{"id":39405,"date":"2021-04-19T16:03:55","date_gmt":"2021-04-19T08:03:55","guid":{"rendered":"https:\/\/version-2.com\/?p=39405"},"modified":"2021-12-16T15:13:33","modified_gmt":"2021-12-16T07:13:33","slug":"what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/","title":{"rendered":"What are the main cybersecurity vulnerabilities in Industry 4.0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"39405\" class=\"elementor elementor-39405\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png\" alt=\"\" width=\"958\" \/><\/p><p>The digital transformation process brought an increase in the number of connected devices, including industrial devices, in what we call Industry 4.0. Ensuring cybersecurity is essential to keeping any business system up and running. With that in mind,\u00a0<strong>we have brought here the main vulnerabilities of cybersecurity in industry 4.0<\/strong>, which corresponds to the period of technological breakthroughs we are experiencing.<\/p><p>It is no surprise that everyone is connected and so are businesses. However, just as regular users are at risk, business data is also in vulnerable, even dangerous, situations.<\/p><p>\u00a0<\/p><h2>Industry 4.0 and cybersecurity<\/h2><p>\u00a0<\/p><p>With the high volume of data circulating on several servers, malicious attackers and cybercriminals obviously arise. As such, they develop techniques for stealing data that often have financial value involved.<\/p><p>Considering that many companies operate through electronic and automated systems, the risk is high. Even with all the existing security, there are still no 100% secure systems against hackers.<\/p><p>With the increasing number of cyberattacks, it is crucial to guarantee protection against intrusions. In this scenario, cybersecurity arises in order to\u00a0<strong>prevent and protect important data from these attacks<\/strong>.<\/p><p>Mainly marked by the large volume of data, Industry 4.0 simply lacks protection against virtual threats. Therefore, it is important to understand the main vulnerabilities that all technological developments have.<\/p><p>\u00a0<\/p><h2>The dangers of interconnecting systems<\/h2><p>\u00a0<\/p><p>Despite making the automation processes much easier for companies, services such as Cloud need to have increased security. If information was previously separated and organized in different locations, this technology has changed that.<\/p><p>With the interconnection of systems and with increasingly centralized storage, attackers have access to all information at once. If, on the one hand, the system becomes more and more intelligent, on the other hand, the risk becomes increasingly greater.<\/p><p>And that is why several companies invest in security. The hackers behind these attacks are constantly looking for loopholes in these systems. If a company does not keep up to date, it becomes a potential victim.<\/p><p>\u00a0<\/p><h2>The biggest vulnerability in industry 4.0 is the inability to stop<\/h2><p>\u00a0<\/p><p>The technological dependence of industry 4.0 is one of the most striking characteristics of the current period. Having information interrupted or leaked can mean immense monetary losses.<\/p><p>According to data from ITU (International Telecommunication Union), about R$ 80 billion have already been lost in cyberattacks in Brazil. And this figure refers to the period of 2017 and 2018 alone.<\/p><p>Therefore, In 2020 it could not be different. The jump was immense, and according to a report by McAfee, the impact on the economy for these crimes reaches US $ 1 trillion.<\/p><p>In this way, malicious criminals already have greater knowledge about the importance of data. Ransoms for data recovery are increasing and the attempts are becoming increasingly sophisticated.<\/p><p>\u00a0<\/p><h2>The main vulnerabilities in cybersecurity and attacks today<\/h2><p>\u00a0<\/p><p>With the ever-greater connection between data, it becomes much easier for an attacker to gain access to all of them. This is because of malicious software, which can access all centralized information.<\/p><p>The most common attacks, therefore, are:<\/p><ul><li>Through malware: here, apparently harmless software is installed on the computer with the user\u2019s permission. With the virus inserted in the program, the attacker receives access to various data. Also, through this program, the criminal can limit the functions of the machine itself. The data can become inaccessible and be stolen by the attacker.<\/li><li>Through ransomware: this type of attack is much more common in companies. This involves data hijacking, where the attacker can leave the data inaccessible and release it to the user through ransom payments.<\/li><li>Phishing: it is a very recurring attack. In it, hackers can simulate a page identical to that of a bank, for example. Thus, the user is prompted to enter important data such as individual taxpayer ID, account, and others.<\/li><li>ZeroDay: this type of attack is a little more common and occurs in newly launched applications. The criminal seeks, in several ways, to find flaws in applications before they are corrected.<\/li><\/ul><p>Cloud storage and Artificial Intelligence are pillars of industry 4.0. What happens is that a lot of stolen information can easily allow access to much more valuable data.<\/p><p>The interconnection of systems, therefore, generates a lot of concern among cybersecurity experts. On the other hand, information will always be essential to prevent these attacks from being successful.<\/p><p>\u00a0<\/p><h2>How to manage cybersecurity in industry 4.0<\/h2><p>\u00a0<\/p><p>We can consider that many attacks occur by prior permission from users (as is the case with Trojan horses and Phishing). Although it is not the only factor that guarantees security, restricting users can minimize threats.<\/p><p>By limiting the number of people within the company that can access valuable data, the risk of losing them is much less. This is because, in cases of invasion of any of the machines, the main information will be, for the most part, protected.