March 2019

36 n EXECUTIVE VIEWPOINT March 2019 www.drivesncontrols.com Time to embark on the long journey to Industry 4.0 Industrial cyber-attacks: check the doors and windows “Each new item of equipment must be connectable from inception to allow manufacturers to reap long-term benefits.” Productivity has been at the top of the business agenda for many years. To be competitive in today’s hyper-competitive global economy, manufacturers must become more creative in adopting the latest innovative technologies. Put simply, manufacturers must strive to produce more, at lower costs and of better quality. This efficiency can only be accomplished through technology that provides digital insight into the health and performance of operations. The optimum situation is a highly flexible line, running multiple products perfectly in sync with customer needs, and as close to 24 hours a day as is practical. It would be able to optimise itself, take further remote commands and predict impending mechanical failure, so that downtime can be planned to avoid unforced machine closure or missed client orders. With an increased emphasis on performance, Industry 4.0 – which includes the Industrial Internet of Things (IIoT), robotics and automation – will soon take hold. Ultimately, the earlier that businesses adopt the technology, the better they’ll be to compete on a global scale. More than a buzzword Industry 4.0 is more than just a buzzword used by businesses to improve their image. Yet, many organisations and Vice-President Industry, Schneider Electric Martin Walder Managing Director, Beckhoff Automation Stephen Hayes The motives for cyber-attacks on industrial equipment may differ from those on IT systems, and the outcomes of security breaches may also be different, but they still present the same challenges of protection versus usability. The outcomes can range from theft of intellectual property, or compromising safety, to the shutdown of an entire plant or process. The simple approach of changing passwords frequently and ensuring they are sufficiently complex is analogous to changing the locks to a building when one of the keys has been lost or taken by an ex-employee. Unfortunately, passwords are significantly easier to copy and share than keys and can be propagated much faster and more easily. You may lock all of the doors, only to discover that a window is open, or there is no way to shut the window. Where, then, do you begin in the industrial environment? Systems are typically built from “tough” components that are generally locked away when not in use or, in some cases, viewed as being simply too big to be worth stealing. However, if an adversary is able to remove their useful functionality, then they are as good as stolen. With computerised and electronic control equipment, it can be harder to spot the “open doors and windows”, but they invariably exist and will often be a result of having made the equipment easier to use. Similarly, a

RkJQdWJsaXNoZXIy MjQ0NzM=