{"id":12125,"date":"2024-03-19T10:50:16","date_gmt":"2024-03-19T10:50:16","guid":{"rendered":"https:\/\/www.novotek.com\/no\/?post_type=insights&#038;p=12125"},"modified":"2025-01-03T09:57:15","modified_gmt":"2025-01-03T09:57:15","slug":"cybersikkerhet-for-industrielle-bedrifter","status":"publish","type":"insights","link":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/","title":{"rendered":"Cybersikkerhet for industribedrifter"},"content":{"rendered":"<div class=\"container-md paragraph  \">\n<p>M\u00e5lrettede cyberangrep mot industrielle anlegg fortsetter \u00e5 \u00f8ke, med det f\u00f8lger ogs\u00e5 en \u00f8kningen i kostnadene de medf\u00f8rer. I l\u00f8pet av de siste \u00e5rene har flere anerkjente selskaper blitt offer for l\u00f8sepengetrojanere og cyberangrep rettet mot produksjonsanlegg. Det \u00f8kende fokuset p\u00e5 digitalisering bidrar til mer fleksibilitet og effektivitet i produksjonen. Imidlertid har denne digitaliseringen ogs\u00e5 \u00f8kt kompleksiteten og skapt nye angrepsflater, og dermed \u00f8kt risikoen for angrep.\u00a0<\/p>\n<\/div>\n\n<div class=\"container-md image  \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited-1024x576.jpg\" alt=\"Cybersikkerhet\" class=\"wp-image-12127\" srcset=\"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited-1024x576.jpg 1024w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited-300x169.jpg 300w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited-768x432.jpg 768w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited-1536x863.jpg 1536w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited.jpg 1788w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"container-md heading  \">\n<h2 class=\"wp-block-heading\">IT-sikkerhetsmekanismer for OT?<\/h2>\n<\/div>\n\n<div class=\"container-md paragraph  \">\n<p>Selv om IT og operasjonsteknologi (OT) gradvis integreres, forblir OT betydelig forskjellig fra IT. De etablerte IT-sikkerhetsmetodene kan ikke enkelt overf\u00f8res til OT. Prosessen med \u00e5 harmonisere ulike anlegg og programvarel\u00f8sninger til en s\u00f8ml\u00f8s enhet ligger fortsatt langt bak dagens standard for IT-konfigurasjoner i de fleste selskaper. Dette gj\u00f8r OT-systemer s\u00e5rbare for m\u00e5lrettede angrep fra profesjonelle hackere.&nbsp;<\/p>\n<\/div>\n\n<div class=\"container-md paragraph  \">\n<p>Den n\u00e5v\u00e6rende utfordringen i OT milj\u00f8et er \u00e5 oppn\u00e5 samme niv\u00e5 av abstraksjon, gjennomsiktighet gjennom kontinuerlig overv\u00e5king, og feiltoleranse gjennom trusselbeskyttelse og rask gjenoppretting som det som allerede finnes i IT-infrastrukturen.&nbsp;<\/p>\n<\/div>\n\n<div class=\"container-md heading  \">\n<h2 class=\"wp-block-heading\">M\u00e5ldefinisjonsstolper<\/h2>\n<\/div>\n\n<div class=\"container-md paragraph  \">\n<p>Den mest vanlige metoden for \u00e5 sikre OT og beskytte den er for tiden bruk av\u00a0vanlig sikkerhetskopier og gjenopprettinger. L\u00f8sninger som brannmurer og malwarebeskyttelse er ikke s\u00e5 utbredt. Hoved\u00e5rsaken til dette er at de to disiplinene har forskjellige fokuspunkter for sine beskyttelsesm\u00e5l: I IT er konfidensialitet av dataene viktigst, mens i OT er tilgjengelighet hovedfokuset.\u00a0<\/p>\n<\/div>\n\n<div class=\"container-md heading  \">\n<h2 class=\"wp-block-heading\">Disaster Recovery<\/h2>\n<\/div>\n\n<div class=\"container-md paragraph  \">\n<p>I de fleste tilfeller etter et cyberangrep er det ikke bare nedetid eller feilfunksjon som de ansvarlige st\u00e5r overfor. Det handler mer om \u00e5 fastsl\u00e5 og gjenopprette systemets siste tilstand, for eksempel alle prosjektdataene eller siste kj\u00f8reparametre. Diagnose og datamanagement, selv i automatiserte milj\u00f8er skjer ofte manuelt som for 30 \u00e5r siden og det mangler vanlige metoder for \u00e5 for eksempel:&nbsp;<\/p>\n<\/div>\n\n<div class=\"container-md list  \">\n<ul class=\"wp-block-list\"><div class=\"container-md list-item  \">\n<li>Overv\u00e5ke endringer &nbsp;<\/li>\n<\/div>\n\n<div class=\"container-md list-item  \">\n<li>Dokumentere rekkef\u00f8lgen p\u00e5 endringer&nbsp;<\/li>\n<\/div>\n\n<div class=\"container-md list-item  \">\n<li>Tillate endringer bare for utvalgte personer&nbsp;<\/li>\n<\/div><\/ul>\n<\/div>\n\n<div class=\"container-md image  \">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"387\" src=\"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/ot-cybersicherheit-devices-assets-1024x387.jpg\" alt=\"Arbeider p\u00e5 fabrikken\" class=\"wp-image-12128\" srcset=\"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/ot-cybersicherheit-devices-assets-1024x387.jpg 1024w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/ot-cybersicherheit-devices-assets-300x114.jpg 300w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/ot-cybersicherheit-devices-assets-768x291.jpg 768w, https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/ot-cybersicherheit-devices-assets.