PROTECTING INDUSTRIAL CONTROL SYSTEMS AND SCADA NETWORKS

January 18, 2019

Starting with the Industrial Revolution in 18th-Century Manchester, the manufacturing industry has typically undergone a revolution every hundred years. In an age of ever increasing technological advancement, though, times are changing at a faster pace, as we see the era of controller-based automation gradually replaced by the ‘Smart Factory’, otherwise known as Industry 4.0 or Smart Grid in the Energy market. While this progress aims to streamline manufacturing processes, these changes also bring new cyber risks and threats to Industrial Control Systems (ICS) that are vulnerable from exploits that are now freely available on the Internet. The vulnerabilities vary from basic issues like systems without passwords or with hard-coded passwords to configuration issues, software bugs and hardware vulnerabilities. Once an attacker is able to run software on a host that has access to a controller, the likelihood of a successful attack is very high.

Spotlight

MetaCert

MetaCert protects companies of all sizes from phishing attacks when using mobile email and messaging app. Whether it's a mobile app or an loT device, if it communicates over http, the MetaCert Security API can add a thin but very powerful layer of security to help protect consumers from malicious attacks over the Internet. MetaCert's patent-pending Security API checks the reputation of http requests in real time, warning consumers of potential threats before allowing known malicious web pages (or other resources) from loading inside the app. MetaCert also offers a content-based filtering service for developers that want to block pornography inside their apps.

OTHER WHITEPAPERS
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More
news image

Data Security: The Key to Defeating Ransomware Attacks

whitePaper | May 26, 2022

Ransomware attacks have become increasingly pervasive and pernicious. Many organizations have suffered from at least one ransomware attack, and many ransomware victims have unfortunately been left with no resort other than paying the ransom and hoping to recover their data.

Read More
news image

How to Reduce the Risk of Phishing and Ransomware

whitePaper | March 21, 2021

Cybersecurity challenges abound for organizations across the world. The tsunami of phishing attacks that threaten account compromise, data breaches and malware infection remains a critical threat to neutralize. Ransomware is a second critical threat, with a well-played ransomware attack capable of bringing an organization to a complete halt, and in some cases putting it out of business permanently (e.g., Travelex1 and Vastaamo2.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Global Threat Landscape Report A Semiannual Report by FortiGuard Labs

whitePaper | August 16, 2022

Another half-year through unprecedented times has passed. But as unique as these times may feel, we continue to see familiar exploits, names, and attacks taking up space. To help you and your business feel confident in your ability to protect yourself against the threats that continue to come our way, this report looks back on the cyber threat landscape of the first half of 2022 using our global array of sensors monitored by FortiGuard Labs. Here’s what we learned:

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More

Spotlight

MetaCert

MetaCert protects companies of all sizes from phishing attacks when using mobile email and messaging app. Whether it's a mobile app or an loT device, if it communicates over http, the MetaCert Security API can add a thin but very powerful layer of security to help protect consumers from malicious attacks over the Internet. MetaCert's patent-pending Security API checks the reputation of http requests in real time, warning consumers of potential threats before allowing known malicious web pages (or other resources) from loading inside the app. MetaCert also offers a content-based filtering service for developers that want to block pornography inside their apps.

Events