{"id":23522,"date":"2024-12-02T01:13:55","date_gmt":"2024-12-01T19:43:55","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=23522"},"modified":"2025-04-25T13:11:31","modified_gmt":"2025-04-25T07:41:31","slug":"how-critical-infrastructure-can-balance-business-security","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-critical-infrastructure-can-balance-business-security\/","title":{"rendered":"How Critical Infrastructure Can Balance Business &#038; Security"},"content":{"rendered":"<h2>What is Critical Infrastructure and Why is it at Risk?<\/h2>\n<p><span style=\"font-weight: 400;\">A data breach targeted at a normal organization could be catastrophic for its operations. A data breach targeted at a critical infrastructure organization could be catastrophic for the entire country.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To understand why, we must first understand what comes under its scope. <strong>Critical infrastructure (CI)<\/strong> involves all the organizations, systems, and structures that form the backbone of a nation\u2019s economy, health, and security. A wide range of sectors come under critical infrastructure &#8211;\u00a0 from dams to defense, from energy services to emergency services, from food &amp; agriculture to financial markets. A breach in critical infrastructure could lead to economic crisis, public disorder, and even loss of life.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The bad news is? Attacks against critical infrastructure are growing. A study by KnowBe4 saw that global critical infrastructure faced over 420 million cyberattacks between January 2023 to January 2024. That equates to about 13 attacks per second. And they are increasing not just in frequency, but also financial severity &#8211; the IBM 2023 Cost of Data Breach Report puts the average cost of a data breach involving CI at $5.04 million, which is $1.26 million higher than the overall average.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attacks are increasing, because the range of threat actors is wider. In general, private organizations mostly face attacks from financially motivated hackers. For CI, there are a lot more antagonists in the picture:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">State-sponsored attackers from other nations who are perpetually engaged in <\/span><b>cyber-warfare<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attackers from rogue groups that engage in <\/span><b>cyberterrorism<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The same financially motivated attackers involved in <\/span><b>cybercrime<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Insider threats<\/b><span style=\"font-weight: 400;\"> from disgruntled or rogue employees<\/span><\/li>\n<\/ul>\n<h2>Business vs. Security: A False Dichotomy in Critical Infrastructure<\/h2>\n<p><span style=\"font-weight: 400;\">Amid these escalating attack vectors, CI organizations are faced with a multitude of challenges:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They may employ <\/span><b>older legacy systems<\/b><span style=\"font-weight: 400;\"> that have outdated security standards, leading to major vulnerabilities that attackers can exploit.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CI systems are highly <\/span><b>interconnected<\/b><span style=\"font-weight: 400;\">. A breach in one specific part of the ecosystem could have serious ramifications for everyone involved, especially if there are improper access controls.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">You cannot scan for vulnerabilities in a CI ICS the same way you can for a virtual IT environment, because doing so can take industrial systems offline and bring down operations. It is imperative to <\/span><b>maintain business continuity in critical infrastructure.<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digitization in these sectors has led to the use of many <\/span><b>insecure, misconfigured IoT devices<\/b><span style=\"font-weight: 400;\"> that are prone to attack.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Most CI organizations have to <\/span><b>adhere to myriad regulations<\/b><span style=\"font-weight: 400;\"> that can prove to be a big challenge. Most recently, SEBI released an exhaustive <a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/sebi-cscrf-explained\/\">Cyber Security and Cyber Resilience Framework<\/a> (CSCRF) that features several mandates for all its regulated entities in the financial markets to follow. You can read more about that <\/span><span style=\"font-weight: 400;\">here<\/span><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Finally, and most relevant to this blog, the majority of critical infrastructure is privately held. Cybersecurity is often treated as a hindrance to operations, so there is a perpetual tug-of-war between <\/span><b>business vs. security<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The truth is, that the battle between security vs. business operations in critical operations is a myth. Business operations will cease to exist without proper security measures in place, and our entire way of life could be compromised as a result.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s the good news &#8211;\u00a0 the best cybersecurity programs (like ours!) help optimize your operations, through benefits like automated processes, unified oversight, and data-driven insights. The rest of this blog will focus on how to secure critical infrastructure by exploring several infamous attacks in the sector and taking the learnings from them to construct CS programs that will give your organization an extremely strong security posture.<\/span><\/p>\n<h2>Lessons from Infamous Critical Infrastructure Cyberattacks<\/h2>\n<h3><b>The 2016 Ukrainian Power Grid Attack<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Long before the Russia-Ukraine war broke out and became an insidious battle to weaken each other\u2019s critical infrastructure, Russian hackers successfully conducted an attack back in 2016 that left over 700,000 Ukrainians without power in the middle of the winter. What\u2019s interesting about this attack is that it was not conducted by exploiting one particular vulnerability. Hackers used a multitude of tools &amp; tactics to succeed, including KillDisk, credential theft, remote access exploits, spear phishing, and DoS telephony attacks.<\/span><\/p>\n<p><strong><i>Lessons Learned: <\/i><\/strong><span style=\"font-weight: 400;\">Simply put, cybersecurity is not something where one solution fits all. You have to incorporate <\/span><b>defense-in-depth<\/b><span style=\"font-weight: 400;\">, which involves using multi-layered security systems (IDS, firewalls, stringent access control, encryption tools, etc.) for more responses to different kinds of cyber threats.