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"container-md paragraph  \">\n<p>Tekniske, infrastruktur- og driftsansvarlige leter derfor etter en enkel m\u00e5te \u00e5 implementere, en enhetlig l\u00f8sning som fungerer p\u00e5 tvers av alle automatiseringsenheter. Siden disse i stor grad mangler, blir enkeltl\u00f8sninger ofte satt sammen til komplekse lappverksystemer i praksis. Disse er imidlertid avhengige av stadige tilpasninger og &laquo;workarounds&raquo; i seg selv, og blir feilkilder som igjen krever omfattende diagnostiske inngrep.\u00a0<\/p>\n<\/div>\n\n<div class=\"container-md heading  \">\n<h2 class=\"wp-block-heading\">Vurdering av risikoer og iverksettelse av tiltak<\/h2>\n<\/div>\n\n<div class=\"container-md paragraph  \">\n<p>Bedrifter kan betydelig forbedre cybersikkerheten til sine industrielle anlegg ved \u00e5 vurdere sine egne risikoer, iverksette effektive beskyttelsestiltak og v\u00e6re forberedt p\u00e5 angrep. Dette inkluderer blant annet bruken av programvarel\u00f8sninger for automatisk backup og versjonskontroll for \u00e5 sikre s\u00f8ml\u00f8s compliance-styring og en plan for disaster recovery.\u00a0<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>M\u00e5lrettede cyberangrep mot industrielle anlegg fortsetter \u00e5 \u00f8ke, med det f\u00f8lger ogs\u00e5 en \u00f8kningen i kostnadene de medf\u00f8rer. I l\u00f8pet av de siste \u00e5rene har flere anerkjente selskaper blitt offer for l\u00f8sepengetrojanere og cyberangrep rettet mot produksjonsanlegg. Det \u00f8kende fokuset p\u00e5 digitalisering bidrar til mer fleksibilitet og effektivitet i produksjonen. Imidlertid har denne digitaliseringen ogs\u00e5 [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","insight_category":[29],"class_list":["post-12125","insights","type-insights","status-publish","hentry","insight_category-cybersikkerhet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersikkerhet for industribedrifter - Novotek Norge<\/title>\n<meta name=\"description\" content=\"L\u00e6r om cybersikkerhet for industrielle bedrifter og beskyttelse mot \u00f8kende trusler.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/\" \/>\n<meta property=\"og:locale\" content=\"nb_NO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersikkerhet for industribedrifter - Novotek Norge\" \/>\n<meta property=\"og:description\" content=\"L\u00e6r om cybersikkerhet for industrielle bedrifter og beskyttelse mot \u00f8kende trusler.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/\" \/>\n<meta property=\"og:site_name\" content=\"Novotek Norge\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-03T09:57:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited.jpg.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1788\" \/>\n\t<meta property=\"og:image:height\" content=\"1005\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ansl. lesetid\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/\",\"name\":\"Cybersikkerhet for industribedrifter - Novotek Norge\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/Insights\\\/2024\\\/Cybersikkerhet\\\/OT-Cybersicherheit-edited-1024x576.jpg\",\"datePublished\":\"2024-03-19T10:50:16+00:00\",\"dateModified\":\"2025-01-03T09:57:15+00:00\",\"description\":\"L\u00e6r om cybersikkerhet for industrielle bedrifter og beskyttelse mot \u00f8kende trusler.