IBM says manufacturing industry most targeted by cyber attacks

IBM says manufacturing industry most targeted by cyber attacks

The latest IBM Security X-Force Intelligence Index report states that the manufacturing industry is the most targeted industry by cybercriminals globally.

While in Asia, the manufacturing industry experienced cyber attacks by 29 percent, ranking second in the industry targeted by cybercriminals.

In contrast to the global, the financial and insurance industry is the most targeted industry in Asia with an attack of 30 percent.

According to IBM, the manufacturing industry experienced the most ransomware attacks at 23 percent last year. The company said the ransomware perpetrators were trying to “crack” the backbone of global supply chains with attacks on manufacturing.

Read Also: The History of Paris Fashion Week to Become a World Fashion Event

“This ransomware is capable of destroying and locking down or locking the data we have, even eliminating traces, eliminating data and then returning it back into the IT system so that it destroys the infrastructure that has been prepared properly,” said IBM Indonesia President Director and Technology Leader. Cin Cin Go in a virtual media gathering, Wednesday.

The IBM Security X-Force report also noted that there was a 33 percent increase in cyberattacks caused by exploiting software vulnerabilities that were the most reliable entry point for ransomware perpetrators over the past year. It is the cause of 44 percent of ransomware attacks.

According to IBM, cybercriminals realized that the disruption inflicted on the manufacturing industry would cause downstream supply chains to pressure the industry to pay a ransom.

As many as 47 percent of cyber attacks against manufacturers are caused by unpatched software vulnerabilities that have not been or cannot be addressed.

IBM Security X-Force Intelligence Index

Seeing this, IBM also highlighted the need for an industry or organization to prioritize vulnerability management.

Cin Cin said cybersecurity plays an important role so that critical systems and sensitive information owned by a company or organization remain protected.

He also said companies need to understand cybersecurity before deciding to enter into the digital transformation agenda, such as deciding to use more cloud computing to support business.

Cin Cin emphasized that the cyber security strategy must be carried out properly, starting from the human resource, process, to technology side.

He also underlined the importance of companies to start implementing a security strategy immediately accompanied by proper planning.

“When exactly do we have to prioritize cyber security on this agenda. Actually the answer is ‘yesterday’. Yesterday we should have thought about it. But we have to start right now because everything has to come up with the right plan,” he said.

https://sway.office.com/jHWe1YPdzQHZrHZw?accessible=true

https://sway.office.com/0AedhMTsKXF7QGEU?

https://figshare.com/s/c8eb79000ae2d731a72c

https://figshare.com/s/59eb1c0c7e513a632229

https://public.flourish.studio/visualisation/8927567/

https://public.flourish.studio/visualisation/8927649/

https://rebornfullonlinetaiwan.tumblr.com/

https://twmovies-reborn-fullonline.tumblr.com/

https://www.buymeacoffee.com/howardjohnv

https://www.buymeacoffee.com/howardjohnv/n-a-913608

https://figshare.com/s/ef89a15eb538cc6271ad

https://figshare.com/s/2101c6e76bd7f42553ab

https://public.flourish.studio/visualisation/8928272/

https://public.flourish.studio/visualisation/8928300/

https://tw-fatestaynight-fullonline.tumblr.com/

https://fatestaynight-twfullversion.tumblr.com/

https://figshare.com/s/2dd284612f5aa8481079

https://figshare.com/s/b8af172e7c3df24346b4

https://www.buymeacoffee.com/brentowensr

https://www.buymeacoffee.com/brentowensr/n-a-913801

https://www.buymeacoffee.com/brentowensr/n-a-913811

https://minimore.com/b/SxVll/1

https://www.lumaworkplace.com/s/sessions/s/3cd0b5cc-af3c-493c-a673-a339de954fe0

https://www.lumaworkplace.com/s/sessions/s/8874a709-8fbe-473b-9757-f8ae675aaee3

https://figshare.com/s/c017a252397603b1cd25

https://figshare.com/s/96ee3cbc82fa6b4fee8f

https://public.flourish.studio/visualisation/8929156/

https://public.flourish.studio/visualisation/8929184/

https://monstersofman-twfullversion.tumblr.com/

https://tw-monstersofman-fullonlinepisan.tumblr.com/

https://minimore.com/b/B8oee/1

https://www.buymeacoffee.com/randybrighT

https://www.buymeacoffee.com/randybrighT/n-a-913978

Leave a Reply