Now you can, on your own schedule.
- Learn how to simplify your automation and IIoT projects.
- See how to improve security and performance, with minimal reliance on IT personnel.
Undoubtedly you’ve heard of the most recent ransomware attack plaguing the globe. It started late last week and so far has infected machines across 150 countries.
As the name suggests, the virus in effect holds the infected computer hostage and demands that the victim pay a ransom in order to regain access to the files on his or her computer. You can learn more about ransomware in this previous blog post.
But let’s get down to what you need to know. Here are the latest facts about WannaCry that you need to be aware of to make sure your systems are not at risk.
As the IIoT continues its widespread adoption, a lot of new IT technologies are quickly being adopted by the industrial automation and process control industries. More and more, industrial assets are becoming Internet enabled and being connected to other digital systems.
One of the technologies that’s enabling the IIoT is secure digital communication. And to establish that secure communication, you need to have an authority you can trust that can validate the indentity of devices on a network and on the Internet. You have to trust that the encrypted connection you're using is actually connected to the device you want to talk to, and not to some rogue node trying to breach your network and steal your information.
That’s where Certificate Authorities come into play in the IIoT.
In a previous blog post we covered what ransomware is and how it’s being used to target industrial users like water and wastewater SCADA systems.
Ransomware is basically when a hacker obtains control of your data, or even your control network and automation systems, and won’t relinquish control back to you until a ransom is paid.
It's a major potential threat against IIoT applications.
When most people think about cyber security, they probably conjure up thoughts of someone locked away in a dark room, wearing the same grey hoodie for months. Staring at a screen for days at a time looking for just the right network packet to tell them where and how to attack. But that's not always how hacking is done.
Most people relate the term blockchain to an Internet currency or peer-to-peer payment system called Bitcoin.
But there’s way more value to blockchain technology than just a payment system.
And it just might help us solve a lot of problems related to industrial cyber security, particularly in Industrial Internet of Things applications.
Attention industrial engineers: If you're not thinking about how secure that new wiz-bang-flashy PLC or PAC is before you purchase it, you're setting yourself up for a world of pain down the road.
Industrial control systems are used across a wide range of industries, from manufacturing and fabrication, to electricity generation and transmission, to oil refining and water treatment—all industries where a network security compromise could mean huge losses of capital for the business.
Recently we’re seeing many of these traditionally proprietary control systems—distributed control systems, PLCs, and SCADA applications—adding new, more open technologies like Ethernet and TCP/IP. And with organizations' increasing interest in the business advantages of obtaining system data, industrial control systems are now being connected to information technology (IT) networks.
And security issues and recommendations are constantly changing, as the bad guys try to hack in and the good guys try to keep them out.
Here are a couple of new blog posts on this important subject, both by Opto 22's Matt Newton, who has years of experience in both automation and IT (information technology).
In a previous blog post I wrote about the Internet of Things getting hacked. As the IIoT ramps up and we continue to connect more devices to networks, we increase our industrial assets' exposure to cyber attacks. And we all need to start thinking about cyber security first, not as an afterthought.
It's everyone's responsibility to plan for cyber security, starting when you first evaluate industrial assets for purchase.
Here are five checklist items to think about before connecting any industrial device to a network. No, this is not an exhaustive list, but frankly I don't want take up that much of your time. (You're welcome!) This is good starting point, though.
Now imagine what needs to be done to update a 30-year-old EDC.