DigiTales (Blog)

Why is cyber security crucial in obsolescence planning?

Written by Purna Kiran | 20.aug.2024 08:29:15

In the ever-evolving landscape of technology, control systems are the beating heart of countless industrial processes. Their role is paramount in ensuring efficiency, safety, and regulatory compliance. Yet, as technology advances and systems become outdated, cybersecurity within these control systems takes centre stage. In this article, we explore the intersection of cybersecurity and obsolescence and how to mitigate the risks associated with aging control systems.

 

 

The two dimensions of obsolescence

When it comes to addressing obsolescence in control systems from a cybersecurity perspective, we can break it down into two key aspects.

 

  1. Control System Obsolescence

Control systems, like any technology, have a lifecycle. Over time, they become outdated, often leading organisations to opt for system upgrades. This might happen as the companies supplying the control systems create new programs and softwares a stop supporting the old ones. But how do you navigate the transition while safeguarding your cybersecurity?

 

  1. Cyber security Procedure Obsolescence

Cyber threats and technology complexity constantly evolve. There are always someone looking for a new way into control systems to exploit them. As a result, existing cyber security processes may become outdated or insufficient. To stay secure, organisations must adapt and modernise their cybersecurity procedures.

 

Identifying obsolescence in control systems

Recognising when a control system has become obsolete in terms of cybersecurity is crucial. Most control systems rely on third-party software, each with its own lifecycle. To ensure cybersecurity, it's vital to follow active lifecycles where vendor support can be guaranteed. If the vendor no longer supports the used software, a software upgrade should be taken into consideration. 

 

Additionally, operating systems like Windows often stop releasing security updates for legacy versions. Sticking with outdated operating systems can leave systems vulnerable.

 

The consequences of cyber security obsolescence

Why is cybersecurity obsolescence such a pressing concern? The consequences are far-reaching in that obsolete systems can develop vulnerabilities, and if exploited, can lead to loss of production, compromised safety, and exposed sensitive data, including trade secrets. It can also lead to loss of reputation as a result of these. 

 

An example is the Colonial Pipeline cyber-attack, which serves as a stark reminder. This ransomware attack resulted in the shutdown of a major pipeline system, causing fuel shortages, panic buying, and price spikes across states. It highlighted the real-world impact of cyber threats on critical infrastructure.

 

Additionally, cyberattacks not only tarnish an organisation's reputation but also result in financial losses. Businesses can face downtime, regulatory penalties, and the costs of investigating and remediating the breach.

 

Mitigating cyber security risks in obsolete systems

To safeguard control systems from cybersecurity threats when faced with obsolescence, follow these key steps:

  1. Use approved and current software: Ensure that approved and currently active software is in use within the control systems. Regularly update both the control system software and third-party components.
  2. Stay informed: Keep up to date on evolving cybersecurity alerts and threats. Proactive measures are essential to protect systems and data.
  3. Access control: Restrict access to systems, both physically and remotely. Implement measures such as blocking USB ports and regularly changing passwords. Consider two-factor authentication where appropriate. However, it’s also important to not change passwords too frequently leading to people writing them down and leaving them places that are easy for anyone to find.
  4. User account management: Keep user accounts up to date and remove access when personnel leave the organisation. Avoid shared accounts to enhance accountability.
  5. Emergency response plans: Develop and practice cybersecurity emergency response plans and conduct drills to ensure preparedness.

 

Remember, your company is only as strong as its weakest link. Mitigating risks in obsolete control systems requires a proactive and comprehensive approach. By staying vigilant, adapting to change, and prioritising cybersecurity, organisations can safeguard their critical systems in an ever-changing technological landscape.