{"id":31223,"date":"2024-06-17T11:42:00","date_gmt":"2024-06-17T09:42:00","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/"},"modified":"2024-12-04T13:47:32","modified_gmt":"2024-12-04T12:47:32","slug":"cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/","title":{"rendered":"Cyber attacks on industrial automation: Five strategies to protect your production"},"content":{"rendered":"<header id=\"header\" class=\"header header--low header--branch\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tCyber attacks on industrial automation: Five strategies to protect your production\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-automatisering.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-automatisering\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial automation\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t<p><strong>With increasing reports of cyberattacks targeting the industrial sector, Thomas Vasen, Business Development Manager Network Security at HMS Networks, outlines five strategies companies can implement to strengthen their defences and avoid becoming the next victim.<\/strong><\/p>\r\n<p>\u00a0<\/p>\r\n<h3>Growth of cyber attacks<\/h3>\r\n<p>Cybersecurity is quickly becoming a major focus in industrial automation. The World Economic Forum highlighted in 2023 that manufacturing is the sector most affected by cyberattacks. Furthermore, <a href=\"https:\/\/www.orangecyberdefense.com\/nl\/security-navigator-2023\">Orange Cyberdefense<\/a> that the manufacturing sector has Common Vulnerability Scoring System (CVSS) scores that are 33% higher than the global average. The increasing number of attacks on Industrial Control Systems (ICS) is of particular concern. Gartner predicts a bleak future: by 2025, cyberattacks are expected to injure or endanger people.<\/p>\r\n<p>The time to take action is now. Here are five strategies that businesses can implement to effectively reduce the risk of cyberattacks.<\/p>\r\n<p>\u00a0<\/p>\r\n\r\n<li>\r\n<h3>\u00a0 OT is not just another version of IT<\/h3>\r\n<\/li>\r\n\r\n<p>The first step is to adopt the right mindset. In the 1990s <a href=\"https:\/\/www.wired.com\/1996\/10\/atm-3\/\">Netheads and Bellheads discussed<\/a> about the future of telecommunications. While Bellheads advocated for traditional methods, Netheads argued that voice should be treated like any other data and sent over IP. Three decades later, Netheads\u2019 vision has prevailed, with voice being sent over the Internet like any other type of data. Users even accepted a degradation in call quality due to increased latency and choppy calls. Fortunately, not every phone call feels like an intercontinental call anymore.<\/p>\r\n<p>However, the situation with Operational Technology (OT) is fundamentally different. Unlike Information Technology (IT), OT cannot compromise on quality and increased latency, as even minor disruptions can have catastrophic consequences. Treating OT as just another version of IT is a serious mistake, as OT operates according to different principles and requirements. While IT prioritizes data integrity and confidentiality, OT requires deterministic data and uptime assurance. This distinction is especially crucial in industries such as manufacturing, where even minor disruptions can lead to significant financial losses, material waste, and operational downtime. In IT, occasional network outages or data loss may be manageable inconveniences. In OT, however, a similar disruption can have much more serious consequences. Imagine an ice cream machine breaking down due to a network outage or data inconsistency. Not only would the production process come to a halt, but the perishable ingredients would also spoil, resulting in financial losses and wasted ice cream. And nobody wants that.<\/p>\r\n<p>So while it makes sense for OT to adopt IT technologies (there are many advantages to using Industrial Ethernet over traditional fieldbus networks), it must be recognised that standard IT does not meet the requirements of OT. Hence the rise of industrial communication protocols and therefore the need for specialist OT security products and solutions.<\/p>\r\n<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/filemanager\/1476\/1718617520_figure 1.jpg\" alt=\"Figuur 1: In OT zou uitval van het netwerk ertoe leiden dat productieprocessen tot stilstand komen, met financi\u00eble verliezen en verspilling van ingredi\u00ebnten of materialen tot gevolg.\" width=\"899\" height=\"899\" \/>\r\nFigure 1: In OT, network failure would cause production processes to grind to a halt, resulting in financial losses and waste of ingredients or materials.\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<li>\r\n<h3>\u00a0 IT and OT must work together<\/h3>\r\n<\/li>\r\n\r\n<p>While the Chief Information Security Officer (CISO) is under pressure and controls the security budget, often including that of OT, it is the operations manager who is responsible for uninterrupted production in the factory. This situation creates inherent conflicts due to differing priorities. IT professionals adhere to the<strong> CIA framework<\/strong>, where Confidentiality is the top priority, followed by Integrity and Availability. In contrast, operational personnel value Safety, followed by Availability, Integrity and finally Confidentiality \u2013 resulting in the<strong> (S)AIC order.