Introduction to ICS Security – Part 3
For the management teams of organizations with OT environments, the question is not if they can afford to have remote access into their Industrial Control Systems, but rather if they can afford not to.
The operational and cost efficiencies of these types of connections mean they are here to stay. However, remote access connections into ICS have been exploited in several high profile cyber-attacks in recent years, so they also represent an attack vector that security practitioners cannot ignore.
In Part III of our Introduction to ICS Cybersecurity series, we delve into the best practices for securing remote access connections into Industrial Control Systems.
Check it out here!
This series is written by iON’s Field CTO (and certified SANS instructor) Stephen Mathezer and Technical Writer Jordan Coldham, and is produced in partnership with the SANS Institute.
You might also like
iON at the Western Canada Information Security Conference
The Western Canada Information Security Conference is back on May 16-17! This year’s event will once more bring together IT Security and Audit professionals plus OEM and local vendors for two days of top-notch presentations and excellent networking opportunities. The top names in cybersecurity will be well represented at this year’s event, so if you’re…
Password Policy Best Practices
World Password Day is Thursday, May 5, which is a good reminder that strong password policies are crucially important to a sound cybersecurity practice. Password guessing based on publicly available information is one of the most common tactics of malicious actors. Weak passwords also remain a top cause of data breaches for organizations of all…
ICS Malware: Industroyer2 and Pipedream
Last week, two new ICS malware tools were unveiled to the world that have the potential to wreak havoc on North American industrial control systems.Industroyer2Industroyer2 was a major component of a recent, unsuccessful attack on high-voltage electrical substations in Ukraine. This attack was linked to Sandworm, a threat group affiliated with Russia’s GRU military intelligence…