Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      AI and the future of ICT distribution

      16 June 2025

      Beijing’s chip champions blacklisted by Taiwan

      16 June 2025

      The little-known company disrupting Eskom’s monopoly

      16 June 2025

      Chief sub-editor wanted – help shape South African tech media

      16 June 2025

      Public money, private plans: MPs demand Post Office transparency

      13 June 2025
    • World

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025

      Trump tariffs to dim 2025 smartphone shipments

      4 June 2025

      Shrimp Jesus and the AI ad invasion

      4 June 2025

      Apple slams EU rules as ‘flawed and costly’ in major legal pushback

      2 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » Information security » Don’t let cyber threats crash your OT/IT party

    Don’t let cyber threats crash your OT/IT party

    Promoted | OT/IT convergence is a challenge for local organisations, which need a comprehensive approach to ensure their networks are secure and resilient.
    By Maxtec18 May 2023
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    Over the past few years, organisations have been combining their operational technology (OT) and IT networks, mainly due to the widespread use of Industry 4.0 and the industrial internet of things (IIoT).

    However, this convergence has led to significant difficulties such as open access, lateral movement, friction between OT and IT teams, poor visibility and management, and alert fatigue.

    To overcome these challenges, organisations need to implement key solutions.

    First, they should identify their assets, classify them and prioritise their value. This involves creating a comprehensive inventory of all network assets, categorising them based on importance to the organisation. By doing so, organisations can focus their security efforts on their most critical assets, ensuring that they receive the appropriate level of protection.

    Analysing traffic and scanning environments for threats and vulnerabilities is essential

    Another critical solution is to segment the network dynamically. This involves dividing the network into smaller, isolated segments that restrict lateral movement and limit the spread of cyberattacks. By creating even smaller segments that restrict communication between devices only to what is required for their intended function, organisations can prevent attackers from moving laterally across the network.

    Analysing traffic and scanning environments for threats and vulnerabilities is essential.

    By monitoring network traffic for suspicious activity such as malware infections, data exfiltration and unauthorised access, organisations can identify vulnerabilities in their network and take steps to address them before they can be exploited by attackers.

    By conducting regular vulnerability scans, organisations can identify potential weaknesses and gaps in their OT and IT systems, including outdated or legacy OT systems.

    Controlling identity and access management is crucial to secure converged networks.

    Robust control

    By implementing a robust access control mechanism that restricts access to sensitive systems and data to authorised personnel only, with a strong authentication and authorisation system that ensures users are who they claim to be, organisations can prevent unauthorised access.

    Furthermore, specialist OT network access control solutions are essential to address the unique security challenges of OT/IT convergence. Traditional NAC solutions primarily designed for IT networks may not adequately cater to the specific requirements and complexities of OT environments.

    Securing wired and wireless access is essential and involves implementing strong encryption and authentication mechanisms for both wired and wireless access points. Network traffic must be monitored to identify any suspicious activity or unauthorised access attempts.

    Endpoint detection and response (EDR) solutions are an integral part of securing converged OT/IT networks. By continuously monitoring endpoints for suspicious activities and behaviours, EDR solutions enable real-time threat detection, incident response and forensics.

    They provide detailed visibility into endpoint activities, allowing for rapid identification and mitigation of advanced threats, thereby bolstering the overall security posture and resilience of OT/IT networks.

    The CISO/CIO plays a crucial role in managing the convergence of OT/IT networks. They are responsible for implementing effective security measures, ensuring compliance with regulations, identifying and mitigating risks and promoting collaboration between IT and OT teams.

    “As more companies work towards IT/OT alignment, the CIO and the IT organisation will be at the forefront of fostering relationships and changing the culture of the organisation,” said Kristian Steenstrup, distinguished analyst and Gartner fellow. “This will require a hybrid of traditional IT and OT skills and development of new intellectual property, while experience external to the company will be tapped into to assist with cross-topic education.”

    OT/IT convergence is a huge risk in South Africa, where organisations are often targeted by cybercriminals due to the perceived weakness of their security systems. This is because many companies in South Africa may not have invested sufficiently in their cybersecurity systems and infrastructure.

    Secondly, the country has a lack of skilled professionals with expertise in both OT and IT systems, which makes it challenging for companies to manage the convergence effectively. Many South African companies may also have outdated or legacy OT systems, which are more vulnerable to cyberattacks.

    Finally, South Africa has a unique regulatory environment, and there may be compliance issues that companies must consider when implementing cybersecurity solutions for OT/IT convergence. All of these factors make OT/IT convergence a challenge for local organisations, which need a comprehensive approach to address these issues and ensure their networks are secure and resilient.

    Speak to Maxtec to see how you or your clients can safeguard critical OT infrastructure from cyber threats. Contact us for a free assessment or a demo and see how you can become a converged OT/IT security leader. Alternatively, visit www.maxtec.co.za or call 011 803 6635.

    • This promoted content was paid for by the party concerned


    Kristian Steenstrup Maxtec
    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous ArticleEskom warns of stage-8 load shedding this winter
    Next Article Montana to become first US state to ban TikTok

    Related Posts

    Enhanced cybersecurity for South African businesses: the promise of SASE

    12 August 2024

    QBS Technology makes Africa debut: Maxtec acquisition sparks excitement

    25 April 2024

    Empowering Africa with Qualys, brought to you by Maxtec

    6 November 2023
    Add A Comment

    Comments are closed.

    Company News

    Huawei Watch Fit 4 Series: smarter sensors, sharper design, stronger performance

    13 June 2025

    Change Logic and BankservAfrica set new benchmark with PayShap roll-out

    13 June 2025

    SAPHILA 2025 – transcending with purpose, connection and AI-powered vision

    13 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.