<\/p><p>It is very important that, for the maintenance of cybersecurity, a company pays attention to the following measures:<\/p><ul><li>Greater access controls;<\/li><li>Data encryption; and<\/li><li>Blocking of certain accesses (mainly from anonymous users);<\/li><li>Keep the system updated, always exploring and correcting security flaws;<\/li><li>Scanning for viruses and using an antivirus;<\/li><li>Frequent updating of passwords and privileged users;<\/li><li>Monitoring of security services.<\/li><\/ul><p><strong>The cybersecurity vulnerabilities are directly associated with the lack of maintenance in an organization\u2019s security systems.<\/strong>\u00a0Keeping systems up to date can be a chore, but it is always a must.<\/p><p>Considering the increasingly sophisticated and intelligent cyberattacks that we come across, we need to update ourselves too.<\/p><p>Otherwise, loopholes are exploited by hackers. The result? Even before a company learns about them, they have already been used for the invasion. A reliable security service is therefore essential in industry 4.0.<\/p><p>senhasegura has the shortest deployment time on the market \u2013 just 7 minutes \u2013 and offers much faster protection. Contact us and learn more about how we can help your company against security flaws!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The digital transformation process brought an increase  [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[461,419,61],"tags":[420,462],"class_list":["post-39405","post","type-post","status-publish","format-standard","hentry","category-year2021","category-segura","category-press-release","tag-segura","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the main cybersecurity vulnerabilities in Industry 4.0 - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/zh\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the main cybersecurity vulnerabilities in Industry 4.0 - Version 2\" \/>\n<meta property=\"og:description\" content=\"The digital transformation process brought an increase [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/zh\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-19T08:03:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-16T07:13:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"What are the main cybersecurity vulnerabilities in Industry 4.0\",\"datePublished\":\"2021-04-19T08:03:55+00:00\",\"dateModified\":\"2021-12-16T07:13:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/\"},\"wordCount\":972,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png\",\"keywords\":[\"Segura\",\"2021\"],\"articleSection\":[\"2021\",\"Segura\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/\",\"name\":\"What are the main cybersecurity vulnerabilities in Industry 4.0 - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png\",\"datePublished\":\"2021-04-19T08:03:55+00:00\",\"dateModified\":\"2021-12-16T07:13:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#primaryimage\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png\",\"contentUrl\":\"https:\\\/\\\/senhasegura.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2021\\\/04\\\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are the main cybersecurity vulnerabilities in Industry 4.0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the main cybersecurity vulnerabilities in Industry 4.0 - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/zh\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/","og_locale":"zh_HK","og_type":"article","og_title":"What are the main cybersecurity vulnerabilities in Industry 4.0 - Version 2","og_description":"The digital transformation process brought an increase [&hellip;]","og_url":"https:\/\/version-2.com\/zh\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/","og_site_name":"Version 2","article_published_time":"2021-04-19T08:03:55+00:00","article_modified_time":"2021-12-16T07:13:33+00:00","og_image":[{"url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"What are the main cybersecurity vulnerabilities in Industry 4.0","datePublished":"2021-04-19T08:03:55+00:00","dateModified":"2021-12-16T07:13:33+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/"},"wordCount":972,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png","keywords":["Segura","2021"],"articleSection":["2021","Segura","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/","url":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/","name":"What are the main cybersecurity vulnerabilities in Industry 4.0 - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#primaryimage"},"thumbnailUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png","datePublished":"2021-04-19T08:03:55+00:00","dateModified":"2021-12-16T07:13:33+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#primaryimage","url":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png","contentUrl":"https:\/\/senhasegura.com\/wp-content\/uploads\/2021\/04\/What-are-the-main-cybersecurity-vulnerabilities-in-Industry-4.0-blog-senhasegura.png"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2021\/04\/what-are-the-main-cybersecurity-vulnerabilities-in-industry-4-0\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What are the main cybersecurity vulnerabilities in Industry 4.0"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-afz","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/39405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=39405"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/39405\/revisions"}],"predecessor-version":[{"id":39409,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/39405\/revisions\/39409"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=39405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=39405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=39405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}