domingo, 5 febrero 2023
Visitas totales a la web: 88320678

El portal de los profesionales de seguridad y emergencias

Nº 1 del mundo en español en seguridad global

Soluciones de seguridad global

Changing Requirements and Security Concerns During COVID-19

Peter Fretty

Successfully pivoting and working remote means understanding and addressing qualifications and security concerns

Operating within this temporary new norm isn’t easy for anyone. And, numerous considerations exist for manufacturers keeping the lights on during today’s new norm. This is true whether the business is pivoting to help address urgent needs resulting from the ongoing pandemic or actively leveraging a mix of on-premise and remote technologies to effectively operate.

While digital technology has proven empowering as increasingly more manufacturers leverage remote technology, navigating the new broader threat landscape is rightfully a viable concern. And, as a result, manufacturers need to plan and properly secure devices that are fast becoming more complex machines with complex functions, explains Ellen Boehm, senior director of IoT product management at Keyfactor.

“Any new connected device expands IoT attack vectors; cyber-attackers are exploiting the global crisis, and hardening device security is critical. In the case of connected medical devices, security risks can be life impacting,” says Boehm. “The pandemic is changing the way we work today, but it will also shift the industry moving forward. Manufacturers must pivot their capabilities and the way they design, develop and test remotely; these new processes may mean more automation on factory floors and the introduction of smart control systems that reduce human interaction. This is the reality today, and companies will have to accept it as a long-term scenario.»

Andy Riley, executive director at Nuspire tells IndustryWeek, the move to broader mobile device and remote access usage during this pandemic will highlight the continued erosion of the network perimeter and focus attention on endpoint security. “Companies are sure to find gaps in their remote access and mobile device strategies through this increased attention resulting in improved configuration standards that will provide benefits well after the emergent operations period is over,” he says.

Unfortunately, unsavory characters recognize the opportunity to exploit the current environment. And, as such, COVID-19 phishing emails are everywhere. According to the latest Bitdefender research, the curve of coronavirus-themed cyber threats has not flattened, and the manufacturing vertical is one of the hardest hit.

“The global daily evolution of COVID-themed threats shows consistent effort from cybercriminals and a continued interest in exploiting fear and misinformation about the global pandemic to get victims to click on malicious links, open malicious attachments, or even download and install malware,” report authors write. “Coronavirus-themed threats will likely continue under the form of spear phishing emails, fraudulent URLs and event malicious applications, all exploiting fear and misinformation in order to trick victims into unwillingly giving away personal, sensitive or financial information.”

Pivoting to medical?

Other considerations exist for those manufacturers now entrenched in creating medical grade devices or personal protection equipment. After all, equipping a non-medical factory to manufacture medical devices is a serious undertaking, according to Deborah Jennings-Conner, Director of Global Life & Health Sciences, Regulatory & Testing Assurance at UL. 

“The FDA governs this through the Quality System Regulation QSR CFR 21 part 820 which is a framework of basic requirements for manufacturers to follow.  Having a sound quality management system (QMS) is key to ensure that the products produced which enter the US market are safe and effective medical devices as cleared by the FDA,” says Jennings-Conner.  “Personnel should be adequately trained on device defects that could occur from improper job performance. Design controls are one of the major causes of device recalls and the manufacturer must ensure the device design is correctly translated into production specifications and produced according to plan.  Design changes pertaining to the product, components, packaging, labeling, or similar, cannot arbitrarily be changed mid-production.  Procedures covering processes from purchasing to production, to dealing with non-conforming products from the production line are a few examples of areas must be documented and maintained.  Under the Emergency Use Authorizations (EUAs) during the COVID-19 public health emergency, the FDA may issue guidance allowing flexibility in demonstrating full QMS compliance in order to help expand the availability of critical medical equipment and their accessories during this pandemic.”

