Breaches that result in the theft of millions of pieces of personal data get big headlines, such as those involving retailers, hospitals and government agencies.
But attacks on industrial control systems โ sometimes called SCADA systems โ are quietly increasing as well, according to a new survey by the SANS Institute. According ย Siemens patches SCADA flaws ย
Almost 20 per cent of respondents whoโd successfully been attacked said systems were breached for at least 24 hours before it was discovered, and 20 per cent reported that they could not determine how long the infiltration had been going on. Another 20 per cent said breaches werenโt detected for more than a week, and 15 per cent reported not knowing about the infiltration for more than a month.
The report also found worrying that only 20 per cent of respondents stated that qualification of security technologies by their ICS equipment vendors is mandatory, considering what it says is the critical nature of Site Acceptance Testing (SAT) of industrial control system components. Even more concerning, it added is ย that 25 per cent of respondents said it is only moderately important or not important. And 10% didnโt know how important it is to validate new security tools before introducing them into control systems. Most respondents (65 per cent) said vendor qualification of security technologies and solutions to be either highly important or mandatory.