A guide to HMI and OT protection

Issue 2 2025 IoT & Automation

In the realm of industrial cybersecurity, understanding potential attack vectors is vital for developing robust defence strategies.

Human machine interfaces (HMIs) in industrial environments are critical for operational oversight, but their web-based nature can make them a target for cyberthreats. Hackers often employ traditional IT reconnaissance and exploitation tactics to compromise web-based HMIs, which can serve as entry points into an organisation’s operational technology (OT) environment.


Andre Froneman.

This process could start with the use of intelligent monitoring software solutions to look for web-based HMIs to exploit leaked virtual private network (VPN) credentials. Having identified the target, the next step involves identifying open ports using a network scanner solution to help discover hosts, services and operating systems on the network.

Using any of the 154 known exploits for virtual network computing, attackers will most likely try and extract the password, moving laterally on the system or, in the worst-case scenario, deploying destructive ransomware. Depending on the network, security and server topology that lie behind the HMI, attackers will use this to pivot to many areas of the network. Advanced attackers will find a quick way to access unmonitored areas like building management systems, CCTV, access control and industrial internet of things (IIOT)/IOT networks so they can enjoy more time undetected in the network.

In real-world scenarios, unauthorised access to SCADA/ICS systems could have severe consequences, including disabling critical systems, manipulating industrial processes and even potential physical damage or danger.

Mitigation strategies for HMI security

Securing HMIs is essential for protecting OT systems and, with a proactive cybersecurity approach, businesses can safeguard their critical infrastructure against evolving cyber threats. Thus, focus should be placed on:

1. Regularly assessing the security of industrial systems. Companies should not be satisfied with IT to OT traversal testing only. Everything, including OT, IIOT, IOT, building management systems, CCTV, access control and programmable logic controllers (PLC) code, should be tested.

2. Putting robust network segmentation into action. Network segmentation according to the IEC 62443 best practices for cybersecurity, or a framework of choice, should be rolled out.

3. Keeping systems updated. Considering operational constraints, organisations should ensure that OT endpoint detection and response, intrusion prevention and intrusion detection systems are verified and kept up to date to safeguard their OT operations using OT-native Zero Trust solutions.

4. Developing incident response plans. Effective response plans must include the restorability of HMIs, PLC code, historian databases, engineering workstations and other ‘IT’ services associated with the production line.

5. Fostering a culture of cybersecurity awareness. People are the first line of defence in any organisation. It is therefore critical that companies foster a culture of cybersecurity awareness within their shop floor workforce, partner ecosystem and OEMs.

6. Testing HMIs in pre-production staging. Using offline security scanning solutions, companies should test HMIs in pre-production staging to create a comprehensive security overview. These vulnerability management solutions are also available as a service and offer third-party security certificates confirming that HMIs are malware, virus and supply chain safe.

7. Implementing OT endpoint protection and remediation software. Deploying purpose-built OT security solutions that provide comprehensive endpoint protection for industrial control systems (ICS) and HMIs. These solutions should include asset discovery and inventory management, vulnerability assessment and management, as well as allow application behaviour, file integrity monitoring and centralised security policy enforcement. The system must provide real-time threat detection and response capabilities alongside OT-specific malware protection that functions without requiring signature updates.

As industrial control systems and connected devices expand, so do the potential vulnerabilities and risks. This makes cybersecurity a priority within this environment. By implementing these layered security strategies, organisations can establish a robust and resilient infrastructure that is well-equipped to adapt to and withstand future cybersecurity challenges.

A proactive, comprehensive approach to cybersecurity – from securing HMIs to fostering awareness and rigorous testing – ensures that critical industrial systems remain protected, safe, and resilient in the face of evolving cyberthreats.

For more information contact Datacentrix at www.datacentrix.co.za




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smart, sustainable, and employee-centric
Facilities & Building Management IoT & Automation
As Westcon-Comstor prepares to move into its new Johannesburg offices, it carefully selected a host of technologies that will help it transform the spaces into an intelligent, connected, and human-centric workspace.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
PKI-IoT market set to reach US$5 billion by 2030
IoT & Automation
With the proliferation of Internet of Things (IoT) devices comes a heightened demand for securing trusted communications between and from those devices and their connected systems. Public Key Infrastructure (PKI) is well-positioned to provide the requisite digital trust mechanisms.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Top five AIoT trends for 2025
Hikvision South Africa IoT & Automation AI & Data Analytics Facilities & Building Management
Hikvision highlights that with technological advances, AIoT (AI-powered Internet of Things) is transforming industries not just by enhancing security, but also by making the world smarter and more efficient.

Read more...
Workforce management automation for Transguard
IoT & Automation Products & Solutions
Invixium and RTLS-connected worker solutions have been selected to supply 400 rugged biometric solution, IXM TITAN, for time tracking at work sites for Transguard Group, a subsidiary of Emirates Group.

Read more...
The IoT trends shaping a smarter, more connected future
IoT & Automation News & Events
The Internet of Things (IoT) is revolutionising sectors across Africa. In 2025, IoT is expected to continue driving digital innovation, enhancing operational efficiencies, and enabling the creation of smarter, more sustainable ecosystems.

Read more...
Avoiding the trap of deepfake scams
AI & Data Analytics IoT & Automation
As cybersecurity technology evolves to block traditional attacks, cybercriminals are increasingly turning to social engineering—manipulative psychological tactics that exploit human trust and emotion—to achieve their goals.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...
Four Steps to protecting your business from the quantum threat
IoT & Automation AI & Data Analytics
While the evolution of quantum computing keeps the world at the forefront of innovation, businesses across the globe are being warned to bolster protection protocols to avoid losses through decryption.

Read more...