PRP Newswire Digital News & Media Platform

collapse
Home / Daily News Analysis / What smart factories keep getting wrong about cybersecurity

What smart factories keep getting wrong about cybersecurity

Mar 23, 2026  Twila Rosenbaum  8 views
What smart factories keep getting wrong about cybersecurity

In the rapidly evolving landscape of smart factories, cybersecurity remains a critical concern. Troy Rydman, the Chief Security Officer at Packsize, sheds light on the prevalent vulnerabilities in these environments, ranging from the Internet of Things (IoT) to human error. He emphasizes that unmanaged devices, including sensors and robotic components, often go unpatched, making them potential entry points for cyber attackers.

One of the significant issues Rydman identifies is the tendency to overlook legacy infrastructure as organizations transition to cloud and Software as a Service (SaaS) platforms. These outdated systems can be left exposed, creating security gaps. Additionally, employees frequently represent a weak link—not due to negligence, but because human nature is susceptible to social engineering and phishing attacks. Rydman notes the ongoing struggle between maintaining production uptime and meeting security requirements, urging organizations to strike a balance by keeping stakeholders informed, investing in training, and fostering a security-aware culture.

IoT Devices: A Growing Attack Surface

Among the various components of the digital transformation stack, IoT devices are currently expanding the attack surface at the fastest rate. Threat actors are drawn to industries that prioritize usability over security, and many IoT devices are designed for productivity, often requiring direct internet access. Unfortunately, the credentialing for these devices may not align with contemporary security standards, heightening the risk of cyber incidents.

Securing IoT products has historically been a challenge, particularly for sectors like supply chain, warehousing, and manufacturing. Organizations must ensure these devices are secure while still delivering value to customers. Rydman emphasizes the responsibility of companies to implement robust security measures for every device in use and to inform customers about potential risks in their environments.

Overlooked Assets: Legacy Systems

Legacy devices, particularly those that have operated within environments for extended periods, often fall under the radar as organizations adopt newer cloud services and SaaS solutions. Rydman points out that integration with legacy systems poses a substantial challenge, especially when the original vendors no longer support them. Forgotten systems can become footholds for attackers, making it imperative for organizations to maintain and update these crucial assets.

Additionally, there are systems nested within larger systems, such as those found in robotics. Each robotic unit might consist of several smaller computer systems managing specific tasks. These individual systems are often neglected in favor of their larger counterparts, leaving them vulnerable. For instance, a robotic picking arm in a warehouse may have multiple IoT devices that go unmaintained, leading to exploitable points as attackers seek to infiltrate warehouse manufacturing systems.

The Invisible Vulnerability: Human Error

Rydman identifies the most insidious vulnerability as an uninformed workforce. Organizations often design employee processes to be user-friendly, which can inadvertently lead to security incidents. Human errors, such as falling for phishing scams or accidentally sharing sensitive information, account for a significant portion of security breaches.

These honest mistakes highlight the importance of investing in training and cultivating a security-conscious company culture. Employees must feel empowered to identify vulnerabilities and communicate improvements to the security team. Rydman stresses that creating an environment where workers understand the risks and the importance of security protocols is essential for reducing incidents.

The Risk of Unmanaged Devices

Many unmanaged devices, such as sensors and smart cameras, increase security risks because they are often considered zero-touch deployments. This mindset can lead to these devices connecting directly to the internet without adequate protection. Rydman warns that compromised IoT devices can be co-opted for malicious purposes, such as participating in denial-of-service attacks, emphasizing the need for careful scrutiny and security measures before deployment.

Balancing Uptime and Cybersecurity

Organizations face constant tension between production uptime goals and cybersecurity requirements. Workers may not fully grasp the technology risks, viewing security measures as impediments to customer service. Conversely, cybersecurity professionals may push for stringent controls that disrupt operations. Rydman advocates for open dialogue within organizations to establish a clear understanding of acceptable risk levels. Companies should consider the return on investment in security measures, ensuring they allocate resources wisely to mitigate risks effectively.

Ultimately, understanding the risk threshold and maintaining communication among stakeholders is key to navigating the complex relationship between cybersecurity and operational efficiency.


Source: Help Net Security News


Share:

Your experience on this site will be improved by allowing cookies Cookie Policy