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/#breadcrumb\"},\"inLanguage\":\"nb-NO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/Insights\\\/2024\\\/Cybersikkerhet\\\/OT-Cybersicherheit-edited.jpg.webp\",\"contentUrl\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/Insights\\\/2024\\\/Cybersikkerhet\\\/OT-Cybersicherheit-edited.jpg.webp\",\"width\":1788,\"height\":1005,\"caption\":\"Cybersikkerhet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/insight\\\/cybersikkerhet-for-industrielle-bedrifter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersikkerhet for industribedrifter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/#website\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/\",\"name\":\"Novotek Norge\",\"description\":\"Automasjon, digitalisering og Analytics\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nb-NO\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/#organization\",\"name\":\"Novotek AS\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nb-NO\",\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/Forside\\\/Novotek_logo.png\",\"contentUrl\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/wp-content\\\/uploads\\\/sites\\\/5\\\/Forside\\\/Novotek_logo.png\",\"width\":1200,\"height\":348,\"caption\":\"Novotek AS\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novotek.com\\\/no\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/novotek-as\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersikkerhet for industribedrifter - Novotek Norge","description":"L\u00e6r om cybersikkerhet for industrielle bedrifter og beskyttelse mot \u00f8kende trusler.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/","og_locale":"nb_NO","og_type":"article","og_title":"Cybersikkerhet for industribedrifter - Novotek Norge","og_description":"L\u00e6r om cybersikkerhet for industrielle bedrifter og beskyttelse mot \u00f8kende trusler.","og_url":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/","og_site_name":"Novotek Norge","article_modified_time":"2025-01-03T09:57:15+00:00","og_image":[{"width":1788,"height":1005,"url":"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited.jpg.webp","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Ansl. lesetid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/","url":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/","name":"Cybersikkerhet for industribedrifter - Novotek Norge","isPartOf":{"@id":"https:\/\/www.novotek.com\/no\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/#primaryimage"},"image":{"@id":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited-1024x576.jpg","datePublished":"2024-03-19T10:50:16+00:00","dateModified":"2025-01-03T09:57:15+00:00","description":"L\u00e6r om cybersikkerhet for industrielle bedrifter og beskyttelse mot \u00f8kende trusler.","breadcrumb":{"@id":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/#breadcrumb"},"inLanguage":"nb-NO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/"]}]},{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/#primaryimage","url":"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited.jpg.webp","contentUrl":"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Insights\/2024\/Cybersikkerhet\/OT-Cybersicherheit-edited.jpg.webp","width":1788,"height":1005,"caption":"Cybersikkerhet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.novotek.com\/no\/insight\/cybersikkerhet-for-industrielle-bedrifter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.novotek.com\/no\/"},{"@type":"ListItem","position":2,"name":"Cybersikkerhet for industribedrifter"}]},{"@type":"WebSite","@id":"https:\/\/www.novotek.com\/no\/#website","url":"https:\/\/www.novotek.com\/no\/","name":"Novotek Norge","description":"Automasjon, digitalisering og Analytics","publisher":{"@id":"https:\/\/www.novotek.com\/no\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.novotek.com\/no\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nb-NO"},{"@type":"Organization","@id":"https:\/\/www.novotek.com\/no\/#organization","name":"Novotek AS","url":"https:\/\/www.novotek.com\/no\/","logo":{"@type":"ImageObject","inLanguage":"nb-NO","@id":"https:\/\/www.novotek.com\/no\/#\/schema\/logo\/image\/","url":"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Forside\/Novotek_logo.png","contentUrl":"https:\/\/www.novotek.com\/no\/wp-content\/uploads\/sites\/5\/Forside\/Novotek_logo.png","width":1200,"height":348,"caption":"Novotek AS"},"image":{"@id":"https:\/\/www.novotek.com\/no\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/novotek-as"]}]}},"_links":{"self":[{"href":"https:\/\/www.novotek.com\/no\/wp-json\/wp\/v2\/insights\/12125","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.novotek.com\/no\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/www.novotek.com\/no\/wp-json\/wp\/v2\/types\/insights"}],"wp:attachment":[{"href":"https:\/\/www.novotek.com\/no\/wp-json\/wp\/v2\/media?parent=12125"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/www.novotek.com\/no\/wp-json\/wp\/v2\/insight_category?post=12125"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}