Industrial Cyber-Security



There are five distinct types of cyber-security, critical infrastructure, application, network, cloud and internet of things (IoT) security. To keep critical systems running and protect the financial results and reputation of any organisation that includes industrial processes, businesses must focus on improving their cyber-security.

According to IBM, cyber-attacks are increasing at an alarming rate with the manufacturing industry being the second most popular area for cyber-criminals. Hackers mount repeated attacks on manufacturing control systems, stealing intellectual property, and gathering commercially sensitive process data. IBM estimates a typical industrial data breach will take 8 to 9 months from detection to containment and cost the company £3 million.

Cyber-attacks can damage enterprises through downtime, data and money loss. For example on April 29, 2021, a large US pipeline system, Colonial Pipeline, experienced a cyber-attack from a ransomware gang, DarkSide. Using a compromised password, DarkSide was able to gain entry into the company’s networks and disrupt pipeline operations. DarkSide demanded a ransom of almost $5 million in Bitcoin, which Colonial Pipeline paid soon after.

How To Reduce Cyber-Attacks

D-Sig designs and installs state of the art cyber-security products to protect industrial data from cyber-attack. Our systems make use of strong cryptographic algorithms and cryptographic hardware to protect data throughout its lifecycle

The D-Sig Data Security solution ensures the protection of sensitive data at all times. As often as possible, the processing takes place within secure cryptographic hardware devices. At all other times, data is protected by being digitally signed and encrypted.

To make all this work, D-Sig Certification Authority issues security credentials. These are in the form of digital certificates for the private keys held within the cryptographic co-processors and cloud servers. Alongside other types of certificates, D-Sig Certification Authority provides control over data access.

Customise D-Sig Certification Authority to enforce the existing Data Security Policy and protocols of your organisation. For example, setting the password rules for accessing the cryptographic devices and private keys.

Find out more about D-sig Certification Authority here.