To subscribe, advertise or contribute articles to smartmanufacturingtoday.com contact publisher@xtra.co.nz

  • Home
  • Newswire
  • Contact us
  • Advertise
  • Subscribe
  • About
Smart Manufacturing Today
Your source of info
  • Home
  • Additive Manufacturing
  • AI
  • Big Data
  • Business
  • The Circular Economy
  • Computer Integrated Manufacturing
  • Developments
  • Events
  • Featured
  • Future Technologies
  • Internet of Things
  • Latest News
  • Manufacturing Software
  • Manufacturing Technology
  • Product Design
  • Robotics
  • PLM & CAD/CAM
  • Profiles
  • Supply Chain
  • Sustainability
  • The Creative Class
  • Workshop Tools

News Ticker

Smarter growth, lower risk: Rethinking how new factories are built
  Countries successfully growing their manufacturing – and what they are doing right
BW Converting launches e-learning platform for enhanced customer training
Manufacturing and Production Industry is Fighting a 41% Increase in Ransomware Attacks over Four Years
CT Semiconductor Inaugurates ATP Chip Semiconductor Training Center
Energy Experts on AI Tools for Building’s Sustainability:“Triple Win for Businesses, People, and Planet”
FactoryTalk DataMosaix puts data at the centre
How leveraging smart factories optimises products and operations for manufacturers

Five steps to protecting Industrial Internet of Things infrastructure

 

  1. Implement layer-7 inspection technologies for improved visibility
    Granular visibility of ICS protocols is a helpful step to increasing intelligence over data traffic. Linking this visibility to users and inspecting file-bearing applications is an essential part of this process. Next-generation firewalls employing advanced deep-packet inspection technology can help to deliver this capability.

    2. Apply zero-trust network segmentation
    It is important to apply zero-trust rules with access allowed on a ‘least privilege’ basis, where users are given access only to the systems they need to carry out their duties. This approach can result in a marked reduction in the number of vectors that can be used by an attacker, while also providing better correlation between user and application.

    3. Use modern tools for preventing zero-day attacks
    So-called zero-day attacks exploit previously unknown vulnerabilities in computer code to breach systems. Tools that can detect and prevent such threats at both the network and the endpoint levels are now essential for protection. A combination of malware ‘sandboxing’ solutions and advanced endpoint protection technology can help reduce the success of such attacks.

    4. Secure mobile and virtual environments
    Mobile devices should be checked for proper configuration before being allowed to access the network and, once on the network, applications should be limited to reduce the potential attack vectors. For virtual environments, virtualised firewall technology should be used to provide better visibility to data traffic.

    5. Use a cohesive security platform
    Many legacy ICS environments don’t have adequate security, and those that do often use security systems with point solution architecture. This can hamper performance, incident response, and administration. Next-generation firewall architecture, on the other hand, along with new models of centrally-connected endpoint security measures, support optimal operation and threat detection.

Share this:

Related Posts

Jessica-Cheam-532x600

Internet of Things /

Trillions to be unlocked in sustainable investment opportunities in Asia 

Smarter PIC

Internet of Things /

Smarter growth, lower risk: Rethinking how new factories are built

AMA gets PIC

Internet of Things /

Your company’s visionaries are wrong about the Internet of Things

‹ Fujitsu develops cyber attack technology› Taking steps to protect connected industrial infrastructure

10th July 2025

Recent Posts

  • What is multimodal AI?
  • Can reading the news make you richer?
  • Tech Council of Australia and techUK sign landmark partnership
  • The Genius Myth: A Curious History of a Dangerous Idea
  • Your Life Is Manufactured: How We Make Things, Why It Matters and How We Can Do It Better

Categories

  • 3D Printing
  • Additive Manufacturing
  • AI
  • Big Data
  • Business
  • Computer Integrated Manufacturing
  • Developments
  • Events
  • Featured
  • Future Technologies
  • Internet of Things
  • Latest News
  • Manufacturing Software
  • Manufacturing Technology
  • PLM & CAD/CAM
  • Product Design
  • Robotics
  • Supply Chain
  • Sustainability
  • The Circular Economy
  • The Creative Class
  • Uncategorized
  • Workshop Tools

Back to Top

  • Home
  • Additive Manufacturing
  • AI
  • Big Data
  • Business
  • The Circular Economy
  • Computer Integrated Manufacturing
  • Developments
  • Events
  • Featured
  • Future Technologies
  • Internet of Things
  • Latest News
  • Manufacturing Software
  • Manufacturing Technology
  • Product Design
  • Robotics
  • PLM & CAD/CAM
  • Profiles
  • Supply Chain
  • Sustainability
  • The Creative Class
  • Workshop Tools

To subscribe, advertise or contribute articles to smartmanufacturingtoday.com contact publisher@xtra.co.nz

(c) Smart Manufacturing Today, 2025