ADVERTISEMENT
TechEconomy
Saturday, May 17, 2025
No Result
View All Result
Advertisement
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Podcast

Home » The Biggest Threats to OT Security Will Surprise You

The Biggest Threats to OT Security Will Surprise You

Techeconomy by Techeconomy
March 28, 2024
in Security
0
OT security Thought Leadership by Jayson Pieterse, Sales Manager at TXOne
Thought Leadership by Jayson Pieterse, Sales Manager at TXOne

Thought Leadership by Jayson Pieterse, Sales Manager at TXOne

RelatedPosts

Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

May 15, 2025

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025

As the use of operational technology (OT) and Internet of Things (IoT) grows, so too does the threat landscape. Without releasing it, many businesses may have thousands of unknown access points ready to be exploited by cybercriminals. Jayson Pieterse, Sales Manager at TXOne, explores the different risks organisations face.

===
With the growth in digital transformation of businesses, there has been an increase in tools and tech solutions that allow for greater connectivity.

From cloud and artificial intelligence to operational technology (OT) and Internet of Things (IoT), businesses are more connected than ever before.

And while these tech advancements have created more efficiencies, increased productivity and furnished businesses with more in-depth insights, they have also expanded the threat landscape.

As industrial operations have gotten smarter, the use of OT and IoT has proliferated. TXOne’s latest research found that 68% of organisations were continuously increasing their OT budgets.

This is the result of digital transformation investments demonstrating their worth to business owners and decision makers.

Board members and C-level executives are more informed about the benefits these technologies can bring to an organisation with many becoming increasingly involved in decisions around OT. However, with each new device, comes a new entry-point that needs to be secured.

Knowing this, insurance and auditing companies are driving organisations to be more compliant when it comes to OT security.

It’s becoming common practice for insurance companies to audit organisations and determine their premiums or if they can be considered for cover based on their compliance. Cyberattacks like ransomware and distributed denial of service (DDoS) are not only costly for the targeted organisation, but the companies that insure them.

The expansion of the threat surface through smart industrial operations has left organisations exposed. And while cybercriminals present a significant risk, there are vulnerabilities within organisations that impact OT security.

Legacy hinders OT security

Businesses in the industrial market like mining, oil and gas, manufacturing or utilities, are often operating with legacy infrastructure.

These systems were built with longevity in mind, and this comes at great expense – often hundreds of millions if not billions of rands. Because factories and plants are built for long-term use – some 40 or 50 years – it’s therefore not so easy to simply refresh operations.

There’s also the issue that a plant or factory’s infrastructure was built at a time when organisations didn’t have the technology that’s available today and so cybersecurity was not a factor.

However, as advancements are made in industry and new technology is adopted, solutions have been retrofitted to legacy infrastructure.

United BANK

When it comes to considering the security of these new tech devices and systems, it’s then difficult to deploy patches and updates in a way that does not interrupt operations.

Bringing a factory offline for any amount of time can cost money, which is often the hesitancy businesses have when it comes to addressing their OT security.

However, a delay to business operations does not have to take place when the right OT security partner is brought on board. With industry experience, technicians are able to manage cyber defences across legacy infrastructure and can prevent interruptions and downtime.

Perception versus reality

Reluctance to disrupt a day’s work to update OT security is not the only risk businesses face. Many industrial organisations don’t have complete visibility of their OT and IoT assets and the possible vulnerabilities.

At TXOne, customers have approached us to provide a risk assessment with the understanding that there are 5,000 operational assets within the organisation. However, after a risk assessment, we’ve sometimes found five times this amount. This lack of visibility makes an organisation and its operations vulnerable to attack. You can’t protect something you can’t see.

Because there isn’t a clear view of these operational assets, minor problems with IoT devices or systems are often attributed to a network problem. However, on closer inspection, these issues turn out to be a cyber-related incident that’s been causing trouble for an extended period of time.

To address these risks, organisations need to have a complete view of what’s in their operational environment.

This is done through a risk assessment, which will quantify assets and vulnerabilities. Having this initial visibility can seem overwhelming at first, but it will provide businesses with a starting point.

From there, it’s possible to build out a phased approach that will include getting the basics of OT security right and then seeing where else risk can be reduced.

