Site icon Secplicity – Security Simplified

5 Forgotten Technologies Hackers Will Use to Infiltrate Manufacturers in 2019

Modern cyber criminals will leave no hardware unturned when it comes to penetrating target networks. According to Verizon’s 2018 Data Breach Investigation Report, external hackers accounted for 89 percent of all attacks against manufacturing organizations. This is a perfect example of how some sectors can be more vulnerable than others. Back offices in factories and manufacturing facilities often host several legitimate – and likely, neglected – attack vectors that malicious actors can infiltrate to make lateral movements through an organization’s network, and even onto the manufacturing floor.

In a recent guest column for IndustryWeek, WatchGuard CTO Corey Nachreiner outlined five outdated technologies that hackers can use to infiltrate manufacturers’ networks. Following is an excerpt from the article that covers a few of these potential weak spots:

For more on the other three back office technologies at manufacturing organizations that are often overlooked and unsecured, read the complete story in IndustryWeek. To learn about a new malware variant that was just recently discovered targeting business meeting rooms and IoT devices, check out this Daily Security Byte here on Secplicity.

Exit mobile version