Sales 01249 446506 | General Enquiries 01249 446500 info@vysiion.co.uk

It was recently reported that the Volt Typhoon group, already responsible for security breaches involving thousands of internet-connected devices – was able to access the US National Grid, where it remained undetected for more than 300 days.

This incident further reinforces that the biggest challenge in securing Critical National Infrastructure (CNI) is protecting and detecting threats within legacy assets – an issue compounded by the long lifespan of OT devices. State-sponsored groups like Volt Typhoon exploit known vulnerabilities, such as weak credentials and unpatched systems, to establish long-term footholds in critical environments.

Yet, across the industry, there remains a deep-rooted reluctance to modify or upgrade critical safety systems simply because they ‘work.’ The fear of operational disruption often outweighs security concerns, slowing progress at a time when the threat landscape is evolving rapidly. While this mindset is beginning to shift, change needs to happen faster.

That said, security standards cannot afford to slip. Regulations such as the new NIS 2 are now driving compliance, forcing organisations to take a more structured approach to securing OT environments. A proactive stance is essential, integrating secure-by-design principles, network segmentation, and OT-specific monitoring to detect stealthy threats before they escalate.

However, all is not lost – legacy systems can still be protected and brought into compliance without the need for a full-scale technology refresh. Targeted security measures, such as passive monitoring, compensating controls, and robust network architecture, can strengthen defences without disrupting operations. The Volt Typhoon campaign is a wake-up call – security must be a fundamental part of an OT system’s lifecycle, not an afterthought.

Putting those security considerations at the heart of our approach to OT system lifecycle management at Vysiion. We have years of experience in the design and deployment of these systems, such that they are secure at the point of implementation and have been promoting (for almost as long) the value of maintaining that security through proactive monitoring and maintenance. Whether we are talking about state-of-the art or legacy environments, we have the tools and capability to provide that protection, and support compliance to industry standards such as NIS 2. This encompasses:

Our 24 / 7 NOC / SOC function providing around the clock monitoring and incident response capability

UTLISING
A toolset developed by industry leaders such as Dragos, focused on identifying and responding to threats specific to the OT world

SUPPORTED BY
Maintenance teams delivering, via a secure remote access platform, proactive mitigation of threats and vulnerabilities that understand the realities of OT operation and work with customers to minimise operational impact

ENHANCED WITH
Field operations teams to provide on-site support and maintenance, where remote access is not feasible

UNDERPINNED BY
An experienced design and delivery function, focused on the OT world, providing design leadership and guidance that recognises the commercial and operational realities that our OT customers operate within

If you’re in any way concerned about the ongoing convergence of IT and OT, the evolving regulatory landscape, or any of the increasingly complex security challenges the CNI sector must consider, don’t hesitate to contact us. Our specialists are already working with OESs across the UK to establish new standards of security and resilience for the infrastructure our critical services depend on and are ready to explore your own challenges in depth, accelerating your organisation’s digital journey.