Not long ago your ICS infrastructure was safe from outsiders. No longer. Threats are emerging on various fronts, even insiders with purpose or good intentions gone wrong, the result is the same. Having control of your ICS network is more important than ever
- With Cyber Security being the largest growth market in IT over the next 3 to 5 years, you / your people are going to be bombarded with vendors looking to prove why they should be your security vendor.
- Penetration tests can take you down, and do irreparable harm to your equipment causing substantial downtime & equipment loss.
- Today’s security tools were not developed to be kind to 10, 20, and 30-year-old equipment.
- Many of today’s basic techniques will overwrite firmware of equipment being used to run critical infrastructure & aged manufacturing equipment.
- Good intentions by today’s IT “experts” without ICS experience will cause headaches, downtime, meaningful financial impacts and equipment loss.
- We have worked with and interviewed hundreds of IT services companies over the last 15 years less than 5 had ICS experience.
What Can You Do To Protect Your ICS Infrastructure?
Use a dedicated system (laptop) loaded only with the “tools to do the job” to connect and manage your ICS network. Ensure it has antivirus, antimalware, and its firewall should be running.
Segregate the ICS network. Do not allow any systems that are constantly connected to the internet to be connected to your ICS network.
If you need to actively collect data from your ICS network use a physical firewall with advanced threat detection capabiliites. Allow only certain IP’s, protocols, applications.
Engage with IT / Cyber Security companies that have proven experience working with Industrial Control Systems, and can provide references.