<\/span><\/p>\n<h3><b>The AIIMS hack<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">For the next example, we look at an incident closer to home. In 2022, AIIMS Delhi saw 5 of its 100 servers breached through ransomware, leading to the attackers possessing 1.3 terabytes of sensitive hospital data. But more than that, it created absolute panic across the ecosystem and severely impacted business operations &#8211; appointments got muddled, treatments got delayed and the hackers demanded Rs. 200 crore to remove the ransomware. After the <a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/what-the-recent-cert-in-directives-mean-for-businesses-in-india\/\">Indian Computer Emergency Response Team<\/a> (CERT-In) got involved, the cause of the breach was determined to be improper network segmentation.<\/span><\/p>\n<p><strong><i>Lessons Learned: <\/i><\/strong><span style=\"font-weight: 400;\">In such an interconnected environment, <\/span><b>network segmentation<\/b><span style=\"font-weight: 400;\"> is crucial to mitigate the fallout should an incident occur. This countermeasure helps contain the breach to that particular area in your system, making it impossible for attackers to move around the network. We at iValue have industry-standard network segmentation solutions like<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><b>VMware NSX<\/b><span style=\"font-weight: 400;\"> as part of our suite, which help isolate critical systems while enhancing security controls.<\/span><\/p>\n<h3><b>The Colonial Pipeline Attack<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This breach is particularly infamous in the critical infrastructure world because of how widespread the fallout became. Colonial Pipeline was essential to distributing oil across the East Coast of the US, covering 5,500 miles from Texas to New Jersey. Hacker group DarkSide got in through an exposed password of an employee for a VPN account, which was the same password used for other accounts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The rest is history &#8211; Colonial Pipeline paid close to $4.4 million in Bitcoin for a decryption key, but by that time, nearly 11,000 gas stations were still out of gas, and the average cost for fuel per gallon became the highest it\u2019s been in over 6 years. It led Joe Biden, POTUS at the time, to sign an executive order demanding better cybersecurity measures in CI soon after.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\"><strong>Lessons Learned:<\/strong> <\/span><\/i><span style=\"font-weight: 400;\">Attackers these days don\u2019t hack in &#8211; they log in. This makes stringent access control imperative to ward off threats. In the case of the Colonial Pipeline, the attackers gained access and immediately self-elevated their privileges to access the most sensitive information. This can be avoided by a watertight <a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/managing-pam-across-multicloud-environments\/\">Privileged Access Management<\/a> solution, like the one we have with <\/span><b>CyberArk<\/b><span style=\"font-weight: 400;\">. This state-of-the-art solution reduces the risk of unauthorized access by continuously monitoring all your privileged accounts.<\/span><\/p>\n<h3><b>The Change Healthcare Breach<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This can be described as the cyberattack of 2024, with the President of the American Health Association claiming that the attack is \u201cthe most significant and consequential incident of its kind against the US healthcare system in history.\u201d Change Healthcare is one of the largest health payment processing companies in the world, accounting for nearly 40% of all claims with over 15 billion medical claims every year. The attack led to a backlog of unpaid claims, which resulted in hospital cash flow problems that seriously threatened patients\u2019 access to care. AHA reports that nearly 94% of hospitals have experienced financial repercussions from the cyberattack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A subsequent Senate hearing revealed that the reason for the attack was because Change Healthcare wasn\u2019t using multi-factor authentication in its processes.<\/span><\/p>\n<p><strong><i>Lessons Learned: <\/i><\/strong><span style=\"font-weight: 400;\">For industries dealing in essential operations, <\/span><a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/ivalue-whitepapers\/best-practices-for-phishing-resistant-mfa-in-apac-critical-infrastructure\/\"><b>MFA<\/b><\/a><span style=\"font-weight: 400;\"> is a must. Otherwise, the only safeguard between an attacker and your system could be a weak, reused password. However, not all factors in multi-factor authentication are created equal. Through solutions involving physical passkeys and biometrics like <a href=\"https:\/\/ivaluegroup.com\/en-in\/official-distributor-of-yubikey-in-india\/\">Yubikey<\/a>, <a href=\"https:\/\/ivaluegroup.com\/en-in\/oems\/demo\/unified-application-resilience-ivalue-opentext\/\">OpenText<\/a> NetIQ, and RSA SecurID, iValue enforces strong authentication in your ecosystem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a final word, we\u2019d like to point out that critical infrastructure security is paramount in such a dynamic, complex, heterogeneous environment, with multiple threat vectors and serious challenges. However, an end-to-end, mission-critical solution like the one iValue provides can not only fortify your organization&#8217;s security but also transform your operations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Long story short, our solutions never make you decide or compromise between business and security. Instead, it optimizes both aspects, together.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Critical Infrastructure and Why is it at Risk? A data breach targeted at a normal organization could be catastrophic for its operations. A data breach targeted at a critical infrastructure organization could be catastrophic for the entire country.\u00a0 To understand why, we must first understand what comes under its scope. Critical infrastructure (CI) &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-critical-infrastructure-can-balance-business-security\/\"> <span class=\"screen-reader-text\">How Critical Infrastructure Can Balance Business &#038; Security<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20195,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[413,409,412,411,134,410,401,414,415],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23522"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=23522"}],"version-history":[{"count":1,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23522\/revisions"}],"predecessor-version":[{"id":23523,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23522\/revisions\/23523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20195"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=23522"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=23522"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=23522"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=23522"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=23522"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}