Can you afford the cost of insecure systems?

Can you afford the cost of insecure systems?

Pexels/Canva Studio

Demilitarised zones can keep data safe while securing systems from expensive attacks, says Xavier Mesrobian of Skkynet Cloud Systems

Guest contributor |


Insecure systems cost far too much. The average loss from a successful data breach on a corporate system is in the millions of dollars. Even small business losses are typically in the hundreds of thousands, which is enough to shut many companies down.

On top of this, cyberattacks on enterprises of all sizes are also on the rise – more than half of the businesses in industrialised nations are compromised each year.

So how can organisations secure their systems to keep data safe? 

1. Invest in prevention

Considering the risks, it is wise to invest in prevention. Most successful corporate hacks are targeted at office systems. So, if you are allowing connections from IT to operations, you need to ensure that the production system is not compromised by an attack on IT. Cybersecurity experts, industry leaders and government agencies all agree that the most secure way to connect IT and operations is to segregate networks using a demilitarised zone (DMZ).

2. Isolate production

A DMZ isolates the production system from IT, ensuring there is no direct link between corporate networks and control networks. Only known and authenticated actors can enter the system. Firewalls are needed to protect both operations and IT sides and should be configured to allow only outbound connections to the DMZ. This ensures that only the correct data passes between networks.

3. Tunnel and mirror the data

To make a secure, robust connection across a DMZ and enable real-time bidirectional communication, Skkynet recommends secure tunnel/mirroring. Well-designed tunnel/mirror middleware can mirror data securely across a DMZ in real time to clients running in IT or the cloud. There is no need for virtual private networks, and all inbound firewall ports can stay closed.

Access to operations data is becoming essential in today’s competitive environment. But there is no reason such access cannot be secure. Segregating networks using a DMZ is the recommended approach, and this is best implemented with secure tunnel/mirroring.

Find out how Skkynet’s DataHub middleware can keep industrial data safe on the Skkynet website.

Xavier Mesrobian is vice president of sales and marketing at Skkynet Cloud Systems

This article was originally published in the Spring 2023 issue of Technology Record. To get future issues delivered directly to your inbox, sign up for a free subscription

Subscribe to the Technology Record newsletter


  • ©2024 Tudor Rose. All Rights Reserved. Technology Record is published by Tudor Rose with the support and guidance of Microsoft.