It's true that cyber-probes, -intrusions and -attacks are always evolving, with new cyber-threats emerging all the time. However, it's also true that the most effective protections and responses are remarkably consistent over the years, and even serve as the foundation for new cybersecurity solutions. Passwords and authentications, segmenting networks with firewalls, and regularly examining data and communications traffic for anomalies already shield process applications against breaches and damage. However, just as mastering classic recipes eventually inspires new innovations, cybersecurity best practices can also lead to new protections and effective responses to new threats.
Cybersecurity from scratch
Learn how Colorado's East Cherry Creek Valley Water and Sanitation District is upgrading the PLCs, RTUs, radios, SCADA system and cybersecurity in its water treatment system with Open Secure Automation (OSA) units from Bedrock Automation. Read more.
Overcoming (human) inertia for cybersecurity
The most crucial cybersecurity task is motivating managers and training staff to follow good cybersecurity practices—even though it remains persistently difficult to accomplish. Maverick Technologies' Bruce Billedeaux and Robert Henderson explain how to motivate individuals and organizations to adopt and practice cybersecurity tools and skills. Read more.
Simplify cybersecurity with publish-subscribe protocol
Adopting publish-subscribe protocols like MQTT and others not only simplifies networking, it can also streamline cybersecurity. Here's how Michigan-based Waterford Township is upgrading its water/wastewater controls and SCADA system with MQTT publish-subscribe protocol running on Opto 22's groov EPIC controllers. Read more.
Cybersecurity staples bear repeating
Many best practices for cybersecurity may be familiar, but continual reminders are needed to make them effective—and enable new ones to be added later. Here's a rundown of some of the staple cybersecurity best practices. Read more.
Integrators make cybersecurity approachable
System integrators E Tech and AutomationPlus provide cybersecurity context, encouragement, protection and detection for users in multiple process industries. Here they discuss some best practices they're using. Read more.
Cybersecurity? Just another process control job
Marty Edwards of Tenable calls for thinking of cybersecurity as a process variable to be measured, viewed and controlled. Here's his argument. Read more.
Straight talk on cybersecurity
Experts from Acquired Data Solutions, Emerson and Rockwell Automation provide practical advice on establishing and maintaining cybersecurity protections. Read more.