{"id":11068,"date":"2019-03-07T11:00:26","date_gmt":"2019-03-07T11:00:26","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=11068"},"modified":"2019-03-07T17:48:21","modified_gmt":"2019-03-07T17:48:21","slug":"combatting-global-security-risks","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/","title":{"rendered":"Combatting global security risks"},"content":{"rendered":"\n<p><strong>Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy<\/strong><\/p>\n\n\n\n<p>\u201cIs the world sleep walking into a crisis?\u201d That is the question B\u00f8rge Brende, president of the World Economic Forum (WEF), poses in this year\u2019s report. <\/p>\n\n\n\n<p>In January 2019, amongst the snow-caped mountains of Davos, Switzerland, WEF assembled once again for its annual meeting to discuss the biggest risks our world currently faces.&nbsp;<\/p>\n\n\n\n<p>Top of the agenda was cybersecurity, and how businesses can continue to grow their ever-expanding digital footprint, while mitigating the risks of attack.<\/p>\n\n\n\n<p>Published against a backdrop of growing global tensions, the report uses data from private insurers, government publications and academic studies to rank the risks that jeopardise today\u2019s society. Ranking fourth and fifth, cyber-attacks and data breaches are amongst the most serious.<\/p>\n\n\n\n<p>It is the second year in a row that these threats have been present in the top five concerns and are considered amongst the most critical man-made risks, short of failure to improve climate change. <\/p>\n\n\n\n<p>With cybersecurity at the forefront of many minds, what can be done to ease concern?<\/p>\n\n\n\n<p><strong>Unexpected consequences<\/strong><\/p>\n\n\n\n<p>The explosive growth of connected devices brings with it the chance of unexpected consequences. Take the disruption caused by the Heathrow drone sightings for example.&nbsp;<\/p>\n\n\n\n<p>Although evidence of any insidious agenda is yet to come to light, it was the unknown potential damage of the drone that brought the UK\u2019s busiest airport to a grinding halt.<\/p>\n\n\n\n<p>While technology significantly contributes to global growth, are we prepared to act if things take a darker turn?&nbsp;<\/p>\n\n\n\n<p>Despite being the creators of innovation, we are living in a realm of uncharted territory.&nbsp;<\/p>\n\n\n\n<p>With digital systems designed to monitor our power supplies, traffic flows and personal data, there is a looming feeling that technology is not adequately accompanied by measures to mitigate the risk of attack.<\/p>\n\n\n\n<p><strong>Infiltrating infrastructure<\/strong><\/p>\n\n\n\n<p>Another key concern raised by WEF is the risk cyber-attacks pose to critical infrastructure.&nbsp;<\/p>\n\n\n\n<p>With Internet of Things (IoT) devices firmly embedded into industrial environments, the report warns that the &#8220;potential vulnerability of critical technological infrastructure has increasingly become a national security concern\u201d. The increase in connectivity could provide an easily-accessible back door for hackers to gain access into some of society\u2019s most vital resources.<\/p>\n\n\n\n<p>In July 2018, the US government stated that hackers had gained remote access to the control rooms of utility companies, even though command centre computers were not directly linked to the web.&nbsp;<\/p>\n\n\n\n<p>The group behind the attacks, known as Dragonfly or Energetic Bear, used spear-fishing emails make staff visit spoofed or hacked social media sites, giving allowing them to steal credentials of corporate networks of suppliers and gain access to utilities. &nbsp;<\/p>\n\n\n\n<p><strong>The cybersecurity skills gap<\/strong><\/p>\n\n\n\n<p>Attacks are happening on a new, emerging battlefield. As attackers ramp up their methods and develop increasingly more sophisticated hacks, there simply isn\u2019t a sufficient number of \u2018white hats\u2019 to address growing cyber threats. In fact, Cybersecurity Ventures Cybersecurity Job Report estimates that there will be 3.5 million unfilled cybersecurity positions by 2021.<\/p>\n\n\n\n<p>A reason for the gap is that the digital marketplace is creating more jobs than the current supply of security professionals can meet. There is also no efficient way of creating and training enough skilled practitioners at the same rate as technological expansion. &nbsp;<\/p>\n\n\n\n<p><strong>Getting prepared<\/strong><\/p>\n\n\n\n<p>The report declares that world governments tend to be underprepared for mitigating cyberattacks. To combat cyber concerns, businesses need to work to mitigate risks on a collaborative basis, with a team of experts who have a knowledge of their facility\u2019s technology and the potential of any risks it may pose.<\/p>\n\n\n\n<p>An effective cybersecurity strategy is at its most successful when it is integrated with risk management procedures.&nbsp;<\/p>\n\n\n\n<p>At Boulting Technology, our engineers are experienced in integrating existing systems and replacing legacy controllers with modern, connected alternatives.&nbsp;<\/p>\n\n\n\n<p>To minimise the danger posed by connected technologies, and to tackle the cybersecurity skills gap, it is essential that staff undergo rigorous training.