{"id":13781,"date":"2021-06-17T19:08:16","date_gmt":"2021-06-17T19:08:16","guid":{"rendered":"https:\/\/www.bbinsurance.com\/?post_type=insight&amp;p=10205"},"modified":"2021-06-17T19:08:16","modified_gmt":"2021-06-17T19:08:16","slug":"cyber-white-paper-operational-technology-the-new-it-risk","status":"publish","type":"insight","link":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/","title":{"rendered":"Cyber White Paper \u2013 Operational Technology: The New IT Risk"},"content":{"rendered":"<p>Cyber White Paper \u2013 Operational Technology: The New IT Risk<\/p>\n<p>The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack. While much of the focus has been on the interruption of computer systems, which affects all industries, there has been an increasing number of attacks targeting manufacturers and their underlying Operational Technology (OT) systems.<\/p>\n<p>The recent attack on Colonial Pipeline resulting in the pipeline being taken offline is just the latest example. While the Colonial ransomware incident did not directly affect its OT systems, they were forced to be taken offline out of an abundance of caution, disrupting gas supply all along the East coast.<\/p>\n<p><a href=\"https:\/\/www.bbinsurance.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Cyber-White-Paper-Operational-Technology-The-New-IT-Risk.pdf\">Download the white paper<\/a> to find out how you help protect your business from these types of attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.<\/p>\n","protected":false},"author":30,"featured_media":18702,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"insight_category":[132,133],"class_list":["post-13781","insight","type-insight","status-publish","has-post-thumbnail","hentry","insight_category-in-the-media","insight_category-thought-leadership"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber White Paper \u2013 Operational Technology: The New IT Risk - Brown &amp; Brown<\/title>\n<meta name=\"description\" content=\"The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber White Paper \u2013 Operational Technology: The New IT Risk\" \/>\n<meta property=\"og:description\" content=\"The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Brown &amp; Brown\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1425\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/\",\"url\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/\",\"name\":\"Cyber White Paper \u2013 Operational Technology: The New IT Risk - Brown &amp; Brown\",\"isPartOf\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg\",\"datePublished\":\"2021-06-17T19:08:16+00:00\",\"description\":\"The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#breadcrumb\"},\"inLanguage\":\"us\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#primaryimage\",\"url\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg\",\"contentUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg\",\"width\":1425,\"height\":836,\"caption\":\"lock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bbrown.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\/\/www.bbrown.com\/us\/news-events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber White Paper \u2013 Operational Technology: The New IT Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#website\",\"url\":\"https:\/\/www.bbrown.com\/us\/\",\"name\":\"Brown &amp; Brown\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bbrown.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"us\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#organization\",\"name\":\"Brown &amp; Brown\",\"url\":\"https:\/\/www.bbrown.com\/us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png\",\"contentUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png\",\"width\":1000,\"height\":136,\"caption\":\"Brown &amp; Brown\"},\"image\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber White Paper \u2013 Operational Technology: The New IT Risk - Brown &amp; Brown","description":"The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/","og_locale":"en_US","og_type":"article","og_title":"Cyber White Paper \u2013 Operational Technology: The New IT Risk","og_description":"The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.","og_url":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/","og_site_name":"Brown &amp; Brown","og_image":[{"width":1425,"height":836,"url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/","url":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/","name":"Cyber White Paper \u2013 Operational Technology: The New IT Risk - Brown &amp; Brown","isPartOf":{"@id":"https:\/\/www.bbrown.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg","datePublished":"2021-06-17T19:08:16+00:00","description":"The rise of ransomware has organizations rapidly committing resources to protect IT networks in the event of a cyber-attack.","breadcrumb":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#breadcrumb"},"inLanguage":"us","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/"]}]},{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#primaryimage","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/06\/Brown-Brown-Insurance_CyberOT_WebsiteGraphic.jpg","width":1425,"height":836,"caption":"lock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-white-paper-operational-technology-the-new-it-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bbrown.com\/us\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.bbrown.com\/us\/news-events\/"},{"@type":"ListItem","position":3,"name":"Cyber White Paper \u2013 Operational Technology: The New IT Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.bbrown.com\/us\/#website","url":"https:\/\/www.bbrown.com\/us\/","name":"Brown &amp; Brown","description":"","publisher":{"@id":"https:\/\/www.bbrown.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bbrown.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"us"},{"@type":"Organization","@id":"https:\/\/www.bbrown.com\/us\/#organization","name":"Brown &amp; Brown","url":"https:\/\/www.bbrown.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","width":1000,"height":136,"caption":"Brown &amp; Brown"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/13781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/types\/insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/users\/30"}],"version-history":[{"count":0,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/13781\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media\/18702"}],"wp:attachment":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media?parent=13781"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight_category?post=13781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}