Introduction to ICS Security – Part 3
For the management teams of organizations with OT environments, the question is not if they can afford to have remote access into their Industrial Control Systems, but rather if they can afford not to.
The operational and cost efficiencies of these types of connections mean they are here to stay. However, remote access connections into ICS have been exploited in several high profile cyber-attacks in recent years, so they also represent an attack vector that security practitioners cannot ignore.
In Part III of our Introduction to ICS Cybersecurity series, we delve into the best practices for securing remote access connections into Industrial Control Systems.
Check it out here!
This series is written by iON’s Field CTO (and certified SANS instructor) Stephen Mathezer and Technical Writer Jordan Coldham, and is produced in partnership with the SANS Institute.
You might also like
The Benefits of Penetration Testing – Putting Your Cybersecurity Practice Through its Paces
For many organizations, conducting penetration tests on their systems is looked on strictly as a means of complying with industry regulations. Others consider pen tests an expensive exercise that provides little value because they don’t perceive themselves as likely targets of cyberattacks or they simply don’t see the need for somebody else to evaluate their…
Helping Where We Can – iON Donates $10,000 to Two Vital Charities This Holiday Season
Community involvement has been an important part of the iON Code since Day One, and in light of the unique difficulties currently facing many Canadians, we are pleased to announce two charity donations we’ll be making in the coming days. First, we will be topping up the $1,500 contribution to Food Banks Canada announced at our annual Customer Appreciation Holiday Party in Calgary to the sum of…
The Perimeter and Beyond – Maximizing ROI in your Next-Gen Firewall
Historically, firewalls have served solely as the core component of an organization’s perimeter defense, providing network layer access control, logging, and network address translation (NAT) to segment networks. Next-gen firewalls (NGFWs), however, can do much more. These devices are very different from the routers you buy for your home and do more than just protect the perimeter. In an effective cybersecurity practice, NGFWs are tightly integrated with other components of your organization’s security stack, providing valuable data outputs that enable greater visibility and…