The story goes that a valve manufacturer wanted to have their networked smart valves certified for use in a nuclear reactor plant. The smart valve could report all sorts of critical data points to a database system and also be controlled by that SCADA system in the plant. But to get it certified for use, the smart valve had to undergo a rigorous security audit by the information technology (IT) department at the plant.
The 32nd annual Control Engineering Engineers’ Choice Awards shined a light on 26 categories of control, instrumentation, and automation products, revealing the best of those introduced in 2018. Winners were voted on by the Control Engineering magazine print and digital audience. As announced earlier this year, Opto 22's groov EPIC was the award winner in the Industrial Internet of Things connectivity category.
Ever notice how emergency exits in a building open outward? Then, to keep the building secure, they are usually locked from the outside. You can get out easily enough, but you can’t get in that way.
However, on a building’s main front entrance, the door often swings in so you can enter. Typically, there is a security guard or perhaps a receptionist there to check your ID and keep an eye on the comings and goings.
Trusted and untrusted: when it comes to people, it can be hard to know someone at first pass. You need some time to build a picture of the person.
When it comes to networking, it’s a little more cut and dried. You either know who’s on a network or you don’t.
Can it really be that simple? Is there really a way on a groov EPIC to keep those you don’t trust away from those you do?
Looking to learn more about IIoT technologies, control systems, and how they work together? It’s time to check out OptoU!
This free online training program provides convenient, on-demand training courses to fit in with your busy schedule. With its “watch and learn” premise, course topics are made up of video and written lessons. The secure sign-in feature lets you return to unfinished lessons and learn at your own pace.
Now you can, on your own schedule.
- Learn how to simplify your automation and IIoT projects.
- See how to improve security and performance, with minimal reliance on IT personnel.
Undoubtedly you’ve heard of the most recent ransomware attack plaguing the globe. It started late last week and so far has infected machines across 150 countries.
As the name suggests, the virus in effect holds the infected computer hostage and demands that the victim pay a ransom in order to regain access to the files on his or her computer. You can learn more about ransomware in this previous blog post.
But let’s get down to what you need to know. Here are the latest facts about WannaCry that you need to be aware of to make sure your systems are not at risk.
As the IIoT continues its widespread adoption, a lot of new IT technologies are quickly being adopted by the industrial automation and process control industries. More and more, industrial assets are becoming Internet enabled and being connected to other digital systems.
One of the technologies that’s enabling the IIoT is secure digital communication. And to establish that secure communication, you need to have an authority you can trust that can validate the indentity of devices on a network and on the Internet. You have to trust that the encrypted connection you're using is actually connected to the device you want to talk to, and not to some rogue node trying to breach your network and steal your information.
That’s where Certificate Authorities come into play in the IIoT.
In a previous blog post we covered what ransomware is and how it’s being used to target industrial users like water and wastewater SCADA systems.
Ransomware is basically when a hacker obtains control of your data, or even your control network and automation systems, and won’t relinquish control back to you until a ransom is paid.
It's a major potential threat against IIoT applications.
When most people think about cyber security, they probably conjure up thoughts of someone locked away in a dark room, wearing the same grey hoodie for months. Staring at a screen for days at a time looking for just the right network packet to tell them where and how to attack. But that's not always how hacking is done.