What's Hot

    What Can You Trust?

    May 7, 2025

    Build a Safer Jobsite with AI and Cameras

    May 7, 2025

    Women in Construction: PPE

    May 6, 2025
    Get your Copy Today
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    Connected WorldConnected World
    • SPM
    • Sustainability
    • Projects
    • Technology
    • Constructech
    • Awards
      • Top Products
      • Profiles
    • Living Lab
    Connected WorldConnected World
    Home»Cybersecurity»COVID, IoT, and Cybersecurity
    Cybersecurity

    COVID, IoT, and Cybersecurity

    Updated:April 21, 2022No Comments6 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn WhatsApp Pinterest Email

    As the COVID-19 pandemic seems to be winding down in much of the world, companies are recognizing a new threat. The war in Ukraine has potential for massive cyber attacks in retaliation for sanctions and companies are expected to be targeted along with governments and critical infrastructure. Combined with stricter compliance requirements by governments to help secure cyber assets, the market for MSS (managed security services) is growing stronger.

    More and more companies are falling victim to data theft, espionage, or asset sabotage. Hackers are becoming increasingly aggressive in their approach, deliberately exploiting vulnerabilities to gain access to systems. Many companies don’t have the expertise or time to raise their level of protection. This is where MSS providers can help deliver an end-to-end solution tailored to the exact threat situation.

    From NTT‘s perspective, four themes will drive the MSS market in the coming months:

    • The exceptional situation is becoming the norm. It is not only the number of security incidents that is worrying, but also the rapid development of new and adapted attack methods, the mass exploitation of serious software vulnerabilities, and the serious consequences that successful cyberattacks can trigger.

    AI (artificial intelligence), for example, is now a part of hackers’ repertoire. What’s more, the increased use of home offices has opened numerous new avenues for infiltrating the corporate network. At the same time, companies are facing numerous compliance challenges and industry-specific security standards. Then, with economic challenges causing budgets for IT security to be cut after two years of pandemic, companies find themselves at a loss.

    • Lack of resources slows down cyber defenses. Technology is only one cornerstone of IT security, the other being the internal security team that takes care of processes, organization, and user awareness. Many IT departments reached their capacity limits even before COVID and demand for cybersecurity experts has exceeded supply for years. In the pandemic, the situation has become even more acute, as security specialists have been called upon in many places as a silent reserve to fix computer and network problems, install VPN (virtual private networks), or staff help desks in order to meet the sudden demands from the shift to remote working and accelerate digital business processes.
    • New areas require new approaches. IT infrastructure has changed fundamentally in recent years, and IT security measures must now be adapted in parallel. This includes client portals, for example, as well as mobile applications that are essential for remote working. Security by design is a better approach to warding off potential dangers than to carry out some laborious upgrades after the fact.

    If a company has fallen victim to a cyberattack and needs to take appropriate countermeasures, DFIR (digital forensics & incident response) is the tool of choice. Using artifacts—traces left by attackers on a compromised system—experts can identify the attack vectors and determine the extent of the damage. Countermeasures are then initiated, and protective mechanisms are built to prevent attacks via the same gateway in the future.

    • Cyber insurance and a DFIR retainer become the perfect match. Many companies take out cyber insurance to protect themselves against the financial consequences of a hacker attack or data loss. However, such a policy is not a free pass for inadequate IT security. As a rule, insurers assess a company’s risk level in advance by means of audits and derive the appropriate insurance coverage from this.

    Companies that are not mature enough to defend against and respond to cyber-attacks or lack awareness of the numerous threats will not be offered a contract. It therefore makes sense to combine this with a DFIR retainer: in addition to defense, proactive measures are also taken here to sustainably increase a company’s cyber resilience. Onboarding at the beginning of the contract gives the provider an overview of the technical conditions of the customer infrastructure and evaluates the protocol and security mechanisms. Based on this and as a “lesson learned” after an incident, improvement measures are implemented.

