For CISOs tasked with safeguarding industrial networks, understanding IT security professionals' attitudes, perceptions, and concerns regarding operational technology (OT) is crucial to forging an effective path forward. Our latest research report offers a global perspective on the state of industrial cybersecurity based on an independent survey of 1,000 full-time IT security professionals across the United States, United Kingdom, Germany, France, and Australia.
Our research gleaned insight into the following areas, which are broken down in-depth in our Global State of Industrial Cybersecurity report:
The survey illuminated a notable lack of confidence in the status quo of OT safeguards among IT security professionals in the U.S. relative to other countries. For instance, 51% of industry practitioners in the U.S. believe today's industrial networks are not properly safeguarded, compared to just 4% of their German counterparts.
Worldwide, a clear majority (74%) of respondents in all regions characterized cyberattacks on critical infrastructure as having greater potential to inflict damage than an enterprise data breach.
Respondents identified hacking (43%), ransomware (33%), and sabotage (9%) as the most prevalent attacks against industrial networks. The survey also indicated consensus characterizing electric power (45%) as the sector most vulnerable to cyber attacks on critical infrastructure, followed by the oil and gas (22%), chemical (12%), and transportation (12%) sectors.
Despite a clear consensus (80%) that IT security teams are responsible for protecting an organization's industrial networks, a significant portion of respondents (25% globally, 34% in the U.S.) had not been trained on the differences between IT and OT networks. 93% of respondents said OT-focused cybersecurity should be incorporated into the education and training of IT security professionals.
In addition to identifying key areas for CISOs to focus their efforts, our Global State of Industrial Cybersecurity report offers an actionable roadmap for closing the decades-old cybersecurity gap between IT and OT through increased awareness and education, reduced complexity, simplified governance, and IT–OT alignment.
To learn more, download the report.
Hardcoded credentials in the Frick Controls Quantum HD create a vulnerability that leads to unauthorized access, exposure of sensitive information, and potential misuse or system compromise.
The Frick Controls Quantum HD, versions 10.22 through 11, are legacy platforms that have reached end of support. Johnson Controls, Inc. recommends upgrading to the latest platform, Quantum HD Unity, version 12 or higher. After completing the upgrade to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.
CVSS v3: 6.2
The Frick Controls Quantum HD contains a vulnerability that allows an unauthenticated attacker to execute arbitrary code on the affected device, leading to full system compromise.
The Frick Controls Quantum HD, versions 10.22 through 11, are legacy platforms that have reached end of support. Johnson Controls, Inc. recommends upgrading to the latest platform, Quantum HD Unity, version 12 or higher. After completing the upgrade to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.
CVSS v3: 7.5
The Frick Controls Quantum HD is vulnerable due to insufficient validation of input in certain parameters that may permit unexpected actions, which could impact the security of the device before authentication occurs.
The Frick Controls Quantum HD, versions 10.22 through 11, are legacy platforms that have reached end of support. Johnson Controls, Inc. recommends upgrading to the latest platform, Quantum HD Unity, version 12 or higher. After completing the upgrade to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.
CVSS v3: 9.1
The Frick Controls Quantum HD is vulnerable due to insufficient validation of input in certain parameters that may permit unexpected actions, which could impact the security of the device before authentication occurs.
The Frick Controls Quantum HD, versions 10.22 through 11, are legacy platforms that have reached end of support. Johnson Controls, Inc. recommends upgrading to the latest platform, Quantum HD Unity, version 12 or higher. After completing the upgrade to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.
CVSS v3: 9.1
The Frick Controls Quantum HD is vulnerable due to insufficient validation of input in certain parameters that may permit unexpected actions, which could impact the security of the device before authentication occurs.
The Frick Controls Quantum HD, versions 10.22 through 11, are legacy platforms that have reached end of support. Johnson Controls, Inc. recommends upgrading to the latest platform, Quantum HD Unity, version 12 or higher. After completing the upgrade to version 12, verify full compliance with the hardening guide and apply all recommended security configurations.
CVSS v3: 9.1