Smart phones can be an asset on the plant floor, letting operators look at current plant data and make intelligent decisions. But, should personal devices be checked at the door, and are they a potential risk for cyberattacks?
We know ransomware can wipe out a business—maybe not so much from the cost of paying the ransom, but from the downtime it causes—so don’t get caught without a backup. I asked the experts whether a processor should pay the ransom, and while the responses were mixed, the moral of the story is: Have a backup!
The Department of Homeland Security National Cybersecurity and Communications Integration Center (NCCIC) and the FBI have issued an activity alert to inform all computer network system operators about SamSam ransomware—aka MSIL/Samas.A. This malware has been in circulation for some time and continues to inflict damage to systems.
A newly published standard specifies process requirements for the secure development of products used in industrial automation and control systems (IACS).
Unreported attacks may hide the extent of the challenge
January 10, 2018
Although food and agriculture cyberattacks accounted for only 2 percent of all reported critical infrastructure assessments in fiscal 2016, unreported attacks could change the picture dramatically.
Know when, why and how to apply cloud architectures in your plant and enterprise, keeping in mind that on-site and edge-based servers keep you up and running on a stormy day.
The cloud provides storage space, communications, analytics and much more. But knowing the cloud's limitations in terms of reliability, security and performance—and what your expectations are—will play a major role in how you design and implement a cloud-based IIoT system.