Your Windows PC may become collateral damage in any conflict with Iran

Credit to Author: Preston Gralla| Date: Thu, 09 Jan 2020 10:18:00 -0800

When Iran launches cyberattacks in revenge for the killing of Major Gen. Qasem Soleimani — which it almost certainly will do — the attack vector, as always, will be Windows. And when that happens, your PC and your business’s PCs will be right in the crosshairs. Here’s why — and how you can protect your machines and your business.

A long history of U.S.-Iranian cyberwarfare

To understand the coming cyberattacks, it’s useful to look back. For more than a decade, the U.S. and Iran have engaged in low-level cyberwarfare, with occasional bursts of higher-level attacks. The most destructive of them was Stuxnet, launched in 2009 by the U.S. and Israel against Iran’s nuclear program. It exploited four zero-day flaws in Windows machines, which controlled the centrifuges Iran used to create nuclear material that can be used in nuclear weapons.

To read this article in full, please click here

Read more

What you need to know about new data-security rules for business travel

Credit to Author: Mike Elgan| Date: Fri, 15 Nov 2019 07:39:00 -0800

From U.S. Customs agents to cybercriminals, everyone wants to copy the data on your phone and laptop. Here’s how to protect your rights and also avoid industrial espionage.

Read more

New ISA Global Cybersecurity Alliance Helps Reduce Threats Through Collaboration

Credit to Author: Nathalie Marcotte| Date: Tue, 08 Oct 2019 19:06:19 +0000

Co-authored by Nathalie Marcotte, Senior Vice President Schneider Electric Industrial Services, and Mary Ramsey, Executive Director, International Society of Automation (ISA) According to Kaspersky Labs, 47% of industrial control systems computers… Read more »

The post New ISA Global Cybersecurity Alliance Helps Reduce Threats Through Collaboration appeared first on Schneider Electric Blog.

Read more

The Familial Relationship Between Cybersecurity and Safety

Credit to Author: Jay Abdallah| Date: Mon, 25 Mar 2019 15:14:09 +0000

For many of us, our older siblings are our earliest mentors.  That’s because they frequently pass – directly or indirectly – their life lessons down to us. We benefit because,… Read more »

The post The Familial Relationship Between Cybersecurity and Safety appeared first on Schneider Electric Blog.

Read more

TIPs to Securely Deploy Industrial Control Systems

Credit to Author: Daniel Desruisseaux| Date: Tue, 18 Sep 2018 19:47:59 +0000

Industrial Control System (ICS) operators recognize the need to improve cybersecurity, but many lack the understanding on how to deploy a system in a secure manner.  Schneider Electric has authored… Read more »

The post TIPs to Securely Deploy Industrial Control Systems appeared first on Schneider Electric Blog.

Read more

Beware of cyber attacks this holiday season!

Credit to Author: Ankita Ashesh| Date: Mon, 17 Sep 2018 12:12:13 +0000

As the calendar enters into September, a celebratory mood envelops the entire subcontinent. With a range of festivals throughout the festive autumn months, this is truly a time of celebration and joy as the entire country comes together. Whether it is Ganesh Chaturthi, Durga Puja, Diwali or Christmas, people everywhere…

Read more

One year after Triton: Building ongoing, industry-wide cyber resilience

Credit to Author: Andrew Kling| Date: Wed, 08 Aug 2018 00:03:12 +0000

Cybersecurity Blog Series:  Part 1 One year ago cybersecurity experts discovered the world’s first known cyberattack on a safety instrumented system. Some called it Triton. Others named it TRISIS. Still… Read more »

The post One year after Triton: Building ongoing, industry-wide cyber resilience appeared first on Schneider Electric Blog.

Read more

Technology isn’t the only weapon for effective cybersecurity

Credit to Author: Jay Abdallah| Date: Mon, 14 May 2018 20:32:27 +0000

Technology can serve as a solid tool to ward off cyber attacks, there is no doubt, but what really comes into play is superior knowledge in recommending the proper devices,… Read more »

The post Technology isn’t the only weapon for effective cybersecurity appeared first on Schneider Electric Blog.

Read more