1660317104195 Ct2111coverhero

Cybersecurity from above: A mini-series

Dec. 1, 2021

It's true that cyber-probes, -intrusions and -attacks are always evolving, with new cyber-threats emerging all the time. However, it's also true that the most effective protections and responses are remarkably consistent over the years, and even serve as the foundation for new cybersecurity solutions. Passwords and authentications, segmenting networks with firewalls, and regularly examining data and communications traffic for anomalies already shield process applications against breaches and damage. However, just as mastering classic recipes eventually inspires new innovations, cybersecurity best practices can also lead to new protections and effective responses to new threats.

Cybersecurity from scratch

Learn how Colorado's East Cherry Creek Valley Water and Sanitation District is upgrading the PLCs, RTUs, radios, SCADA system and cybersecurity in its water treatment system with Open Secure Automation (OSA) units from Bedrock Automation. Read more.

Overcoming (human) inertia for cybersecurity

The most crucial cybersecurity task is motivating managers and training staff to follow good cybersecurity practices—even though it remains persistently difficult to accomplish. Maverick Technologies' Bruce Billedeaux and Robert Henderson explain how to motivate individuals and organizations to adopt and practice cybersecurity tools and skills. Read more.

 Simplify cybersecurity with publish-subscribe protocol

Adopting publish-subscribe protocols like MQTT and others not only simplifies networking, it can also streamline cybersecurity. Here's how Michigan-based Waterford Township is upgrading its water/wastewater controls and SCADA system with MQTT publish-subscribe protocol running on Opto 22's groov EPIC controllers. Read more.

Cybersecurity staples bear repeating

Many best practices for cybersecurity may be familiar, but continual reminders are needed to make them effective—and enable new ones to be added later. Here's a rundown of some of the staple cybersecurity best practices. Read more. 

Integrators make cybersecurity approachable

System integrators E Tech and AutomationPlus provide cybersecurity context, encouragement, protection and detection for users in multiple process industries. Here they discuss some best practices they're using. Read more.

Cybersecurity? Just another process control job

Marty Edwards of Tenable calls for thinking of cybersecurity as a process variable to be measured, viewed and controlled. Here's his argument. Read more.

 Straight talk on cybersecurity

Experts from Acquired Data Solutions, Emerson and Rockwell Automation provide practical advice on establishing and maintaining cybersecurity protections. Read more.

About the author: Jim Montague

About the Author

Jim Montague | Executive Editor

Jim Montague is executive editor of Control. 

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...