concerns.

It’s this large volume of OT data that’s the tempting target for cyberattacks, which is why a strong approach to cybersecurity is necessary in manufacturing. One concern is the cybersecurity blast radius – the potential impact of an incident given the compromise of particular users, devices, or data. For example, if an account with administrative privileges is compromised, the blast radius is greater with chances of being able to access additional data across the network.

The IBM report notes: “Given the importance of data security and identity management in the current threat landscape, organizations should consider implementing solutions to reduce the damage a data security incident could potentially cause.” The report details that nearly one-third of attacks on critical infrastructure led to data theft and leak... [reaffirming] that critical infrastructure is a high-value target to adversaries, wagering on these organizations’ low threshold for downtime to advance on their objectives.”

With this massive increase in OT data expected within the next five years, and the rapid increase in cyberattacks, companies need to train employees from the C-Suite to the shop floor on safe steps to avoid opening the door for a cyberattack. So as Gergs says, “The opportunity around enterprise data is immense, but integration vendors, cloud service, and connectivity providers must rise to the challenge by investing in scalable solutions, enhancing data security, leveraging advanced analytics, and ensuring interoperability,”

I hope your company is taking the steps needed to protect that OT so valuable to your precision manufacturing market.

September 2024
Explore the September 2024 Issue

Check out more from this issue and find your next story to read.