{"id":3033,"date":"2021-10-08T19:10:37","date_gmt":"2021-10-08T19:10:37","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3033"},"modified":"2021-10-12T12:08:53","modified_gmt":"2021-10-12T12:08:53","slug":"disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/","title":{"rendered":"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit. Assets are exposed online, and along with them, all their insecurities: unpatched vulnerabilities, unsecured credentials, weak configurations, and the use of outdated industrial protocols.<\/p>\n<p>Industrial control system (ICS) vulnerability disclosures are drastically increasing as high-profile cyber-attacks on critical infrastructure and industrial enterprises have elevated ICS security to a mainstream issue, according to the third <a href=\"https:\/\/security.claroty.com\/1H-vulnerability-report-2021\" target=\"_blank\" rel=\"noopener\">Biannual ICS Risk &amp; Vulnerability Report<\/a> released by <u>Claroty<\/u>. The report shows a 41% increase in ICS vulnerabilities disclosed in the first half (1H) of 2021 compared to the previous six months, which is particularly significant given that in all of 2020 they increased by 25% from 2019 and 33% from 2018.<\/p>\n<p>The report provides a comprehensive analysis of ICS vulnerabilities publicly disclosed during 1H 2021, including those found by Claroty&#8217;s research team, Team82, and those from trusted open sources including the National Vulnerability Database (NVD), the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), CERT@VDE, MITRE, and industrial automation vendors Schneider Electric and Siemens.<\/p>\n<p>&#8220;As more enterprises are modernizing their industrial processes by connecting them to the cloud, they are also giving threat actors more ways to compromise industrial operations through ransomware and extortion attacks,&#8221; <a href=\"https:\/\/www.prnewswire.com\/news-releases\/security-researchers-reveal-staggering-magnitude-of-ics-vulnerabilities-in-2021-as-cyber-attacks-on-critical-infrastructure-increase-301357537.html\" target=\"_blank\" rel=\"noopener\">said<\/a> Amir Preminger, vice president of research at Claroty. &#8220;The recent cyber-attacks on Colonial Pipeline, JBS Foods, and the Oldmsar, Florida water treatment facility have not only shown the fragility of critical infrastructure and manufacturing environments that are exposed to the internet but have also inspired more security researchers to focus their efforts on ICS specifically.\u201d<\/p>\n<h2>Key research findings<\/h2>\n<p>It is useful to have a look at the research findings to understand the emerging threat landscape affecting ICS.<\/p>\n<p><strong>Increased vulnerabilities<\/strong><\/p>\n<p>During 1H 2021, 637 ICS vulnerabilities were published, affecting products sold by 76 vendors. That is a 41% increase from the previous semester, where 449 vulnerabilities were disclosed. 70.93% of the vulnerabilities are classified as high or critical, about on par with the 2H of 2020. 80.85% of vulnerabilities disclosed during 1H 2021 were discovered by sources external to the affected vendor, including several research organizations, such as third-party companies, independent researchers, and academics, among others.<\/p>\n<p><strong>Affected systems<\/strong><\/p>\n<p>The largest percentage of vulnerabilities disclosed during 1H 2021 affected Level 3 of the Purdue Model, Operations Management (23.55%), followed by the Level 1, Basic Control (15.23%) and Level 2, Supervisory Control (14.76%).<\/p>\n<p>Operations Management can be a critical crossover point with converged IT networks. These systems include servers and databases vital to production workflow, or systems that collect data that will be fed to business systems to facilitate decision making. These business systems are increasingly operating in the cloud. At the Basic Control level are programmable logic controllers (PLCs), remote terminal units (RTUs), and other controllers that monitor Level 0 equipment such as pumps, actuators, sensors, and more. At the Supervisory Control level are human-machine interfaces (HMIs), SCADA software, and other tools that monitor and analyze Level 1 data.<\/p>\n<p><strong>Attack vectors<\/strong><\/p>\n<p>It\u2019s critical that industries understand the attack vectors threat actors may take to compromise industrial networks. 61.38% of security vulnerabilities enable attacks from outside the IT or OT network, demonstrating the importance of securing remote connections and Internet of Things (IoT) and Industrial IoT (IIoT) devices.<\/p>\n<p>On the other hand, 31.55% of the disclosed vulnerabilities are exploitable through local attack vectors, relying on user interaction to perform actions required to exploit these vulnerabilities, such as social engineering through spam or phishing. This reinforces the need for phishing and spam prevention, as well as awareness techniques that would help stem the tide of ransomware and other potentially devastating attacks.<\/p>\n<p>What is worrying, though, is that for almost 90% of the vulnerabilities, the complexity of exploitation is considered low, meaning these vulnerabilities don\u2019t require special conditions and an attacker can expect repeatable success every time. In addition, 74% of the disclosed vulnerabilities do not require any privileges for being exploited, meaning the attacker is unauthorized and does not require any access to settings or files. Finally, 66% do not require user interaction, such as opening an email, clicking on links or attachments, or sharing sensitive personal or financial information.<\/p>\n<p><strong>Hardening of ICS<\/strong><\/p>\n<p>Updating industrial control systems or SCADA software is often challenging because of uptime and availability of operational requirements. Firmware updates are also difficult because of the complexity involved in developing and implementing updates. These cycles can take significantly longer than traditional IT patch management, often making mitigations the only remediation option open to defenders.<\/p>\n<p>As a result of this well-documented situation, ICS systems are often not hardened. Almost 26% of the 637 ICS vulnerabilities disclosed in 1H 2021 have no fix or only a partial remediation.<\/p>\n<p>The lack of remediation against known vulnerabilities impacts greatly the availability and reliability of industrial processes. Of the vulnerabilities with no, or partial, remediation, 55% could result in remote code execution, and 48% could result in denial-of-service conditions when exploited successfully. Overall, for 65% of the vulnerabilities, there\u2019s a high likelihood of a total loss of availability.<\/p>\n<h2>How to mitigate these vulnerabilities<\/h2>\n<p>Mitigations are often the only remediation option open to defenders given the software and firmware patching challenges. Claroty highlights that network segmentation and secure remote access are the top two steps and should be top considerations for defenders ahead of other options.