By Ahmik Hindman, Senior Network & Solution Consultant at Rockwell Automation
In the digital world, the consumer packaged goods (CPG) industry faces increasing cyberattacks targeting operational technology (OT) systems. A recent report from Food Processing finds that 47% of respondents experienced an increase in cyberattack exposure in the previous 12 months.
These systems, often comprising legacy equipment, play a crucial role in managing and controlling various stages of the production process, from ingredient handling and mixing to packaging and distribution. However, unpatched vulnerabilities within these systems create significant entry points for malicious actors, exposing critical infrastructure to manipulation, disruption and data breaches.
In the first half of 2023, the rate of unfixed industrial control system (ICS) flaws rose from 13% to about 34%, according to data compiled by SynSaber. Every day, unpatched security software exposes assets to constant cyberthreats, with devastating consequences for data, finances and reputation should the attackers succeed. Ransomware attacks are on the rise.
The time to act is now, not after an attack has occurred.
While patching outdated software is a crucial step, CPG companies face two significant hurdles:
- Legacy systems lacking vendor support.
- The inherent complexity of integrating patches into intricate production environments.
Beyond creating a cybersecurity headache, the burden of unpatched software and other technical debt has ballooned to an estimated cost of $1.52 trillion to fix, according to the Consortium for Information & Software Quality™ (CISQ™).
This article offers a roadmap for CPG manufacturers to help secure operations in a smart manufacturing environment. Firms can deploy robust cybersecurity strategies such as effective risk assessments, well-defined patching schedules and layered security measures to address the threat outdated software has on their operations.