    Various technical approaches to isolate and protect a company’s infrastructure and, with the expansion of IoT devices, ensure networks are secured are being proposed. NTT, for example, is collaborating with Schneider Electric to deliver P5G (private 5G) – an on-premise private network solution and digitization enabling platform that can dramatically advance digital solutions in the manufacturing environment.

    In 2022, the P5G platform will be piloted at Schneider’s Lexington Smart Factory, the first of Schneider Electric’s U.S. plants to become a Smart Factory showcase site leveraging IoT connectivity, Edge analytics, and predictive analytics to drive energy efficiency and further sustainability goals. The P5G will power key use-cases that solve challenges around equipment availability, machine performance, and product quality.

    For example, the companies will integrate ‘machine vision’ capabilities (industrial cameras with specialized optics) into existing factory and warehouse automation systems, that identify faults as well as wear and tear for incident root cause in near realtime.

    Through co-innovation, the solution will provide a model for operational integrity management that scales across a broad footprint of global factory environments to power Industry 4.0, enabling network edge platforms.

    Additional P5G use-cases to be addressed including unfettered connectivity for improved management of AGV (automated guided vehicles) and devices across a factory that yields more efficient and accurate workflow systems. In addition, machine vision application to detect anomalies in machine performance to ensure high performance, availability, and quality of product and augmented reality solutions that enable remote worker support for enhanced equipment maintenance and management and worker experience.

    To further the partnership, NTT will deploy its Private 5G services and data centers with Schneider Electric technologies, including a prefabricated data center to integrate and test its edge offerings using EcoStruxure solutions. This is expected to be 100% operative in Schneider Electric factories during the 2nd QTR 2022.

    Schneider Electric’s prefabricated data centers help cloud and service providers scale quickly and efficiently while also meeting their sustainability goals. In addition to a 60% reduction in up time compared to traditional data centers, these prefabricated modular data centers are manufactured with sustainable construction methods and features that boost reliability, optimize operational energy savings, and leave a smaller environmental footprint.

    Want to tweet about this article? Use hashtags #construction #sustainability #infrastructure #IoT #AI #5G #cloud #edge #futureofwork

    5G Artificial Intelligence Big Data Circularity Cloud Connected Devices Constructech Construction Construction News Cybersecurity Digital Transformation Economy Edge Computing Future of Work Home Internet of Things IoT Legislation Logistics Machine Learning Manufacturing NTT Privacy Projects Robotics Schneider Electric Security Supply Chain Sustainability Technology Transportation
    Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email

    Related Posts

    What Can You Trust?

    May 7, 2025

    Build a Safer Jobsite with AI and Cameras

    May 7, 2025

    Women in Construction: PPE

    May 6, 2025

    Success Stories: Customized Sensors for Wildfire Prevention

    May 5, 2025

    The Rise of Prefab

    May 1, 2025

    Manufacturing in an Era of Digital Product Passports

    April 30, 2025
    Add A Comment

    Comments are closed.

    Get Your Copy Today
    2025 ASCE REPORT CARD FOR AMERICA’S INFRASTRUCTURE
    https://youtu.be/HyDCmQg6zPk
    ABOUT US

    Connected World works to expand quality of life and influence a sustainable future through digital transformation, innovation, and create opportunities all around.

    We’re accepting new partnerships and radio guests right now.

    Email Us: info@specialtypub.com

    4611 Hard Scrabble Road
    Suite 109-276
    Columbia, SC  29229

     

    Our Picks
    • What Can You Trust?
    • Build a Safer Jobsite with AI and Cameras
    • Women in Construction: PPE
    Specialty Publishing Media

    Questions? Please contact us at info@connectedworld.com

    Press Room

    Privacy Policy

    Media Kit – Connected World/Peggy Smedley Show

    Media Kit – Constructech

    Facebook Twitter Instagram YouTube LinkedIn
    © 2025 Connected World.

    Type above and press Enter to search. Press Esc to cancel.