The listings featured on this site are from companies from which this site receives compensation and some are co-owned by our parent company. This influence: Rank and manner in which listings are presented.
Learn more
The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

The How To Guide was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: Holiday.com, ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on The How To Guide are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

1 in 4 Industrial Operations Disrupted by Cyberattacks

1 in 4 Industrial Operations Disrupted by Cyberattacks
Author Image Husain Parvez
Husain Parvez First published on March 24, 2024 Cybersecurity Researcher

A recent study by Palo Alto Networks and ABI Research revealed that one in four industrial enterprises in the past year have had to halt their operations temporarily due to cyberattacks. The survey, which encompassed nearly 2,000 executives and practitioners across 16 countries, sheds light on the pressing challenges of operational technology (OT) security in today's increasingly digital industrial landscape.

The complexity of OT security solutions emerged as a primary concern for over 60% of those surveyed, highlighting a significant issue. The report discussed the struggles organizations face in architecting and implementing streamlined, user-friendly responses to cyber threats.

The report also revealed a concerning statistic: almost 70% of industrial organizations have fallen victim to cyberattacks within the last year, with about 26% experiencing attacks on a weekly basis or more. IT systems were identified as the main attack vector, yet 28% of the attacks were traced back to the OT environment itself, highlighting the intertwined nature of IT and OT security challenges.

Despite the alarming rate of cyber incidents, the survey indicates a strong resolve among industrial organizations to bolster their OT cybersecurity, with more than half planning to increase their cybersecurity budgets in the next two years. However, the collaboration between IT and OT teams within companies presents its own set of challenges, with only 43% of respondents describing their relationship as coordinated or constructive.

The report also noted that the advent of artificial intelligence (AI) and the integration of 5G technologies into industrial operations are viewed with a mix of optimism and concern. While these technologies promise to enhance efficiency and connectivity, they also introduce new security vulnerabilities. A significant portion of respondents, 74%, view AI-enabled attacks as a critical threat to their OT infrastructure.

In light of these challenges, Palo Alto Networks advocates for a Zero Trust approach to OT security. They also emphasized the need for solutions that not only address current threats but are also adaptable to the rapid pace of technological advancement. The survey's insights into the daily challenges faced by industrial asset owners and operators highlight the urgent need for streamlined, robust security solutions.

About the Author

  • Author Image Husain Parvez
  • Husain Parvez Cybersecurity Researcher

Husain Parvez is a Cybersecurity Researcher and News Writer at The How To Guide, focusing on VPN reviews, detailed how-to guides, and hands-on tutorials. Husain is also a part of the The How To Guide Cybersecurity News bulletin and loves covering the latest events in cyberspace and data privacy.

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

This field must contain more than 50 characters

The field content should not exceed 1000 letters

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address