{"id":10038,"date":"2017-10-23T09:00:20","date_gmt":"2017-10-23T17:00:20","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/23\/news-3811\/"},"modified":"2017-10-23T09:00:20","modified_gmt":"2017-10-23T17:00:20","slug":"news-3811","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/23\/news-3811\/","title":{"rendered":"Reducing Vulnerability to Cyberattacks"},"content":{"rendered":"<p><strong>Credit to Author: Daniel Desruisseaux| Date: Mon, 23 Oct 2017 16:00:14 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-42592 size-large\" src=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/iStock_000019023486_Double-1024x768.jpg\" alt=\"\" width=\"1024\" height=\"768\" srcset=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/iStock_000019023486_Double-1024x768.jpg 1024w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/iStock_000019023486_Double-300x225.jpg 300w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/iStock_000019023486_Double-768x576.jpg 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>The need for secure systems is a growing priority for Industry Control System (ICS) operators.\u00a0 Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and the availability of tools to simplify hacking is making many industrial customers nervous.\u00a0 Recent surveys reveal that 54% of ICS companies have suffered at least one cyber-attack in the last 12 months<sup>1<\/sup>, and 69% of ICS security practitioners feel that the threat to ICS systems is severe\/critical<sup>2<\/sup>.<\/p>\n<p>Schneider Electric has recognized the looming threat and is actively investing to improve ICS security. Schneider Electric has released a document designed to educate end users attempting to secure Industrial Control Systems (ICS).\u00a0 The 126-page document provides practical advice to individuals seeking to secure their ICS.\u00a0 Topics covered include methods of attack, risk assessment, security planning, network segmentation, firewalls, device hardening, system access control, and system monitoring and maintenance.<\/p>\n<p><em>Excerpt:<\/em><\/p>\n<p><em><strong>Why is Security Important in Industrial Controls Today?<\/strong><\/em><\/p>\n<p><em>\u00a0Cybersecurity is no longer a secondary requirement in the industrial controls world. It is as important as safety or high availability. Industrial control systems based on computer technology and industrial-grade networks have been in use for decades. Earlier control system architectures were developed with proprietary technology and were isolated from the outside world. In many cases, physical perimeter security was deemed adequate and cybersecurity was not a primary concern.<\/em><\/p>\n<p style=\"text-align: left\"><em>Today many control systems use open or standardized technologies such as Microsoft Windows operating systems and Ethernet TCP\/IP to reduce costs and improve performance. Many systems also employ direct communications between control and business systems to improve operational efficiency and manage production assets more cost-effectively. \u00a0This technical evolution exposes control systems to vulnerabilities previously thought to affect only office and business computers. Control systems are now vulnerable to cyberattacks from both inside and outside of the industrial control system network.<\/em><\/p>\n<p><em>This technical evolution exposes control systems to vulnerabilities previously thought to affect only office and business computers. Control systems are now vulnerable to cyberattacks from both inside and outside of the industrial control system network.<\/em><\/p>\n<p> <a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cHM6Ly93d3cuc2NobmVpZGVyLWVsZWN0cmljLmNvbS9lbi9kb3dubG9hZC9kb2N1bWVudC9TVE4lMjB2Mi8%3D&#038;feed-stats-url-post-id=42587\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-42588\" src=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/10-23-2017-11-16-36-AM-241x300.jpg\" alt=\"\" width=\"150\" height=\"187\" srcset=\"http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/10-23-2017-11-16-36-AM-241x300.jpg 241w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/10-23-2017-11-16-36-AM-768x957.jpg 768w, http:\/\/blog.schneider-electric.com\/wp-content\/uploads\/2017\/10\/10-23-2017-11-16-36-AM.jpg 815w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a> <\/p>\n<p>Access System Technical Guide\u00a0<a href=\"http:\/\/blog.schneider-electric.com\/?feed-stats-url=aHR0cHM6Ly93d3cuc2NobmVpZGVyLWVsZWN0cmljLmNvbS9lbi9kb3dubG9hZC9kb2N1bWVudC9TVE4lMjB2Mi8%3D&#038;feed-stats-url-post-id=42587\">&#8220;How Can I&#8230;Reduce Vulnerability to Cyberattacks?&#8221;<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><sup>1<\/sup>Kaspersky Labs State of Industrial Cybersecurity Survey, 2017<\/p>\n<p><sup>2<\/sup>Securing Industrial Control Systems, SANS 2017<\/p>\n<p>  <img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blog.schneider-electric.com\/?feed-stats-post-id=42587\" width=\"1\" height=\"1\" style=\"display: none;\" \/><\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/10\/23\/reducing-vulnerability-cyberattacks\/\">Reducing Vulnerability to Cyberattacks<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n<p><a href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/10\/23\/reducing-vulnerability-cyberattacks\/\" target=\"bwo\" >http:\/\/blog.schneider-electric.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Daniel Desruisseaux| Date: Mon, 23 Oct 2017 16:00:14 +0000<\/strong><\/p>\n<p>The need for secure systems is a growing priority for Industry Control System (ICS) operators.\u00a0 Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and&#8230;  <a href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/10\/23\/reducing-vulnerability-cyberattacks\/\" title=\"ReadReducing Vulnerability to Cyberattacks\">Read more &#187;<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\/cyber-security\/2017\/10\/23\/reducing-vulnerability-cyberattacks\/\">Reducing Vulnerability to Cyberattacks<\/a> appeared first on <a rel=\"nofollow\" href=\"http:\/\/blog.schneider-electric.com\">Schneider Electric Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[12389,12388],"tags":[6148,13177,16018,16019,12608,16020,12667,12689,12508,16021],"class_list":["post-10038","post","type-post","status-publish","format-standard","hentry","category-scadaics","category-schneider","tag-automation","tag-cyber-attacks","tag-cyber-defense","tag-cyber-risk","tag-cyber-security","tag-ics-security","tag-industrial-control-systems","tag-industrial-controls","tag-machine-and-process-management","tag-system-technical-guide"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10038","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10038"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10038\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10038"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10038"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10038"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}