What Does ‘ Air Gap ’ Mean ?
INDUSTRIAL CYBER SECURITY that they could recover business-critical data in the event of a destructive cyberattack or data loss .
“ Edge computing and IoT is a reality for many manufacturers and this only stands to accelerate with the rollout of 5G . The resulting amount of distributed data produced in factories , remote locations , and other manufacturing sites means that manufacturers are fast becoming ' data businesses ',” said Green .
This means there are many more areas where criminals have the potential to cause damage . One of the most regularly proven methods of protecting an organisation ' s ability to recover from a cyber-attack is to isolate critical data and operations off the network , according to Green .
“ For manufacturing , an offline , air-gapped copy of data is physically and logically isolated from the production network , protecting critical data sets from production where attacks occur . Machine learning can help identify suspicious activity , allowing the recovery of known good data ,” she said .
Subsequently , manufacturers can maintain the availability of their sites , saving them from downtime and disruptions to production flow .
“ In the wake of a targeted , sophisticated cyberattack ; air-gapping manufacturing ensures that the data most critical to resuming operations can continue while complete recovery procedures continue . By keeping critical operational data stored safely in cyber recovery servers , manufacturers can boot up production machines and restart production , even when hit by a catastrophic data-loss event .
“ With manufacturing continuing to innovate at an exciting pace , it is essential to consider how to best safeguard , protect , and recover the business if necessary ,” said Green .
What Does ‘ Air Gap ’ Mean ?
An air gap is a security measure in which computers , computer systems or networks are not connected in any way to any other devices or networks . This is used in instances requiring airtight security without the risk of compromise or disaster .
Managed Detection and Response ( MDR ) services “ Breaches are inevitable no matter how impenetrable you believe your defences to be ,” says Paul Keely , Chief Cloud Officer at Open Systems , which provides clouddelivered security solutions with managed detection and response capabilities , as well as unique integrations and ML models of the Microsoft security stack .
“ Eventually , bad actors will get through your perimeter and will attempt to move laterally from system to system in search of valuable data . Fortunately , breaches can be effectively contained and their impact minimised , if you ’ ve taken the right precautions .
“ For instance , simply having firewalls on all employees ’ local machines makes it much harder for a breach to spread . Attackers will be further frustrated if your organisation follows basic cyber hygiene practices , such
technologymagazine . com 91