Drives and Control Solutions

Motors, Control Solutions, Power Transmission and Advanced Motion Technology                                                                 

July 9, 2020

By Quade Nettles, Product Manager for Cybersecurity Services, Rockwell Automation

It’s a constant battle and the stakes are high. The fight against cyber threats is unending and the landscape is constantly changing. It can be hard to know if your industrial security strategy is enough, but one thing is certain. Failure to be ready comes at a high price and the threats continue to grow.

No one is surprised that cybercrime is increasing. Unfortunately, it pays to be a cyber-criminal – and it’s only getting worse. In the last two years, there was roughly $11.7 billion dollars in damages due to ransomware attacks, and at least 53% of industrial manufacturers have experienced a cybersecurity breach in their facility.

Industrial companies are particularly attractive targets for cyber criminals for a variety of reasons. First, many of these companies are working with legacy unpatched infrastructure and a lack of skilled resources to properly manage cyber risk. Adversaries know these environments have many vulnerabilities and, if attacked, would suffer significant consequences. So, given the seriousness of the situation, why do companies allow themselves to be in this position? The challenges are very real for many organizations, and it can be hard to have a complete security strategy without addressing them.

Challenges Facing Industrial Infrastructure

  •   -  Vulnerability – For many companies, security is simply an afterthought. Without proper policies and procedures in place, it’s very difficult to maintain a secure environment. A critical first step is to develop and enforce proper cybersecurity standards - and make sure you have buy-in from upper management. Keep track of evolving industrial security standards. Things change quickly and staying current will help you deal with aging industrial control systems and protocols.
  •   -  Skills gap – It’s no secret that there is a serious skills gap. The loss of qualified personnel through retirement puts many companies at a disadvantage. Having well-trained employees who understand and adhere to policies helps you address cybersecurity issues - and makes employees more productive.
  •   -  Inflexibility – If your company has low adoption of risk management processes, you need to find ways to get everyone on board. You may also have issues integrating new technologies or finding the right tools to manage your infrastructure, and sometimes there’s just too much data that lacks actionable information.

A second common source of vulnerability involves industrial automation environments that are poorly inventoried. If you don’t know what is connected in the environment, you can’t secure it. This important point can be addressed by enhancing your company’s Operations Technology (OT) visibility. It’s critical to know what assets you have and what their attack surfaces are. Not having answers to the following questions regarding your assets, may make your company more vulnerable to attack:

  •   -  Location - Where is the asset physically located? What is the operational purpose of the asset?
  •   -  Device – What is the type of device and who is the vendor? Record the model, serial number, firmware version, IP address, the operating system and Media Access Control (MAC)
  •   -  Applications – What apps are installed and what versions of the apps are running? What is the context of the device’s configuration?
  •   -  Communication - Neighbors, Protocols, Conversations, Frequency. What devices communicate with each other and what are those interdependencies? How often do these devices communicate? Do these devices only communicate within your internal network or do they communicate with the internet?

This is a big project and you may not be in a position to do this all without some outside help. Consider the value of working with a vendor who can help you perform an Installed Base Evaluation™ that identifies all your OT automation assets. This is a good way to identify internal risks caused by antiquated equipment and legacy devices. And, by working with a trustworthy, experienced partner with domain expertise in the OT environment, you can be confident that you have engaged people who understand the complexities with securing the OT environment.  

There are also other steps that can be taken to improve your industrial security strategy – if you do them well.

Next Generation Firewalls

Of course, a properly hardened and configured firewall is a key component of robust cyber security. Keeping cybercriminals out is, after all, one of your primary goals. But not all firewalls are the same or provide the same level of protection. So how do you know if your firewall is good enough? It probably isn’t if you’re not using a next generation firewall that offers features like:

  •   -  Intrusion prevention and detection
  •   -  Application visibility and control
  •   -  Analytics and automation
  •   -  Malware protection
  •   -  Network profiling
  •   -  URL filtering

While you’re working hard to keep the hackers out, you probably still want to be able to provide secure remote access for the people who need it. Employees, suppliers and third-party technicians are among the people who may need to access company resources. In addition to complex and frequently changed passwords, logging and recording every action allows audits and investigations in case of an information security incident. When you have sufficient remote access policies and procedures, they will:

  •   -  Eliminate direct interactions between remote users and network assets and enforce a single access pathway
  •   -  Define and enforce remote diagnostics and maintenance operations conducted via locally installed applications
  •   -  Monitor, record and observe user activity in real time and terminate the session as needed

If your remote access system can’t do these things, it’s time to upgrade.