In a rapidly evolving threat landscape, working with the right security partner can ensure organisations can safeguard their critical infrastructure.

It’s this experience and expertise that will ensure compliance, overcome legacy infrastructure challenges and visibility gaps using zero trust principles for visibility, control and protection.

Loading

United BANK

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares

Tags: Jayson PieterseOT securityTXOne'
Previous Post

NCC: Top Gains, Losers in Mobile Number Porting in January “24

Next Post

Climate-Tech VC Firm Satgana Closes First Fund to Back Early-Stage Startups in Africa, Europe

Techeconomy

Techeconomy

Related Posts

Scattered Spider Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns
Security

Hackers Behind UK Retail Attacks Now Eyeing U.S. Targets — Google Warns

by Joan Aimuengheuwa
May 15, 2025
0

This loosely organised network is made up of hackers of varying skill levels

Read more
Sophos MSP Elevate

Sophos Accelerates Business Growth and Profitability for MSPs with the Launch of MSP Elevate Program

May 15, 2025
CyberDome and Cato Networks

CyberDome and Cato Networks Collaborate to Deliver SASE in West Africa

May 12, 2025
Sophos warning about Chinese Cars -

Sophos Warns of Risk of Data Theft as Chinese Cars Flood France

May 7, 2025
FG Launches Data Privacy Academy

Nigeria Virtual Privacy Academy: FG to Train Youth on Cybersecurity, Data Governance

May 7, 2025
Future of multi-cloud by Samson Aligba -

Securing the Future of AI Integration: Why an Enterprise-Grade Model Context Protocol Framework is Crucial

May 5, 2025
Next Post
Satgana

Climate-Tech VC Firm Satgana Closes First Fund to Back Early-Stage Startups in Africa, Europe

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast

Techeconomy Podcast
Techeconomy Podcast

Infowave is brought to you by TechEconomy. Every week we will bring new stories from startups and influencers who are shaping and changing the world we live in. We’ll also bring you reports on topics you should know.

Follow us @techeconomyng for more.

CYBERSECURITY ESSENTIALS
byTecheconomy

BUILDING STRONGER NETWORKS AND COMMUNITIES

CYBERSECURITY ESSENTIALS
CYBERSECURITY ESSENTIALS
April 24, 2025
Techeconomy
Digital Marketing Trends and strategies for 2025 and beyond
February 27, 2025
Techeconomy
Major Lesson for Techies in 2024 and Projections for 2025
December 6, 2024
Techeconomy
Major Lessons for Techies in an AI-Driven World | Techeconomy Business Series Highlights
November 26, 2024
Techeconomy
Maximizing Profitability Through Seasonal Sales: Strategies For Success
November 8, 2024
Techeconomy
Techeconomy Business Series
October 15, 2024
Techeconomy
PRIVACY IN THE ERA OF AI: GETTING YOUR BUSINESS READY
May 30, 2024
Techeconomy
Unravel the Secrets of Marketing Everywhere All At Once with Isaac Akanni from Infobip | Infowave Podcast Episode 1
February 9, 2024
Techeconomy
The Role of Ed-tech in Life Long Learning and Continuous Education
October 19, 2023
Techeconomy
Filmmaking and Technology: A chat with Micheal Chineme Ike
June 7, 2023
Techeconomy
Search Results placeholder

WHAT IS TRENDING

https://www.youtube.com/watch?v=g_MCUwS2woc&list=PL6bbK-xx1KbIgX-IzYdqISXq1pUsuA4dz
uba

Follow Us

  • About Us
  • Contact Us
  • Careers
  • Privacy Policy

© 2025 Techeconomy - Designed by Opimedia.

No Result
View All Result
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
      • Accessories
      • Phones
      • Laptop
      • Gadgets and Appliances
      • Apps
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
      • Broadband
    • Mobility
    • Environment
    • Travel
    • Commerce
    • StartUPs
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • Appointment
    • EventDIARY
    • Editorial
  • Apply
  • TecheconomyTV
  • Techeconomy Events
  • BusinesSENSE For SMEs
  • TBS

© 2025 Techeconomy - Designed by Opimedia.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.