Vanderbilt Industries

We probably take critical infrastructure for granted in our day-to-day living. We turn on a tap, flick a switch, or push a button and water, light, and heat are all readily available to us. However, as critical infrastructure are managed by computerised systems this makes them vulnerable to cyberattack. As a direct consequence, this makes us as a society vulnerable too.

Imagine if a cyberattack took down the power supply to an entire city without warning? Chaos would ensue. Traffic lights, ATMs and cash registers, fuel pumps, and water pumps, amongst a long list of other things, would cease to operate. The scary thing is, the scenario of a cyberattack on critical infrastructure isn’t far-fetched anymore.

Two-factor authentication

For example, in 2016 the WannaCry ransomware attack infected over 300,000 computers around the world. Frighteningly, the virus was spread by something as low-tech as an email. Britain’s National Health Services (NHS) was caught up in the attack. As a result, surgeries were cancelled, staff reverted to pen and paper, and only emergency patients could be treated.

The most well-known example of a cyberattack on critical infrastructure was the attack on the Ukrainian power grid in December 2015 when 250,000 homes lost power as a result. Accessing the systems controlling the plant’s circuit breakers did not require two-factor authentication, thus providing a security breach for the attackers to exploit with stolen credentials.

Physical security has moved from being very simple inputs and outputs, to being always-connected devices

Provide best security

The rapid gains that technology has made into everyday living has also changed how the security industry operates. In short, physical security has moved from being very simple inputs and outputs, to being always-connected devices. This makes the industry very much part of the IoT world. Of course, this leads to the question - how does physical security protect itself from cyber vulnerabilities?

This ethos has changed how Vanderbilt think when designing and developing their own security systems, in particular SPC. FlexC, the company’s communications protocol, was redesigned from the ground up solely with cybersecurity in mind. The protocol has been designed to ensure everything is encrypted, all communications are monitored, and multiple types of attack are considered for defensive purposes to provide the best security possible.

Multiple communication paths

SPC has built-in protection mechanisms whereby if the system is attacked, it will go into protection mode. The system will remain operational and it will still be able to communicate out, but it will start to shut down elements of itself to protect the system from the attack.

While no system is invincible, SPC has been designed so that should an attack penetrate, the system has multiple communication paths available as backup. Therefore, if one server is taken down the system can immediately switch to a backup server and then switch communication paths to bypass the attack and ensure messages still operate successfully.

Targeting people opens the door to the ‘weakest link’ possibility that can uncover vulnerabilities such as lack of authentication and encryption

Targeting critical infrastructure

The most obvious low hanging fruit when targeting critical infrastructure is to target people. Targeting people opens the door to the ‘weakest link’ possibility that can uncover vulnerabilities such as lack of authentication and encryption, and weak password storage that can allow attackers to gain access to systems.

Notably, the clear majority of hacks come down to human error whereby weak passwords, or clicking on contaminated email attachments, will expose an organisation’s security. Hackers have also been known to target contractors and simply wait until they go on-site for scheduled maintenance with their infected laptops.

Spear-phishing email

According to the Kaspersky Lab research, the percentage of industrial computers under attack grew from 17% in July 2016 to more than 24% in December 2016. The top three sources of infection were the internet, USBs, and email attachments.

For instance, a spear-phishing email was the technique used in an attack on a German steel mill in 2014. Here, the attackers gained access to the plant’s network through an infected email attachment. The success of these non-complex methods would indicate low levels of awareness about how cyberattacks are carried out.

Blocking phishing attacks

Technology in day-to-day life might be growing at a rapid rate leading to fears of potential security breaches. But one must remember that technology’s growth also means that security defences are developing in parallel. At its core, security is about being continuously observant, following best practices, and being ready and able to react against a security issue. Unfortunately, in a survey of nearly 600 utility, energy, and manufacturing organizations, only half of the companies had a dedicated IT security program.

A hacker waits an average of 146 days from having penetrated a system before they strike

Email controls assist in blocking phishing attacks that can bypass spam filters. While regular compromise assessments will check to see if an attacker is already in the system. Currently, a hacker waits an average of 146 days from having penetrated a system before they strike. Therefore, regular assessments give the opportunity to root out penetrations before they strike.

Following best practices

However, one of the most obvious places to start is to choose equipment from reliable suppliers that have a knowledge and interest in cybersecurity and are focused on protecting your data. When your security system is designed from the ground up to protect against cyberattacks, naturally your organisation will be in a much better place.

So how do we best protect against the darker side of an increasingly connected world? By being open and transparent in exposing and reporting vulnerabilities. The best way to avoid attacks is to keep systems up-to-date, change passwords regularly, provide employee training and be diligent in safeguarding facilities through firewalls and following best practices in network maintenance. Keeping up with security updates allows us to make the most of the new technologies available today and into the future.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version

Vanderbilt Industries news

Telenot and Securiton among other market providers have confirmed participation in Security Essen 2020

Security Essen is continuing to consolidate its position as a platform for the security industry. Numerous companies have confirmed their participation in the leading international trade fair, which will take place at Messe Essen from 22 to 25 September 2020. Particularly pleasing: In addition to many long-standing customers, the registrations also include companies which will take part in Security Essen again for the first time after a break. Amongst others, Telenot and Securiton will present...

What are the challenges of protecting large campuses?

Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?

Vanderbilt expands its range of SPC Wireless system in response to consumer IoT trends

Vanderbilt, a provider of the state-of-the-art security systems, announces new devices to complement the existing range of SPC Wireless system. The new range of devices include: WSIR-EXT – Wireless external sounder/beacon available with a blue, red, or orange beacon. WSIR-INT – Wireless internal sounder/beacon. WRPTR – Wireless AC plug style repeater to provide an alternative communications path. Wireless accessories – a range of accessories to improve the installa...

Vanderbilt Industries case studies

Vanderbilt’s SPC Wireless devices are the perfect match for retail establishments

Vanderbilt’s SPC Wireless is an ideal fit for the retail sector. First off, SPC Wireless devices’ aesthetically appealing design is perfect to fit in with retail environments and compliment the surrounding environments of a modern-day retail store. But, as well as featuring a sleek design, the Wireless devices also have many standout features that specifically benefit the retail sector. Automatic power saving One of these benefits is long battery life as the devices are supported b...

Vanderbilt ACT365 addresses access control security concerns at Study Abroad University, London

Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of...

Vanderbilt’s ACT365 cloud-based access control solution protects Work.Life facility in London

Security installation specialist Vision Security Services installed Vanderbilt’s ACT365, a cloud-based access control and video management system, at Work.Life, a co-working and private offices facility in London Fields, east London. The ACT365 solution was implemented late in the construction stage, as initially, the client had used a conventional system, before realising late-on the benefits available from cloud management. Essentially, the client needed unified management of access poi...