<\/p>\n\n\n\n<p>To avoid sleep walking into a crisis, we need to be aware of the risks they pose. While technology boosts productivity in businesses across the globe, new equipment and its risks must be evaluated to reduce cyberthreats and ease concern.<\/p>\n\n\n\n<p>Nick Boughton is digital lead at leading systems integrator <strong><a href=\"http:\/\/www.boultingtechnology.co.uk\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Boulting Technology (opens in a new tab)\">Boulting Technology<\/a><\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy \u201cIs the world sleep walking into a crisis?\u201d That is the question B\u00f8rge Brende, president of the World Economic Forum (WEF), poses in this year\u2019s report. In January 2019, amongst the snow-caped mountains of &hellip;<\/p>\n","protected":false},"author":1,"featured_media":11069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[155,5760,5305],"class_list":["post-11068","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-process","tag-boulting-technology","tag-cybercrime","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Combatting global security risks - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Combatting global security risks - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-07T11:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-07T17:48:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/BOU271-Davos-roundup-Image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"959\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Combatting global security risks\",\"datePublished\":\"2019-03-07T11:00:26+00:00\",\"dateModified\":\"2019-03-07T17:48:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/\"},\"wordCount\":729,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/BOU271-Davos-roundup-Image.jpg\",\"keywords\":[\"Boulting Technology\",\"cybercrime\",\"cybersecurity\"],\"articleSection\":[\"Process\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/\",\"name\":\"Combatting global security risks - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/BOU271-Davos-roundup-Image.jpg\",\"datePublished\":\"2019-03-07T11:00:26+00:00\",\"dateModified\":\"2019-03-07T17:48:21+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/BOU271-Davos-roundup-Image.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/BOU271-Davos-roundup-Image.jpg\",\"width\":1280,\"height\":959,\"caption\":\"The explosive growth of connected devices brings with it the chance of unexpected consequences. Image: Boulting Technology\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/combatting-global-security-risks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Combatting global security risks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Combatting global security risks - Engineer News Network","description":"Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/","og_locale":"en_GB","og_type":"article","og_title":"Combatting global security risks - Engineer News Network","og_description":"Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/","og_site_name":"Engineer News Network","article_published_time":"2019-03-07T11:00:26+00:00","article_modified_time":"2019-03-07T17:48:21+00:00","og_image":[{"width":1280,"height":959,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/BOU271-Davos-roundup-Image.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Combatting global security risks","datePublished":"2019-03-07T11:00:26+00:00","dateModified":"2019-03-07T17:48:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/"},"wordCount":729,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/BOU271-Davos-roundup-Image.jpg","keywords":["Boulting Technology","cybercrime","cybersecurity"],"articleSection":["Process"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/","name":"Combatting global security risks - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/BOU271-Davos-roundup-Image.jpg","datePublished":"2019-03-07T11:00:26+00:00","dateModified":"2019-03-07T17:48:21+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Nick Boughton outlines the findings of World Economic Forum\u2019s 2019 Global Risk Report and how manufacturers can enhance their cybersecurity strategy","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/BOU271-Davos-roundup-Image.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/BOU271-Davos-roundup-Image.jpg","width":1280,"height":959,"caption":"The explosive growth of connected devices brings with it the chance of unexpected consequences. Image: Boulting Technology"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/combatting-global-security-risks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Combatting global security risks"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/11068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=11068"}],"version-history":[{"count":2,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/11068\/revisions"}],"predecessor-version":[{"id":11102,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/11068\/revisions\/11102"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/11069"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=11068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=11068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=11068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}