Check out the 12 days of cybersecurity mini-series!
Though every user, application and organization should be well-aware of their primary cybersecurity tasks, they always bear repeating to get them fully instilled into an effective cybersecurity routine. They include but aren't limited to:
-
Switch on passwords, enable other user and device authentications including two-factor when available, and enable basic anti-malware software.
-
Isolate sensor, instrument, equipment, production and other operations technology (OT) networks from administrative, enterprise, corporate, Internet and other information technology (IT) networks with multiple managed Ethernet switches used as firewalls.
-
Divide plant-floor operations into networks and sub-networks based on priority functions, criticality and safety with added firewalls.
-
Establish publish-subscribe capabilities such as MQTT protocol and data diode that allow production to transmit data upwards, but don't allow incoming communications or software downloads.
-
Collaborate with OT and IT to evaluate and select logical software patching policies.
-
Educate, test, drill and retrain employees to follow security procedures, so they become habit and part of organization's culture.
-
Implement continuous and routine network network traffic evaluation using IT-based software that can find, separate, reject and mitigate non-baseline communications, activities, probes and intrusions.