Threat Detection

Despite your efforts, there may come a time when your company is the victim of an actual cyberattack. If that happens, you want to be in a position to detect the threat as quickly as possible and respond in an effective manner. If you’re not sure of your company’s ability to quickly detect a threat, consider partnering with a company that can provide:

  •   -  Initial baseline of network traffic and data flows
  •   -  Real-time alerting on deviations
  •   -  Deep packet inspection for industrial protocols
  •   -  Multi-site visibility
  •   -  Functionality that is complimentary to IT tools
  •   -  Incident response planning
  •   -  Remote access session management and administration
  •   -  Remote support services

Recognizing that an attack has been made is key to addressing it quickly and minimizing its impact.

Clearly, there’s a lot to consider when developing and implementing your organization’s cyber security strategy, and you might not be ready to take on something this substantial without help. Having the right policies, people, and technology in place can be a huge undertaking. Fortunately, outside services are available to help you fully manage and secure your network. Services like an IDMZ design and implementation, or 24x7x365 threat detection and response are cybersecurity services aimed at assisting companies in improving their cybersecurity posture and providing customers with cybersecurity domain expertise to remediate cyber threats and with other related issues.

Many companies discover that having an outside source of highly trained cybersecurity engineers to help them keep up with the latest cyber threats, technologies and risks allows them to focus on what they do best - innovating within their application space.*

With hacktivists, nation states, terrorists, cybercriminals and even insiders all potentially trying to disrupt your operations, you simply can’t afford to be unprepared. The topics mentioned here are just some of the issues you’ll want to consider when evaluating your industrial security strategy. If you recognize a weakness in one of these areas, you may have others as well. Since having a robust industrial security strategy could mean the difference between being up and running and having production come to a screeching halt, you don’t want to take any chances. If your company is one of many that simply isn’t positioned to handle the complexity of cybersecurity on its own, consider getting outside assistance. To help protect your operations against security threats – and be confident that your strategy really is enough - look into Rockwell Automation industrial security services.

Source


Editor's Pick: Featured Article


DCS Put to the Ultimate Test Part 1 Torsion Tests by HELUKABEL 1 400x275

Cables and wires in industrial robots and other moving machine parts are often required to withstand extreme stresses caused by torsion. Constant repetitive movements put materials under considerable strain. At the same time, operators expect components to function perfectly and reliably throughout their entire service life to avoid disruptions, outages and safety hazards.

For this reason, at HELUKABEL, we simulate intensive and continuous torsion stresses under realistic conditions with our high-tech testing equipment in Windsbach. We have several types of apparatus for doing this because some of our customers, for example those in the automotive industry, have very precise specifications for how a torsion test is carried out. The tests show that our cables and wires withstand speeds up to 1,000°/s, accelerations up to 2,000°/s² and torsion angles up to 720°. Hence, we make sure that each product always meets our customers’ high standards, and that they receive the impeccable quality they rightly expect from us as a leading supplier of cables, wires and accessories for more than 40 years.

What Is Torsion?

 

To learn the answer, click here 

 


Sponsored Content


30 Minute Live Webinar 2:30 PM ET January 19th, 2023

DCS Siemens Sponsored Content 30 Minute Live Webinar January19 2023 300x250

 

 

With PC-based automation, you can implement applications and solutions that far exceed the functions of a classic controller. SIMATIC PC-based products offer you a flexible, innovative platform with long-term availability that give you a home field advantage when meeting the challenges of the digital factory for your machines and plants.

  

Register now

 


 


DCS Festo Didactic at the Forefront of Developing Canadas Future Workforce 1 400x275

With Canadian manufacturing suffering from a growing labour shortage, the participation of industry in skills development is emerging as a vital component in hiring and retention.

The needs are stark: The Canadian Exporters and Manufacturers Association says almost 40% of its members have jobs they can’t fill. Five years from now, 60% expect to be short-staffed, especially when it comes to skilled trades. Statistics Canada forecasts the country’s labour force growth rate will remain below 0.2% for the rest of the decade, below replacement levels.

