How to Keep Your Manufacturing Process Secure

By Robert Glass, food and beverage communications manager, ABB
Cyber security has been top of the agenda for many businesses following the global Wanna Decryptor (WannaCry) ransomeware attack that grabbed headlines in May, 2017. The latest in a line of high profile attacks, WannaCry saw over 45,000 attacks recorded in almost 100 countries, including the UK, US, India and China.
As food manufacturing plants become more connected through the Industrial Internt of Things (IIoT), the threat of cyber-attacks and how much damage they can do, has increased. This article offers advice on how to ensure your manufacturing process is kept secure.
IIoT is creating many exciting opportunities for the manufacturing industry; however, the increased use of connected devices and systems has also resulted in a rise in cyber-attacks. For many, the phrase cyber-attack conjures an image of email hacking and stolen bank details, but it can have a significant impact on plant processes and production if systems are not protected correctly.
While it can be difficult to prevent a cyber-attack from happening, there are a number of precautions manufacturers can take to minimize risk and protect themselves.
Identifying the gaps
Research conducted by the UK government found that while one in four large firms experience a breach in cyber-security at least once a month, only half have taken any action to address vulnerabilities. Furthermore, only one third of the firms surveyed had any form of cyber security policy at all.
The first step in securing your plant’s system is to quickly identify the devices and software that are most vulnerable. To do this, plant managers should appoint an individual or team, dependent on the size of the facility, that takes responsibility for cyber security. Once appointed, they should conduct an in-depth security assessment and establish a program of regular monitoring to identify weaknesses and the actions that need to be taken to improve security.
Many plants now operate a bring your own device (BYOD) policy, allowing employees to access systems, software and networks through their own devices. The concept brings with it many benefits, including increased productivity and reduced IT costs. However, it is important that there is a security policy in place to ensure breaches do not occur.
The biggest cause of breaches is the lack of a functional firewall and up-to-date firmware across a business. Firewalls are often the first line of defense against a cyber-attack, protecting the perimeter of a network. Users must ensure that their devices have the latest software updates, as they often include security patches to protect against new cyber threats. Cyber attacks are constantly evolving to get around security protocols, so it is vital that the software on any device accessing the network is up-to-date. Connecting to unsecure Wi-Fi and Bluetooth networks can also pose a danger. Security managers should ensure users always connect to secure networks that are password protected.
Standards and policies
The digital landscape is constantly evolving and, as such, the standards and policies that business put in place to protect themselves should also adapt.
There is no single solution to protect all businesses, so it is important to seek the advice of organisations, such as ABB, to create a company-wide policy that can detect, deter and prevent the threat of a cyber attack. In additon to a company’s IT network with traditional laptops, many food and beverage manfuacturers also maintain a connected automation network. This network controls a manufacturing plants production; from simple control like mixing bagel dough to more potentially dangerous processes like decanting oils (where high kenetic speeds can pose safey hazards). Recipies are managed on these systmes, and companies have a large financial interest in also protecting their automation networks from cyber attacks.
Software, like the ABB Ability System 800xA, provides bespoke cyber-security solutions across an entire system life cycle, with multiple layers of security controls that are continually updated.
Even with a robust security system in place, it is vital that manufacturers keep an off-site back-up to ensure data is protected in the event of cyber attack. Keeping this back-up off-the-grid will ensure a much smoother recovery process of critical data.
While awareness of cyber-attacks has risen since May, businesses must now move to take action and ensure their systems are adequately protected. The WannaCry ransomeware attack has proven that all businesses are vulnerable, no matter their size and that no one can take cyber security for granted.

Check out our free e-newsletters
to read more great articles.
- Posted in:
- Article
- Related Portals:
- Plant & Asset Management, Cybersecurity, Manufacturing Operations Management, Process Safety, Process Automation, Food & Beverage
MORE ARTICLES
-
Inside the Advantages of Sensorless Closed Loop Control
By Mark Checkley, KEB Automation
While feedback devices may be the usual choice for control of motors, sensorless closed loop control can provide... -
Manufacturing Automation - Inside Universal Robots Efforts to Empower the Small/Medium Enterprise
By Bill Lydon, Editor, Automation.com
Collaborative robots are re-defining the way manufacturers operate today. To help further that process is... -
Predicting the Future of Industrial Maintenance
By Gernut van Laak, Group Automation Solutions Leader, ABB Food and Beverage
The need for factory maintenance often goes unnoticed. This article... -
Integrators Talk about Collaborative Robots: A Roundtable Discussion
By Jeff Burnstein, A3
The Association for Advancing Automation (A3) reached out to several large automation integrators to get their input on the... -
Lean Manufacturing and the Global Digital Process Automation Market
By Thomas R. Cutler
Digital Visual Management on the manufacturing plant floor is secure by creating virtual meeting rooms for real-time, 24/7,...
RELATED
-
Carnegie Mellon research aims at identifying causes for defects in 3D Printing
New research published today in Science, led by researchers from Carnegie Mellon University and Argonne National Laboratory, has identified how and...
-
ISA announces release of Fluid Mechanics of Control Valves: How Valves Control Your Process
The book reflects the latest understanding of how fluid mechanics and acoustics affect control valve performance.
-
Maplesoft and Sigmetrix announce direct operations in China
The two Cybernet Group companies now have an office in Shanghai that is staffed by local experts to provide products and solutions to their...
-
Mobile Safety in Hazardous Areas
By Pepperl+Fuchs
Mobile devices can solve many challenges in hazardous industrial environments. But a device that lacks the proper protection... -
Phoenix Contact announces Benton Central Jr./Sr. High School as winner of Nanoline Contest
For designing and building an automated Paint Brush Cleaner, this is the second consecutive win and third overall for a Benton Central team