<\/strong><\/p>\r\n<p>\u00a0<\/p>\r\n<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/filemanager\/1476\/1718617891_figure 2.jpg\" alt=\"\" width=\"1047\" height=\"589\" \/>\r\nImage HMS Networks\r\n\r\n<p>This contradiction creates conflict and tension, but the underlying common goal remains clear: ensuring business continuity. In recognition of this shared goal, the CISO (IT) and the operations manager (OT) must work together to address these challenges and align their approaches to ensure business continuity.<\/p>\r\n<p>\u00a0<\/p>\r\n\r\n<li>\r\n<h3>\u00a0 Develop a comprehensive OT security plan<\/h3>\r\n<\/li>\r\n\r\n<p>Securing OT environments requires a proactive and tailored approach to the unique challenges of industrial processes. Companies must thoroughly identify and assess their assets, mapping the risks associated with each machine. Rapid detection of anomalies is important, but even more crucial is implementing robust security measures to protect these assets. Having a comprehensive recovery plan and implementing measures to minimize impact is also important and is often recommended by experts such as those at ISA\/IEC 62334.<\/p>\r\n<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/filemanager\/1476\/1718617930_figure 3.jpg\" alt=\"\" width=\"648\" height=\"542\" \/>\r\nImage HMS Networks\r\n\r\n<p>\u00a0<\/p>\r\n<p>Currently, many companies are focusing on asset inventory and threat detection. While this is important, it is not enough to protect OT environments. Companies must also take measures to secure their assets.<\/p>\r\n<p>\u00a0<\/p>\r\n\r\n<li>\r\n<h3>\u00a0 Protect yourself with network segmentation<\/h3>\r\n<\/li>\r\n\r\n<p>Network segmentation is an excellent way to secure OT environments. By dividing networks into zones and separating them with security access control, companies can increase security and prevent unauthorized access. The benefits of network segmentation include:<\/p>\r\n<ul>\r\n<li><strong>Protection against external traffic:<\/strong> Separation of IT networks!<\/li>\r\n<li><strong>Inspection of internal traffic:<\/strong> Downtime is often caused by internal threats, whether intentional or unintentional.<\/li>\r\n<li><strong>Securing remote maintenance from outside:<\/strong> Allowing remote maintenance can be crucial for uptime, but it can also be a backdoor for threats to enter your network. Take granular control over traffic flow.<\/li>\r\n<li><strong>Isolation of visiting employees:<\/strong> Know what is connected to the network and control what they have access to.<\/li>\r\n<li><strong>Secure and uninterrupted industrial communication between machines:<\/strong> Implement secure and fast paths for machine-to-machine communication.<\/li>\r\n<li><strong>Continuous data extraction for analysis:<\/strong> Monitor both the security and efficiency of your processes in real time.<\/li>\r\n<li><strong>Early warning of deviations and abnormal behavior:<\/strong> Stay ahead of issues that can cause downtime, both from outages and cyber threats.<\/li>\r\n<\/ul>\r\n<p>Segmentation is fundamentally different from IT network perimeter security. IT network security involves taking measures to prevent external threats from entering the network <strong>infiltrate<\/strong>, while at the same time users can freely browse the Internet and use a wide range of cloud services. However, OT segmentation focuses on <strong>control in both directions<\/strong> to compensate for the lack of access control in OT that exists in IT. OT segmentation uses a deny-by-default approach where every data flow is checked in both directions, since threats can come from multiple directions.<\/p>\r\n<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/filemanager\/1476\/1718618066_figure 4.jpg\" alt=\"\" width=\"990\" height=\"557\" \/>\r\nImage HMS Networks\r\n\r\n<p>\u00a0<\/p>\r\n\r\n<li>\r\n<h3>\u00a0 Work with an OT Expert<\/h3>\r\n<\/li>\r\n\r\n<p>No, OT is not just another form of IT. Implementing cybersecurity measures in industrial automation is undeniably complex and demanding work. It requires meticulous attention to detail and a deep understanding of the unique challenges that OT environments present. Partnering with an OT expert like HMS Networks is not just a good idea, it\u2019s a smart investment. By tapping into their extensive experience and specialized knowledge, companies can save time and, more importantly, ensure that their cybersecurity strategy is effective. With HMS Networks\u2019 products and support, companies can navigate the complexities of OT cybersecurity with confidence and peace of mind.<\/p>\r\n<p>\u00a0<\/p>\r\n<h4>Thomas Vasen<\/h4>\r\n<p><img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/filemanager\/1476\/1718618650_thomas_vasen.png\" alt=\"\" width=\"255\" height=\"255\" \/><\/p>\r\n<p>Thomas Vasen is Business Development Manager Network Security at Anybus, a division of HMS Networks. With over 25 years of experience in operations and security within telecom, military and critical infrastructure, Thomas now focuses specifically on helping companies manage risk and secure uptime in their operational technology (OT) environments.