This growing shortage is affecting companies of all sizes. Already, some manufacturers acknowledge losing out on contracts because they can’t find the manpower to fulfill them.

In reality, the challenge is two-fold: to replenish and expand the workforce to help close the gap between the number of job seekers and vacancies through 2030 when the last baby boomers reach age 65, and ensure workers get opportunities throughout their careers to upgrade or add to their skillset as current technologies evolve and new ones emerge. Festo, through Festo Didactic, one of the world leading provider of equipment and solutions for technical education, intends to help Canada meet this challenge on both fronts. In essence, the approach Festo has always taken is that the learning never stops.

 

Read more here


 

Product News

  • Prev
  When working with industrial pumping, such as crop irrigation or wastewater ...
  Littelfuse, Inc. has announced the new C&K Switches NanoT product line, a series ...
  VFD cables are a critical component to extend a motor’s life cycle within a VFD ...
  AutomationDirect has added new models of Dold safety relays to their line of safety ...
  AutomationDirect has added more low-cost ProSense float level switches. The new ...
  AutomationDirect has added new cable entry system options to their Murrplastik ...
   Emerson recently introduced the ASCO™ Series 209 proportional flow control ...
  Omron Automation Americas will introduce two new AOI systems at IPC Apex 2023 in San ...
  Teledyne FLIR Integrated Imaging Solutions is pleased to announce the all new ...
  ABB’s Sensi+ analyzer offers a reliable new solution which simplifies and reduces the ...

New Product

DCS New Emerson Valves Deliver Proportional Flow Control Performance 1 400x275

Emerson recently introduced the ASCO™ Series 209 proportional flow control valves, which offer the highest standards of precision, pressure ratings, flow characteristics and energy efficiency available in a purpose-built, compact architecture. With this combination of size and performance, Series 209 valves allow users to precisely regulate the flow of fluid in a wide range of devices that require exacting performance, like those found in the medical equipment, food and beverage, and heating, ventilation and air conditioning (HVAC) industries. 

Accuracy, response time and repeatability are critical in high-precision flow control applications, such as controlling tool speed in dental chairs, the flow of steam in coffee makers, water flow in cooling systems and hydrogen flow in fuel cells. Series 209 valves have low hysteresis (less than or equal to 5%), excellent repeatability (less than or equal to 1%) and high sensitivity (less than or equal to 0.2%) that contribute to their precision. 


To find out more, click here


 


Featured Product

DCS Teledyne Announces New Ladybug6 Cameras for High Accuracy 1 400x275 

Teledyne FLIR Integrated Imaging Solutions is pleased to announce the all new Ladybug6— the latest addition to its field proven Ladybug series. Ladybug6 is the leading high-resolution camera designed to capture 360-degree spherical images from moving platforms in all-weather conditions. Its industrial grade design and out-of-the-box factory calibration produces 72 Megapixel (MP) images with pixel values that are spatially accurate within +/- 2 mm at 10-meter distance.

“The new Teledyne Ladybug6 is designed for mobile mapping and all-weather inspection projects requiring excellent image quality and high resolution,” said Mike Lee, Senior Product Manager at Teledyne FLIR. “With the addition of Ladybug6, we are now pleased to offer a wider variety of spherical cameras with higher resolutions ranging from 30 MP to 72 MP.”

 

To learn more, click here


 

Latest News

  • Prev
  The Ontario government has concluded a successful trade mission to South Korea and ...
  ABB and Hydrogen Optimized Inc. (HOI), the Canadian technology innovator unlocking ...
  World leaders from government and industry will meet in the southern Denmark city of ...
  The ABB #BuildtheFuture Roadshow delivers the latest electrical products, services, ...
  Global industry is accelerating its investment in energy efficiency in the next five ...
  In March 2022, the new edition of the installation standard IEC 61918:2018/AMD1:2022 ...
  On this episode of the Allied Expert Advice podcast, Carlos Riano, Senior Offer ...
  Advanced Micro Controls Inc. (AMCI) has realized growth throughout the Midwest United ...
  Ballard Power Systems recently announced that the company has launched a three-year ...
  Discover the difference a Gutor-backed setup can have on your business and ...

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2025 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil