Cyber Security

Internet, Internet Everywhere!

Over the past few years the ‘Internet of Things’ has been a pretty hot topic. It has many names, and is considered by some to be the Next Industrial Revolution…. Read more »

Leave a comment

Cyber Security Return on Investment

In today’s business environment, implementation of a cyber security program is a necessity. Many people correlate cyber security with an insurance policy, which is incorrect. Implementing a cyber security program… Read more »

Leave a comment

Beware the Disgruntled Employee: How to Protect Your BMS from the Threats Within

This is the third in a series of posts on the topic of building management system (BMS) security. BMSs today are growing more intelligent all the time, with devices connected… Read more »

Leave a comment

Is Mass Behavior the Best Evolutionary Response to Improve Data Center Security?

In a recent editorial, Peter Judge, the global editor of DatacenterDynamics, posed the question can management quell the embedded threat. The story led from an observation made by Ed Ansett… Read more »

Leave a comment

Top Reasons to Consider Mobility in your Industrial Operation

In recent years, dramatic changes in the global manufacturing plant landscape have compelled organizations to respond to a new set of challenges, including: An increasing number of casual users requiring… Read more »

Leave a comment

Secure Your BMS: Follow These Password Best Practices

In my last post I explained why, as building management systems (BMSs) become more intelligent and connected, it’s incumbent on facilities managers to ensure they are properly secured. Because the… Read more »

2 Comments

Choking on Data

Ever hear the phrase “Choking on data, starving for information?” I credit my exposure to this phrase during a meeting I had with my new Vice President as a fresh-out-of-college… Read more »

Leave a comment

Why You Need to Apply Network Security Best Practices to Your BMS

As building management systems (BMSs) become more intelligent, collecting information from hundreds if not thousands of devices distributed throughout a building or campus, they are also becoming more susceptible to… Read more »

Leave a comment

3 SCADA considerations to optimize your industrial operation

Today’s business climate is putting plants under intense financial pressure, and operations and maintenance budgets are among the first to be cut. Fewer personnel are expected to operate and maintain… Read more »

4 Comments

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Why the End of XP Support Makes Secure Power Even More Important

In April 2014, Microsoft stopped issuing security patches for its XP operating system. While the move had been announced two years previously, many corporate operations – including building management and… Read more »

Leave a comment

Regulatory compliance drives – and complicates – government rack access strategies

Regulatory compliance remains the most common top priority for federal IT decision makers when it comes to securing equipment racks in data centers. Almost always part of an overall physical… Read more »

Leave a comment

Challenges of Data Consolidation Part I: Ensuring Network Connectivity

The fire hose of data has been turned on, and there’s no end in sight to the hydrant sourcing the spray. Our lives and our jobs are now dictated by… Read more »

1 Comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

Enabling Business Through Safety, Security

Editor and Founder Gregory Hale has over 30 years in the publishing industry covering manufacturing automation for 10 years as the Chief Editor of InTech magazine. Prior to starting atInTech in 1999, Hale… Read more »

Leave a comment

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Monitoring Your Networks

Today’s complex network systems have become the foundation of business.  A network’s reliability and performance are essential.  With so many interrelated devices and applications running simultaneously, system event diagnosis can… Read more »

2 Comments

Securing Power and Control: Solutions

As stated in my previous post, the threat of cyber-attacks on power and control systems is growing.  One factor is the wider proliferation of attack tools and techniques.  Aging power… Read more »

Leave a comment

How to Provide Physical Security for Your Most Critical Resources

In mission-critical facilities, it’s obviously important to keep unauthorized individuals out, but it’s also important that authorized employees don’t venture where they don’t belong. The reason? That’s how bad things… Read more »

Leave a comment

Protecting Healthcare Data: Facilities New Role In Cyber Security

In December 2013, 40 million Target customers were affected by one of the largest breaches in retail history. In December 2015, Target agreed to pay $39 million to banks as… Read more »

Leave a comment

Bringing Innovation to Every Level of the Oil & Gas Sector

As I explained in my previous blog Revolutionizing the Oil & Gas industry with the IIoT, IIoT is having a noticeable impact on all Oil & Gas processes. By utilizing… Read more »

Leave a comment

Cyber attack – a clear and present danger

As cyber attacks become more high profile and more prevalent, cybersecurity is an increasing concern for industrial automation and control system users and vendors. Cyber attacks happen for any number… Read more »

Leave a comment

Who Owns the Risk?

Some time ago, my colleague Joseph Reele wrote of the risk implications of various data centre choices that might be made. In that article Reele identified a (possibly simplistic) trade-off… Read more »

Leave a comment

Security; The Key to Successful IIoT Deployments

The Industrial Internet of Things (IIoT) has been a hot topic of late.  One key consideration that will impact its acceptance rate and ultimate success is security.   A successful attack… Read more »

Leave a comment

Regulatory compliance drives – and complicates – government rack access strategies

Regulatory compliance remains the most common top priority for federal IT decision makers when it comes to securing equipment racks in data centers. Almost always part of an overall physical… Read more »

Leave a comment

Enabling Business Through Safety, Security

Editor and Founder Gregory Hale has over 30 years in the publishing industry covering manufacturing automation for 10 years as the Chief Editor of InTech magazine. Prior to starting atInTech in 1999, Hale… Read more »

Leave a comment

Beware the Disgruntled Employee: How to Protect Your BMS from the Threats Within

This is the third in a series of posts on the topic of building management system (BMS) security. BMSs today are growing more intelligent all the time, with devices connected… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

Keeping the Holes Plugged

One of our team’s most common quotes is “Cyber security is so much more than firewalls and anti-virus software.” All successful security solutions are part of an overall program that… Read more »

Leave a comment