Skip to playerSkip to main content
  • 3 hours ago
A retrospective on the JLR cyber attack: how tight links between office IT and factory systems led to shutdowns, what foundations firms must fix before buying new tech, and how small businesses can test whether outsourced IT will actually restore them fast.
Transcript
00:00Cyber attacks don't just lock screens, they stop people working, stall orders and bruise
00:06whole supply chains. The shutdown at Jaguar Land Rover showed how quickly trouble spreads
00:12when FactorKit leans on the same digital backbone as office systems. One breach on the business
00:17side can spill into plant controls and production stalls. It's the weak seam where speed meets
00:24fragility. Dr Emma Philpott works with firms facing that risk every day, so it makes sense
00:30to start at the root. When machinery is tied to business networks and the wider internet,
00:35where does the biggest danger sit and what turns a single gap into a false stop?
00:41One of the big problems is that some equipment, particularly in manufacturing, was never intended
00:47to be connected to the internet and so it doesn't have the security controls and also it's not
00:52possible to update some of them. So when a criminal finds a way to break in, then you can't close
00:59that hole once people realize. So a lot of manufacturing equipment is intrinsically quite risky. So if
01:05you just connect it to the internet, that can be a big problem. So people need to segregate
01:12their networks. So it's one thing to connect your manufacturing equipment, but don't then
01:17have that direct connection to all your business systems. So organizations need to segregate their
01:24networks basically. After a shock, firms reach for new tools, dashboards, scanners, promises of
01:32instant protection, but resilience starts earlier. You can't defend assets, you can't list, you can't trust
01:38access controls, you never review, and backups mean nothing until you've restored them under pressure.
01:44Foundations decide whether a breach becomes a blip or a shutdown. Before a penny goes on fresh tech,
01:51there's a quieter step that sets the whole plan. What's the single most important move leaders
01:56should take before they begin modernizing?
02:00The most important thing is to prepare to think about security as you're doing it. So again,
02:07network segregation is really, really important. Work out what is your most important aspects of your
02:12business, like maybe payroll or some sensitive data you hold, and make sure that that is protected from
02:18anything that is more risky by segregating the network. Also, if you're going to use cloud services,
02:25make sure you know who is responsible for making sure that cloud service is secure.
02:30So often a cloud service will publish something called a joint responsibility
02:34table. And it will say who is responsible for making sure the passwords are secure, for example.
02:42Who is responsible for making sure that the software is updated? And it could be, you know,
02:47whoever it is that is the provider, or it could be you. And it's really important that any upgrading
02:52you do takes into account who is responsible for making sure that stays secure.
02:57record package is an important move forward. And it's really important that everything is
03:07available to you. And it's really important for people to make sure that the technology is
03:13in the way that everybody does not only manage, you can actually be able to manage, you can
03:16build a network for people to help the way that is a different way that is a different way. And it's
03:20really important.
Be the first to comment
Add your comment

Recommended