Are you struggling to get your systems on the network with your IT department? Here are some insights on designing a cybersecure controls system that an IT department will know and trust.
The simple action of picking up your cell (mobile) phone and making a call belies the enormous amount of work that goes on behind the scenes to get the protocols and encryption standards approved—so that each phone can connect to the cellular network securely.
If we homemade our own cell phones, it's understandable that the network provider would (and should) quickly become “the department of no,” not allowing us to connect to their network. Many things could go wrong, and they would soon be on the hook for any issues our device might cause.
It really is no different from when we show up at the factory with an Ethernet-enabled PLC and ask our IT department to connect it to the factory network.
They don’t know anything about the PLC! And they have lots of questions...