{"id":14694,"date":"2026-05-12T08:56:56","date_gmt":"2026-05-12T08:56:56","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=14694"},"modified":"2026-05-12T08:56:56","modified_gmt":"2026-05-12T08:56:56","slug":"cyber-blind-spots-the-hidden-know-how-that-poses-the-best-safety-threat","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=14694","title":{"rendered":"Cyber Blind Spots: The hidden know-how that poses the best safety threat"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p>By Peter Villiers, Director of Cyber Threat at <a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/www.barriernetworks.com\">Barrier Networks<\/a><\/p>\n<div class=\"jeg_ad jeg_ad_article jnews_content_inline_ads  \">\n<div class=\"ads-wrapper align-right \"><a rel=\"nofollow\" target=\"_blank\" href=\"http:\/\/bit.ly\/jnewsio\" aria-label=\"Visit advertisement link\" target=\"_blank\" rel=\"nofollow noopener\" class=\"adlink ads_image align-right\"><br \/>\n                                    <img decoding=\"async\" class=\"lazyload\" src=\"https:\/\/itsecguru.dessol.com\/wp-content\/uploads\/2018\/08\/ad_300x250.jpg\" alt=\"\" data-pin-no-hover=\"true\"\/><br \/>\n                                <\/a><\/div>\n<\/div>\n<p>There\u2019s a rising threat throughout the UK\u2019s Crucial Nationwide Infrastructure (CNI) that&#8217;s inserting the nation at severe threat of disruption. It isn\u2019t ransomware or a headline-grabbing knowledge breach. It sits inside the techniques that hold the nation working. The chance is rising over time, as a result of when these techniques have been first launched, the chance didn\u2019t exist. But in the present day, due to advances in know-how and connectivity, it&#8217;s extra important than ever earlier than.<\/p>\n<p>The chance sits within the background of the techniques that hold important providers working. Energy, water, transport, electrical energy. The issues individuals depend on with out eager about them. The issues the nation may by no means survive with out. The chance known as Operational Know-how (OT), the techniques that management the bodily processes inside CNI.<\/p>\n<p>OT is made up of the machines that hold utilities flowing throughout the nation. The machines that management the extent of chlorine that goes into our faucet water, the reactors that tightly monitor nuclear crops, the sensors that handle electrical energy provide into individuals\u2019s properties. But one of many greatest issues with these techniques in the present day, is that they have been constructed for stability, not safety.<\/p>\n<p>When these techniques have been first launched into CNI crops, safety was bodily with the goal of conserving intruders out. At the moment the introduction of connectivity and automation has modified the enjoying discipline, opening these vital environments as much as anybody on the web, whereas leaving the UK worryingly uncovered.<\/p>\n<p>As IT and OT have grow to be extra related, these techniques have been uncovered to dangers they weren\u2019t constructed to deal with. Many at the moment are networked, remotely accessed, and tied into wider enterprise techniques. That is the place the issue begins. You\u2019ve acquired infrastructure constructed for isolation now working in extremely related environments, and the hole between these two realities is the place threat builds.<strong>\u00a0<\/strong><\/p>\n<p><strong>The visibility subject<\/strong><\/p>\n<p>Should you ask most organisations for a transparent, up-to-date view of their OT surroundings, many will battle to provide one. Asset inventories are sometimes incomplete. Community diagrams don\u2019t mirror what\u2019s truly there. In some instances, documentation is both outdated or by no means existed in any respect.<\/p>\n<p>As a substitute, information tends to sit down with people, engineers who\u2019ve labored on these techniques for years and perceive how issues match collectively as a result of they\u2019ve seen it evolve.<\/p>\n<p>However this creates an issue. Should you don\u2019t totally perceive what\u2019s in your surroundings, you possibly can\u2019t correctly safe it. You may\u2019t patch what you don\u2019t know exists, and you may\u2019t monitor or phase networks you haven\u2019t mapped.<\/p>\n<p>In OT, the largest dangers are sometimes those nobody realises are there. Automation and connectivity have usually been added with out the information of IT and safety groups, leaving blind spots which attackers can exploit.