<\/p>\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/hms-networks\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/nieuwe-generatie-pdus-van-schleifenbauer-de-pdu-5-0-met-enertree-dcem-software\/\" data-id=\"72282\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>New generation of PDUs from Schleifenbauer: the PDU 5.0 with EnerTree DCEM Software<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">IT Infrastructure<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial Electronics<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Communication technology<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Data center\/computer rooms<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tSchleifenbauer Products BV\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tAugust 28, 2025\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/drukbezochte-eerste-editie-van-industrial-cyber-security-event-2019\/\" data-id=\"43246\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Well-attended first edition of Industrial Cyber Security event 2019<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tFHI, Federation of Technology Industries\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tOctober 15, 2019\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With increasing reports of cyberattacks targeting the industrial sector, Thomas Vasen, Business Development Manager Network Security at HMS Networks, outlines five strategies companies can implement to strengthen their defences and avoid becoming the next victim.<\/p>","protected":false},"featured_media":31224,"template":"","branches":[12],"events":[361,9,372,354,377,8],"secretariat":[],"categories":[],"themes_tax":[515],"content_types":[514],"class_list":["post-31223","news","type-news","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyberaanvallen op industri\u00eble automatisering: Vijf strategie\u00ebn om jouw productie te beschermen<\/title>\n<meta name=\"description\" content=\"Vijf strategie\u00ebn die bedrijven kunnen toepassen om hun verdediging te versterken en te voorkomen dat ze het volgende slachtoffer worden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyberaanvallen op industri\u00eble automatisering: Vijf strategie\u00ebn om jouw productie te beschermen\" \/>\n<meta property=\"og:description\" content=\"Vijf strategie\u00ebn die bedrijven kunnen toepassen om hun verdediging te versterken en te voorkomen dat ze het volgende slachtoffer worden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-04T12:47:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/\",\"url\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/\",\"name\":\"Cyberaanvallen op industri\u00eble automatisering: Vijf strategie\u00ebn om jouw productie te beschermen\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png\",\"datePublished\":\"2024-06-17T09:42:00+00:00\",\"dateModified\":\"2024-12-04T12:47:32+00:00\",\"description\":\"Vijf strategie\u00ebn die bedrijven kunnen toepassen om hun verdediging te versterken en te voorkomen dat ze het volgende slachtoffer worden.\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#primaryimage\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png\",\"width\":800,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyberaanvallen op industri\u00eble automatisering: Vijf strategie\u00ebn om jouw productie te beschermen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber attacks on industrial automation: Five strategies to protect your production","description":"Five strategies companies can implement to strengthen their defenses and avoid becoming the next victim.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/","og_locale":"en_GB","og_type":"article","og_title":"Cyberaanvallen op industri\u00eble automatisering: Vijf strategie\u00ebn om jouw productie te beschermen","og_description":"Vijf strategie\u00ebn die bedrijven kunnen toepassen om hun verdediging te versterken en te voorkomen dat ze het volgende slachtoffer worden.","og_url":"https:\/\/fhi.nl\/en\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2024-12-04T12:47:32+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/","url":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/","name":"Cyber attacks on industrial automation: Five strategies to protect your production","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#primaryimage"},"image":{"@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#primaryimage"},"thumbnailUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png","datePublished":"2024-06-17T09:42:00+00:00","dateModified":"2024-12-04T12:47:32+00:00","description":"Five strategies companies can implement to strengthen their defenses and avoid becoming the next victim.","breadcrumb":{"@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#primaryimage","url":"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/news\/9e6b52b009dc4975564aaa39dc91aa8f-hms-cybersecurity.png","width":800,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/machinebouwevent\/nieuws\/cyberaanvallen-op-industriele-automatisering-vijf-strategieen-om-jouw-productie-te-beschermen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"Cyberaanvallen op industri\u00eble automatisering: Vijf strategie\u00ebn om jouw productie te beschermen"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/31223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":1,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/31223\/revisions"}],"predecessor-version":[{"id":60374,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/31223\/revisions\/60374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media\/31224"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=31223"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=31223"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=31223"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=31223"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=31223"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=31223"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=31223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}