• About
  • Advertise
  • Careers
  • Contact Us
Saturday, July 5, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
Home Business Security

The Biggest Threats to OT Security Will Surprise You

by Techeconomy
March 28, 2024
in Security
0
OT security Thought Leadership by Jayson Pieterse, Sales Manager at TXOne
Thought Leadership by Jayson Pieterse, Sales Manager at TXOne

Thought Leadership by Jayson Pieterse, Sales Manager at TXOne

UBA
Advertisements

As the use of operational technology (OT) and Internet of Things (IoT) grows, so too does the threat landscape. Without releasing it, many businesses may have thousands of unknown access points ready to be exploited by cybercriminals. Jayson Pieterse, Sales Manager at TXOne, explores the different risks organisations face.

===
With the growth in digital transformation of businesses, there has been an increase in tools and tech solutions that allow for greater connectivity.

From cloud and artificial intelligence to operational technology (OT) and Internet of Things (IoT), businesses are more connected than ever before.

And while these tech advancements have created more efficiencies, increased productivity and furnished businesses with more in-depth insights, they have also expanded the threat landscape.

As industrial operations have gotten smarter, the use of OT and IoT has proliferated. TXOne’s latest research found that 68% of organisations were continuously increasing their OT budgets.

This is the result of digital transformation investments demonstrating their worth to business owners and decision makers.

Board members and C-level executives are more informed about the benefits these technologies can bring to an organisation with many becoming increasingly involved in decisions around OT. However, with each new device, comes a new entry-point that needs to be secured.

Knowing this, insurance and auditing companies are driving organisations to be more compliant when it comes to OT security.

It’s becoming common practice for insurance companies to audit organisations and determine their premiums or if they can be considered for cover based on their compliance. Cyberattacks like ransomware and distributed denial of service (DDoS) are not only costly for the targeted organisation, but the companies that insure them.

The expansion of the threat surface through smart industrial operations has left organisations exposed. And while cybercriminals present a significant risk, there are vulnerabilities within organisations that impact OT security.

Legacy hinders OT security

Businesses in the industrial market like mining, oil and gas, manufacturing or utilities, are often operating with legacy infrastructure.

These systems were built with longevity in mind, and this comes at great expense – often hundreds of millions if not billions of rands. Because factories and plants are built for long-term use – some 40 or 50 years – it’s therefore not so easy to simply refresh operations.

There’s also the issue that a plant or factory’s infrastructure was built at a time when organisations didn’t have the technology that’s available today and so cybersecurity was not a factor.

However, as advancements are made in industry and new technology is adopted, solutions have been retrofitted to legacy infrastructure.

When it comes to considering the security of these new tech devices and systems, it’s then difficult to deploy patches and updates in a way that does not interrupt operations.

Bringing a factory offline for any amount of time can cost money, which is often the hesitancy businesses have when it comes to addressing their OT security.

However, a delay to business operations does not have to take place when the right OT security partner is brought on board. With industry experience, technicians are able to manage cyber defences across legacy infrastructure and can prevent interruptions and downtime.

Perception versus reality

Reluctance to disrupt a day’s work to update OT security is not the only risk businesses face. Many industrial organisations don’t have complete visibility of their OT and IoT assets and the possible vulnerabilities.

At TXOne, customers have approached us to provide a risk assessment with the understanding that there are 5,000 operational assets within the organisation. However, after a risk assessment, we’ve sometimes found five times this amount. This lack of visibility makes an organisation and its operations vulnerable to attack. You can’t protect something you can’t see.

Because there isn’t a clear view of these operational assets, minor problems with IoT devices or systems are often attributed to a network problem. However, on closer inspection, these issues turn out to be a cyber-related incident that’s been causing trouble for an extended period of time.

To address these risks, organisations need to have a complete view of what’s in their operational environment.

This is done through a risk assessment, which will quantify assets and vulnerabilities. Having this initial visibility can seem overwhelming at first, but it will provide businesses with a starting point.

From there, it’s possible to build out a phased approach that will include getting the basics of OT security right and then seeing where else risk can be reduced.

In a rapidly evolving threat landscape, working with the right security partner can ensure organisations can safeguard their critical infrastructure.

It’s this experience and expertise that will ensure compliance, overcome legacy infrastructure challenges and visibility gaps using zero trust principles for visibility, control and protection.

Loading

Advertisements
MTN ADS

Author

  • Techeconomy
    Techeconomy

    View all posts
0Shares
Tags: Jayson PieterseOT securityTXOne'
Techeconomy

Techeconomy

Next Post
Satgana

Climate-Tech VC Firm Satgana Closes First Fund to Back Early-Stage Startups in Africa, Europe

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recommended

cyber threats

Countries with the Highest and Lowest Risk for Cyber Threats Worldwide in 2024 

1 year ago
Cercli Aims to Disrupt MENA Payroll Market with $4 Million Funding

Cercli Aims to Disrupt MENA Payroll Market with $4 Million Funding

10 months ago

Popular News

    Connect with us

    • About
    • Advertise
    • Careers
    • Contact Us

    © 2025 TECHECONOMY.

    No Result
    View All Result
    • News
    • Tech
      • DisruptiveTECH
      • ConsumerTech
      • How To
      • TechTAINMENT
    • Business
      • Telecoms
      • Mobility
      • Environment
      • Travel
      • StartUPs
        • Chidiverse
      • TE Insights
      • Security
    • Partners
    • Economy
      • Finance
      • Fintech
      • Digital Assets
      • Personal Finance
      • Insurance
    • Features
      • IndustryINFLUENCERS
      • Guest Writer
      • EventDIARY
      • Editorial
      • Appointment
    • TECHECONOMY TV
    • Apply
    • TBS
    • BusinesSENSE For SMEs

    © 2025 TECHECONOMY.

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In
    Translate »
    This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.