Industrial Security
Industrial Ethernet
Data Centers
Broadcast AV
Belden News
Blog Home
Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on July 11, 2017

Petya ransomware surfaced publicly in June 2017, starting first in the Ukraine, rapidly moving to Europe and now into the United States. This global ransomware epidemic will not only encrypt your systems – essentially denying you access to everything it holds – it also “wipes” (overwrites) the hard drive master boot record (MBR) so that it cannot boot up its operating system.

Without a backup, your system is dead and all the data lost. Some researchers believe even if the Bitcoin ransom were paid and keys obtained, they would not work to decrypt and restore your systems.

Read this blog to understand the basics of the Petya ransomware, how to know if your systems are vulnerable, and five security tips to consider as next steps to protect your operations.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on July 05, 2017

If you’re following industrial cyber security trends you know that industrial networks, endpoints and control systems typically have inherent weaknesses that make them insecure and vulnerable to compromise through digital methods.

So, it shouldn’t come as a big surprise to learn that the May 2017 report, Rogue Robots: Testing the Limits of an Industrial Robot’s Security, tells us that industrial robots are insecure too, and for many of the same reasons.

However, what might surprise industrial firms with robotic applications is how much cyber risk exists within their robotic ecosystem. Read more to learn findings and tips – whether or not you have robotics systems in your environment.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on May 03, 2017

Who’s responsible for industrial cyber security in your organization? Whether it’s Information Technology (IT) or a cross-functional ICS operations and process control group – often labeled Operations Technology (OT) – they likely have incompatible approaches to resolving cyber security risk.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on March 29, 2017

What do the movies “Groundhog Day” and “Independence Day” have in common, and what can we learn from them related to cyber defense? Well, if you weren’t able to attend the annual RSA Conference back in February, cyber defense expert Tony Sager explained it all at the Tripwire booth. (In case you missed it, Belden acquired Tripwire in January of 2015.)

Let’s start first with “who is Tony Sager?”

That’s a fair question as many of you may be unfamiliar with Tony’s decades of work in cyber defense with the U.S. National Security Agency (NSA), the SANS Institute, and now as senior vice president and chief evangelist for CIS (formerly the Center for Internet Security).

Googling Tony won’t do his contributions to the field of cyber security justice – nor will this link at CIS on his background. However, in his talk at RSA he masterfully distilled all his years of experience into just a few key points of guidance.

Find out “what matters most” in cyber defense regardless of your industry and why Tony thinks cyber security is a lot more like the movie “Groundhog Day” than “Independence Day.”

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on February 22, 2017

Industrial control systems (ICS) are the workhorses of our physical world, and becoming more internet-connected, more virtualized in many cases, and more remotely accessible by the day.

Security experts worry that the growing dependence on internet-connected devices is outpacing our ability to secure them. This is particularly true within industrial and critical infrastructure because cyber threats could result in physical disruption, loss of availability and even risk to public safety.

On the other hand, many ICS professionals don’t believe there is a genuine risk to plant operations. Unfortunately, that’s not what the data shows.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on December 14, 2016

The holidays are here and warnings of prudent internet security practices abound for home systems, online shoppers and social media participants. Many of us have received workplace guidance for increasing the cyber security and safety of our ICS networks, endpoints and control systems given the ongoing cyber threat landscape.

Though you might not consider yourself particularly savvy regarding internet security, the basics you’ve learned at work may be worth applying at home during this holiday time to improve your family’s cyber safety. This blog addresses a couple of foundational controls that you can use to improve your family’s home security.

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Katherine Brocklehurst on November 30, 2016

In 2016, 5.5 million connected devices are being added per day with an estimate of 20+billion internet-connected “things” running our world by 2020. Many view this future with optimism due to the increased speed, efficiency and innovation this pervasive connectedness will bring to our lifestyles.

Others find it threatening to privacy and confidentiality. Security experts worry that our dependence on connected devices is developing more quickly than our ability to secure them. For our critical infrastructure and industrial businesses, there is real concern. Here’s why…

Read More >>


Comments (0) Post a Comment

Blog Category: Industrial Security

Posted by: Industrial IT Team on November 16, 2016

Here’s your situation - industrial security is a hot topic today and management has decided to assign you the task to take an assessment and come up with a plan to protect the company from… well, they didn’t exactly say.

Perhaps some budget support was provided for this task and perhaps not. Nevertheless, doing nothing is not an option.

Read More >>


Comments (0) Post a Comment

Follow Us

Subscribe
Industrial Security
RSS Feed
Industrial Security
Email Notifications

Search
Industrial Security Blog
All Belden Blogs


Stay Informed