COMMENT

How can mining companies protect their operational technology networks? 

Global cybersecurity revenues from mining have grown steadily since 2020 and are projected to reach $2.5bn by 2025. 

Alongside all other sectors, mining companies will have to work hard to keep up with the increasing frequency and complexity of cyberattacks. As mining becomes more and more interconnected, the Internet of Things (IoT) sensors, augmented reality devices, autonomous vehicles and drones that improve operational efficiency are equally capable of halting activity if they fall prey to cyberattacks. 


As such, mining companies must protect their operations and sensitive data from possible attacks from competitors, nation states, or cybercriminals. 

Operational technology networks need the attention of mining companies 

The operational technology (OT) networks of mining operations are particularly vulnerable to cyberattacks with lower security maturity than their corporate counterparts. Within OT networks, autonomous fleets, drone technology, equipment management systems and the industrial internet are all under threat of cyberattacks and face severe consequences. 


These could include the complete shutdown of production activity, loss of revenues, environmental harm, danger to on-site workers and reputational damage to the mining company itself. To combat the risks associated with OT systems, mining companies should focus on identity management policies and software to prevent unauthorised access to their systems. 


The identity management approach would include password management, privileged access levels, biometric identification and multi-factor authentication. Alongside identity management, mining companies should regularly update their OT systems and patch specific vulnerabilities of legacy systems. 


Mining companies can use cybersecurity risk and compliance services to access independent assessments of their current cybersecurity posture. This can also help them keep up to date with any developments in the constantly evolving space of cyber threats and regulation. 

Protecting OT networks through monitoring 

Many cybersecurity vendors have created solutions to protect OT networks. ABB, Nozomi Networks and Darktrace are just three that recognise the effectiveness of constant monitoring to protect OT networks.


ABB offers its integrated Ability System 800xA for 24/7 monitoring of OT networks, supported by experts. Nozomi Networks also employs automated threat detection that monitors OT and IoT environments for any anomalous activity. 


Additionally, and most interestingly, Darktrace uses self-learning AI to stay ahead of cyberthreats. Its AI identifies any change in computer network patterns by focusing on regular business activity rather than breaches. Any unusual activity in the network produces immediate alerts. This assists in identifying cyber threats at the early survey stage and limits or completely prevents breaches. 


The approach by all three of these cybersecurity vendors should highlight to mining companies the inevitable nature of cyberattacks and how vital it is that they use the latest cybersecurity solutions to recognise threats, before they are stuck dealing with the consequences. 

// Main image: Worker with VR headset. Credit: Elizaveta Galitckaia / via Shutterstock

Go to article: Home | National securityGo to article: In this issueGo to article: ContentsGo to article: NHP Electrical Engineering Products Company Insight Go to article: NHP Electrical EngineeringGo to article: Steuler KCH Australia Company InsightGo to article: Steuler KCH Australia Go to article: BriefingGo to article: Industry newsGo to article: The mining industry briefingGo to article: Ukraine executive briefing by GlobalData Go to article: Miller TechnologyGo to article: Martin Engineering Company InsightGo to article: Martin EngineeringGo to article: Beam CommunicationsGo to article: CommentGo to article: How can mining companies protect their operational technology networks? Go to article: Drone use is rising in minesGo to article: COP26 and competition: regulatory trends in battery technology Go to article: Bosch RexrothGo to article: Blundstone Australia Company InsightGo to article: BlundstoneGo to article: AusProof Company InsightGo to article: AusProof Coupler SystemsGo to article: In DepthGo to article: Licences and legality: what does the aborted Williams Bay exploration mean?Go to article: From Covid to Ukraine: how trade disruption affects Australian miners  Go to article: The Pentagon sets its sights on Australia’s critical minerals Go to article: Major project status: Ardea on the Kalgoorlie Nickel Project Go to article: Lessons not learned: Western Australia in clash with indigenous peoples’ rights Go to article: What does the Australian election mean for the commodities industry? Go to article: Aspect Environmental Company InsightGo to article: Aspect EnvironmentalGo to article: Kam MiningGo to article: Dieci Australia Company InsightGo to article: In DataGo to article: North America sees an increase in mining data analytics rolesGo to article: Supply chain and logistics innovation in mining in declineGo to article: Mining mergers and acquisitions total $9.8bn globallyGo to article: EngentusGo to article: DDH1Go to article: S&C Electric Australia Company InsightGo to article: S&C Electric CompanyGo to article: Event: QMEGo to article: EventsGo to article: Next issueGo to article: Phoenix Contact Company Insight Go to article: Pirtek Company InsightGo to article: Steel MainsGo to article: Mining Health Solutions Go to article: Lubrication Engineering Go to article: Allsafe Mine Vehicle Equipment