Cybersecurity continues to be a hot topic for manufacturers – and rightfully so! According to the State of Industrial Cybersecurity 2018 by Kaspersky, “Over three quarters of the companies surveyed state that it is very likely or at least quite likely to become a target of a cybersecurity attack in the operational technology and industrial cybersecurity space. Despite this, only 23% are compliant with minimal mandatory industry or government guidance and regulations around cybersecurity of industrial control systems.”
This is an original article by Kathleen Martin, MEP's IT Security Officer and a Certified Information System Security Professional.
Almost weekly we hear about another company or organization that has fallen victim to a cyber-attack. We know cybercriminals are more persistent and we need to be more diligent about protecting information.
This is an original article by Elliot Forsyth, Vice President of Business Operations at the Michigan Manufacturing Technology Center, part of the MEP National NetworkTM.
Any business owner knows that information is a vital part of running a company. As manufacturing increasingly becomes more digitized, cybersecurity must become a standard component of doing business. If sensitive information—such as employee records, customer transactions or proprietary data—is comprised, it can have a devastating effect.
That’s why more and more manufacturers are taking steps to protect their information via good information security practices.
This is an original article written by Jana White, Cybersecurity Engineer and Trainer with Alpine Security.
What Is a Compliance Audit?
Email is such a seamless part of everyday life that it is easy to take for granted just how vulnerable anyone can be to a well-crafted effort to steal your identity or confidential financial information. One of the most effective methods used by hackers is phishing, which entails trying to trick you into clicking on a link or attachment in an email. Instead of the attachment you thought you were opening, you have inadvertently opened the door to hacking from an outside source, usually without your knowledge.
This is an original article written by Alpine Security.
The number of healthcare cybersecurity breaches is on the rise with tens of millions affected in larger breaches, but hackers may target even regional insurers, smaller healthcare facilities, pharmacies, and individual physician’s offices. These breaches put medical facilities, insurers, and practitioners in the hot seat because they are liable for the security of the information they gather.
This is an original article written by Alpine Security.
Protecting your agency or company from cyber crime is critical to keeping your business running smoothly and profitably in the digital age.
What are two of the most likely areas of vulnerability in your cyber defense strategy?
In a world where information security threats are constantly looming, it is important for companies – and required for manufacturers with Department of Defense contracts – to ensure they are protected and compliant. With the December 31, 2017 deadline for U.S Department of Defense’s cybersecurity compliance behind us, government contractors are required to demonstrate compliance in order to keep their contracts and gain new ones in 2018.
“Manufacturers have a variety of tools available to help pursue comprehensive organizational security, starting with cybersecurity. The first step is to determine one’s existing cybersecurity protections and tools and identify easy gaps to fill. Taking protective steps can decrease the time and resources spent on a security breach.” - John Remsey, Senior Technical Specialist (IMEC)
Whitepaper and executive summary provided by the ISA, a technology and workforce training partner of IMEC.
Effective cybersecurity management is essential for all organizations, regardless of size. There are many standards and guidance documents available to help organizations determine a way forward.
The ISA whitepaper “Industrial Cybersecurity for Small- and Medium-Sized Businesses” is intended to provide a starting point for SMBs, particularly those that manage industrial processes and employ some level of automation. Specific examples include SMBs in the chemical, water, or wastewater treatment sectors.
While it is generally accepted that Operational Technology (OT) system security requires different or additional measures than general-purpose Information Technology (IT) system security, it is also true that smaller companies might have difficulty implementing much of the available guidance.
Written by Cytellix - an IMEC cybersecurity partner
There has been a lot of recent news and discussion about several malware variants that have been defined as ransomware attacks. There are and have been other damaging malware attacks, but ransomware popularity is currently very well publicized.
Ransomware attacks are not simple but are commonplace in the market today. These attacks typically find their way into an organization through social engineering. To be more specific, the malware is embedded in an attachment as an executable. There are several outcomes from ransomware that we have seen thus far: an individual machine is encrypted and the decryption key is held for ransom by the attacker and a currency request of a “Bitcoin” is requested to decrypt the machine in question. The nastier variants can traverse from machine to machine through the network, creating a systemwide infection. This attack causes severe networkwide shutdowns, causing an organization to recover through more significant ransom payments, or if the company was prepared, backup remediation steps are taken.