According to Conner-Jennings, production and process controls are key areas a manufacturer must not take lightly. “Establish procedures and implement processes to ensure the product produced meets the design specifications. Substitution of components not approved by the design, making software changes that have not been validated, and allowing non-conforming finished products to be shipped, are examples of a manufacturer’s inability to produce a product that meets its predetermined design specifications and which may not be safe and effective in the field,” she says. “These critical non-conformances should not occur within a well-designed medical device manufacturing process and could lead to adverse events that are required to be reported to the FDA.”

Security Best Practices During the New Norm

  • Focus on Phishing. User awareness training on phishing is crucial, explains Riley. “Organizations will be working with new suppliers, which opens the door to additional phishing opportunities,” he says. “Employees will be receiving emails and communication from unfamiliar sources making them more susceptible to interacting with malicious links, documents, or passing along sensitive information.”
  • Reinforce protocols. Remember working remotely is new for many team members, and in many instances, it means incorporating new devices into the daily realm. Protecting the business starts with updating, patching and ensuring the use of strong (not default) passwords. “New machines may be brought in that IT staff is unfamiliar with. IT staff will need to research these devices to fully understand what they are vulnerable to and what exactly they are introducing to their networks,” says Riley.  
  • Vulnerability scanning: Vulnerability scanning is crucial whenever introducing new devices to the network – whether its IT or OT. It is possible that there are no vendor patches available to fix issues and security personnel must understand the risk associated with any device, explains Riley. “Security teams can consider DMZing any equipment that are a higher risk to minimize the ability for attackers to laterally move throughout the network or to spread malware,” he says. 
  • Tighten settings. Whether remote operation requires new equipment or reimagining the use of existing equipment, remote operation often requires external facing settings. However, Riley recommends that security teams speak with product vendors to receive trusted IP address ranges and secure devices to only allow external communication from those devices.
Fecha de publicaciónmayo 01, 2020

BELT.ES no se hace responsable de las opiniones de los artículos reproducidos en nuestra Revista de Prensa, ni hace necesariamente suyas las opiniones y criterios expresados. La difusión de la información reproducida se realiza sin fines comerciales. 

Listado de Expertos


Profesión militar: Obediencia debida frente a la obligación de disentir

Con ocasión de la realización de estudios en el Instituto Universitario Gutiérrez Mellado tuve la ocasión de leer y analizar una serie de documentos de opinión que trataban en profundidad las diferentes facetas presentes en el campo de las relaciones cívico-militares; temas que , habitualmente, no han estado presentes en los diferentes cursos y actividades formativas en la enseñanza militar, ni, por supuesto, en la civil.

El amor de Macarena Olona por la Guardia Civil empieza por su pareja, un joven oficial condecorado

El padre de su hijo llegó a la Benemérita como militar de carrera y, los que le...

La artillería ‘made in USA’ comprada por Marruecos que deja fuera de juego a España

El país magrebí sigue reforzando sus fuerzas armadas a golpe de talonario, y no lo hace de...

Últimas noticias

El Plan de seguridad. (El Esperado modelo estatal para eventos)

La seguridad de un evento deportivo o recreativo requiere objetivos, planificación, dotación, implantación y evaluación de resultados.

Sistemas de Extinción por Gas: Manual Práctico para el Diseño, Instalación y Mantenimiento

Este Documento Técnico tiene como objetivo dar a conocer las peculiaridades de los Sistemas de Extinción por Gas, sus puntos fuertes y...

A CSO’s challenge for building a global risk strategy

Without a strategy, security plans are almost impossible to implement, and C-suite engagement can be jeopardized Global security risks...

Este timbre para bicicletas es el lugar perfecto para esconder un AirTag sin que los ladrones lo sepan

Los AirTags de Apple desbancaron con su nacimiento al resto de opciones del mercado entre los usuarios de Apple. Esta solución de rastreo se...

Este timbre para bicicleta es el lugar perfecto para esconder un AirTag sin que los ladrones lo sepan

Bajo un timbre o un portabotellas, esta compañía ha ideado unos escondites para colocar los rastreadores a prueba de robos y pérdidas.