OptoBlog

The time is now - protect your industrial control systems

Posted by Janice Colmer on Mar 23, 2022 7:30:00 AM

A recent briefing from the Biden administration White House reiterates the urgency for today's businesses to take extra cybersecurity cautions.

As current events in our world continue to escalate, the potential for Russia to retaliate against United States sanctions has become a very real threat. President Biden's message this week warned all businesses must act now to protect themselves against cybersecurity attacks.

Read More

Topics: groov EPIC, cybersecurity, EPIC Security

New cybersecurity video en Español

Posted by Norma Rodriguez on Feb 28, 2022 7:30:00 AM

Ver y aprender que significa tener un sistema de control industrial seguro.

Hace tiempo que se sabe que la automatización industrial viene con vulnerabilidades en la tecnología y en práctica. Los PLCs de antes no fueron diseñados para las conexiones de redes LAN no confiables o para el internet. Y la contraseña escrita en una nota ya no es suficiente para la política de seguridad de hoy en día. Así es que, ¿cuál es la solución?

Read More

Topics: groov EPIC, cybersecurity, EPIC Security, Ciberseguridad

How to configure SSL/TLS server certificates on groov devices

Posted by Norma Rodriguez on Oct 20, 2021 10:43:02 AM

Security certificates are critical tools for designing cybersecure automation systems, and they're easier to set up on your groov devices than you might think.

Have you ever seen a warning message from your browser telling you a connection is untrusted and asking if you want to proceed anyway? If you're connecting to groov Manage, then the connection this message refers to is actually your groov EPIC or RIO!

But what if I told you that in a few simple steps you can prove to browsers and other connected systems that network communications to your groov devices are secure, encrypted, and protecting your automation assets?

Read More

Topics: groov EPIC, cybersecurity, EPIC Security

New video: Cybersecurity out of the box

Posted by Janice Colmer on Oct 18, 2021 9:19:34 AM

Watch and learn what it means to have a secure industrial controls system.

Industrial automation has long been known to carry cybersecurity vulnerabilities at the levels of both technology and practice. Legacy PLCs weren’t designed for connections to untrusted LANs or the internet, and the old password-on-a-sticky-note security policy just doesn’t cut it anymore. So, what's the solution?

Read More

Topics: groov EPIC, cybersecurity, EPIC Security

Cómo elevar su estrategia de seguridad para los sistemas de automatización

Posted by Norma Rodriguez on Oct 4, 2021 11:51:35 AM

Las mejores prácticas para el groov EPIC y la ciberseguridad

Habrá oído de ataques informáticos y cómo han afectado a empresas grandes y chicas. Sus sistemas o los de sus clientes trabajan bien, pero habrá más que se puede hacer para proteger esos sistemas? Hay estratégias de seguridad que puede incorporar a sus sistemas existentes.

Read More

Topics: cybersecurity, EPIC Security

Unlocking data from your PLC live at ICC

Posted by Janice Colmer on Sep 27, 2021 8:00:00 AM

The recording of Opto 22's live product demo from the 2021 Ignition Community Conference is now available.

Were you able to attend Inductive Automation's annual Ignition Community Conference (ICC) last week? This two-day virtual event featured developer panel discussions, case studies of real-world Ignition projects, the annual build-a-thon, as well as several exhibitor demo sessions. 

Opto 22's presentation demonstrated the power of Ignition on our groov EPIC and RIO platforms, and the recorded webinar is now available for on-demand viewing.

Read More

Topics: groov EPIC, EPIC Security, Ignition Community Conference, webinar

groov EPIC Security Series, Part 6: Linux Operating System and Repository

Posted by Ben Orchard on Jun 6, 2019 1:12:33 PM

The OS, or operating system, of groov EPIC is very different from traditional controllers. Instead of a proprietary OS, EPIC uses an open-source Linux® operating system.

From a security standpoint, an “open source” OS sounds scary. But in many ways it is more secure than a closed-source one, especially a well-known and often-attacked OS such as Microsoft® Windows®.

Read More

Topics: EPIC, groov EPIC, EPIC Security, Linux, secure shell, ssh

groov EPIC Security Series, Part 5: Encryption and Certificates

Posted by Ben Orchard on May 22, 2019 11:05:13 AM

Go on, admit it. At some point in your life you've written down a password on a piece of paper in clear text. Anybody walking by can simply glance at your note, and they'll know what your password is.

No, you have never done that? Excellent. 

But if you've ever used your web browser to log into a website over the web, and entered sensitive information like your password without encryption, you've effectively transmitted that information through the internet for all to see, almost like writing it on paper and showing it around.

Whoa.

Read More

Topics: Security, IIoT, groov EPIC, cybersecurity, EPIC Security, encryption

groov EPIC Security Series, Part 4: User Accounts

Posted by Ben Orchard on May 10, 2019 3:12:44 PM

In this blog post, let’s take a closer look at user accounts on the groov EPIC system, and how you can improve your system security by giving users and services fine-grained access to applications running on EPIC. In other words, make sure each person or service has only the access they really need and nothing more.

But before we get deep into user accounts, let’s first discuss user account credentials. Take a moment and ask yourself the following questions:

  • Do you use the same password for multiple accounts?
  • Do you use a mix of punctuation and capital letters in your passwords?
  • Do you use long phrases as your passwords?
Read More

Topics: Security, groov View, groov EPIC, groov Manage, cybersecurity, EPIC Security, User Accounts

groov EPIC Security Series Part 3: Device originating communications, or how and why MQTT rocks

Posted by Ben Orchard on Apr 29, 2019 9:15:28 AM

The story goes that a valve manufacturer wanted to have their networked smart valves certified for use in a nuclear reactor plant. The smart valve could report all sorts of critical data points to a database system and also be controlled by that SCADA system in the plant. But to get it certified for use, the smart valve had to undergo a rigorous security audit by the information technology (IT) department at the plant.

Read More

Topics: Security, MQTT, groov EPIC, cybersecurity, firewall, EPIC Security

    Subscribe to Email Updates

    Recent Posts

    Posts by Topic

    see all