<\/p>\n<p>OT network segmentation is an important control as air-gapped connectivity is a relic of the past and network perimeters blur with enterprises moving data, applications, infrastructure, and services to the cloud. At the same time, proper access controls and privilege management are crucial as companies manage a long-term trend toward remote work. Secure remote access solutions must not only alert on suspicious activities, but also provide the capability to investigate specific sessions, either live or on-demand, and allow administrators to respond by either disconnecting a session or taking another action to contain or remediate the damage.<\/p>\n<p>The first step to addressing these vulnerabilities is to assess your cybersecurity risk baseline. ITEGRITI offers a detailed and free Cybersecurity Risk Baseline assessment. Click <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity-risk-baseline\/\">here<\/a> to complete the self-assessment.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.<\/p>\n","protected":false},"author":10,"featured_media":3036,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021 - kw022024<\/title>\n<meta name=\"description\" content=\"Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021\" \/>\n<meta property=\"og:description\" content=\"Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-08T19:10:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-12T12:08:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Anastasios Arampatzis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TassosAramp\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Anastasios Arampatzis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\"},\"author\":{\"name\":\"Anastasios Arampatzis\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\"},\"headline\":\"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021\",\"datePublished\":\"2021-10-08T19:10:37+00:00\",\"dateModified\":\"2021-10-12T12:08:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\"},\"wordCount\":1266,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg\",\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\",\"name\":\"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021 - kw022024\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg\",\"datePublished\":\"2021-10-08T19:10:37+00:00\",\"dateModified\":\"2021-10-12T12:08:53+00:00\",\"description\":\"Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg\",\"width\":1200,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673\",\"name\":\"Anastasios Arampatzis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g\",\"caption\":\"Anastasios Arampatzis\"},\"description\":\"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.\",\"sameAs\":[\"http:\/\/www.welcometobora.com\",\"https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/\",\"https:\/\/x.com\/TassosAramp\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021 - kw022024","description":"Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/","og_locale":"en_US","og_type":"article","og_title":"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021","og_description":"Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.","og_url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2021-10-08T19:10:37+00:00","article_modified_time":"2021-10-12T12:08:53+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg","type":"image\/jpeg"}],"author":"Anastasios Arampatzis","twitter_card":"summary_large_image","twitter_creator":"@TassosAramp","twitter_site":"@itegriti","twitter_misc":{"Written by":"Anastasios Arampatzis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/"},"author":{"name":"Anastasios Arampatzis","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673"},"headline":"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021","datePublished":"2021-10-08T19:10:37+00:00","dateModified":"2021-10-12T12:08:53+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/"},"wordCount":1266,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg","articleSection":["Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/","url":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/","name":"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021 - kw022024","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg","datePublished":"2021-10-08T19:10:37+00:00","dateModified":"2021-10-12T12:08:53+00:00","description":"Connected IoT devices and converging operational technology (OT) under IT systems management are providing many benefits to industries. However, this technological momentum is being leveraged by threat actors as well, who are seeking to disrupt businesses and profit.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2021\/10\/itegriti_board_bullet_security.jpg","width":1200,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2021\/managed-services\/disclosed-ics-vulnerabilities-increased-by-41-in-the-first-half-of-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Disclosed ICS Vulnerabilities Increased by 41% in the First Half of 2021"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/6fa12fbccd5abc86c2ce14ffbb619673","name":"Anastasios Arampatzis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/adff645e812a27c2d07dd3c43fc9cd32?s=96&d=mm&r=g","caption":"Anastasios Arampatzis"},"description":"Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years\u2019 worth of experience in managing IT projects and evaluating cybersecurity. During his service in the Armed Forces, he was assigned to various key positions in national, NATO and EU headquarters and has been honoured by numerous high-ranking officers for his expertise and professionalism. He was nominated as a certified NATO evaluator for information security. Anastasios\u2019 interests include among others cybersecurity policy and governance, ICS and IoT security, encryption, and certificates management. He is also exploring the human side of cybersecurity - the psychology of security, public education, organizational training programs, and the effect of biases (cultural, heuristic and cognitive) in applying cybersecurity policies and integrating technology into learning. He is intrigued by new challenges, open-minded and flexible. Currently, he works as a cybersecurity content writer for Bora - IT Security Marketing. Tassos is a member of the non-profit organization Homo Digitalis.","sameAs":["http:\/\/www.welcometobora.com","https:\/\/www.linkedin.com\/in\/anastasiosarampatzis\/","https:\/\/x.com\/TassosAramp"],"url":"https:\/\/itegriti.com\/kw022024\/author\/anastasios-arampatiz\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3033"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3033"}],"version-history":[{"count":2,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3033\/revisions"}],"predecessor-version":[{"id":3035,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3033\/revisions\/3035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3036"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}