Technology companies are employing AI/ML techniques to deter nefarious actors, but users still need to exercise common sense in defending their industrial control systems.
Cybersecurity may seem only for enterprise systems and critical infrastructure, but at the control system level there are too many gaps in the food and beverage industry.
Once a hacker connects via RDP to any computing system, unless operators take immediate action, the hacker can use this connection to log in at any time in the future, extort money, install ransomware on the computer, and/or sell the connection login/password and other data on the dark web, making an unprotected system available to anyone who wants to purchase the information.
The cryptography working group within the Internet Engineering Task Force (IETF) standards organization has chosen the Endress+Hauser-developed CPace protocol as a recommended method for use in internet standards.
Keeping ransomware out of your IT and OT systems depends on a well informed staff that plans ahead plus the proper network and cybersecurity tools to avert a disaster
A cyberattack not only creates costly downtime but also can destroy IP, cause food safety issues and just be plain expensive—whether or not you pay the ransom
Sometimes all you need is a knowledgeable system integrator or machine builder who’s “been there—done that,” when it comes to securing networks from cyberattacks
No doubt a ransomware or malware attack can shut down enterprise business systems, but cybersecurity attacks can do a lot more damage on manufacturing systems
Of late, several companies have taken hits on their worldwide IT and Web based systems. Perhaps the most recent, Canon, suffered a global ransomware attack, taking down many Canon websites and systems - also with a threat of making their private business data public. But can these IT/enterprise attacks threaten and/or damage OT systems? And what can they do to food and beverage products? Make them unsafe by altering a critical kill step or omitting preservatives? What else? I asked Barak Pereleman, VP of OT Security at Tenable, what attack vectors may pose danger to OT-based systems.
If you haven’t become serious about backups, it’s time to do so now—before a key system goes down and puts you out of business while you try to recover.