<strong>\u00a0<\/strong><\/p>\n<p><strong>A special sort of risk<\/strong><\/p>\n<p>Most cyber assaults in IT are pushed by cash, however in OT, attacker motivations will be considerably totally different.<\/p>\n<p>Attackers perceive that by concentrating on a rustic\u2019s CNI, they will inflict severe societal injury. This implies it\u2019s usually geopolitically-motivated risk actors that focus on OT. They will both be motivated to trigger a rustic injury, or to conduct surveillance to assemble intelligence on a rustic, usually then placing at a later date.<\/p>\n<p>We\u2019ve already seen warnings from UK and worldwide businesses about attackers having access to vital infrastructure and staying there, generally for lengthy durations of time.<strong>\u00a0<\/strong><\/p>\n<p><strong>The place resilience falls quick<\/strong><\/p>\n<p>Loads of CNI organisations have invested in prevention, however fewer have correctly thought by means of restoration. In IT, resilience is comparatively nicely established. Backups, catastrophe restoration, enterprise continuity, these are customary. In OT, it\u2019s extra uneven.<\/p>\n<p>Some techniques aren\u2019t backed up in a significant method. Configurations and dependencies aren\u2019t at all times documented clearly. Rebuilding after a severe incident can take far longer than most organisations count on.<\/p>\n<p>Identification is one other stress level. As environments grow to be extra built-in, shared identification techniques are extra frequent. It simplifies entry, but it surely additionally will increase threat. If privileged credentials are compromised, the influence can prolong throughout each IT and OT.<\/p>\n<p>Segmentation is analogous. On paper, environments are separated. In observe, legacy infrastructure and fast fixes usually imply these boundaries aren\u2019t as robust as supposed.<strong>\u00a0<\/strong><\/p>\n<p><strong>So the place do you begin?<\/strong><\/p>\n<p>Step one is getting a correct deal with on what\u2019s truly there. Which means constructing a transparent, present view of OT property and the way they join. Not a one-off train, however one thing that\u2019s maintained over time. From there, it\u2019s about understanding publicity. The place are the hyperlinks between OT, IT, and exterior techniques? The place may somebody transfer in the event that they acquired in?<\/p>\n<p>Identification wants a better look too. Shared techniques may make sense operationally, however they want stronger controls round them.<\/p>\n<p>Resilience additionally must be handled as a sensible train, not only a plan on paper. If techniques went down tomorrow, may they really be rebuilt? How lengthy would it not take? Who has the information to do it? And at last, monitoring. Not simply on the IT layer, however inside OT itself, with the flexibility to identify safety points early.<strong>\u00a0<\/strong><\/p>\n<p><strong>The larger image<\/strong><\/p>\n<p>Operational Know-how underpins on a regular basis life, and when it fails, society is the casualty. Presently, lots of the techniques we rely on most are working with out full visibility, with out clear possession, and with out the resilience wanted to resist a severe incident.<\/p>\n<p>Till that modifications, the UK\u2019s most crucial infrastructure will proceed to hold a degree of threat that leaves the nation, and its residents, dangerously uncovered.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>By Peter Villiers, Director of Cyber Threat at Barrier Networks There\u2019s a rising threat throughout the UK\u2019s Crucial Nationwide Infrastructure (CNI) that&#8217;s inserting the nation at severe threat of disruption. It isn\u2019t ransomware or a headline-grabbing knowledge breach. It sits inside the techniques that hold the nation working. The chance is rising over time, as [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14696,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[3866,959,6301,762,2209,350,211,3096,243],"class_list":["post-14694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-blind","tag-cyber","tag-greatest","tag-hidden","tag-poses","tag-risk","tag-security","tag-spots","tag-technology"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14694"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14694\/revisions"}],"predecessor-version":[{"id":14695,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/14694\/revisions\/14695"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/14696"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-05-12 11:07:13 UTC -->