Impact of Cyber Terrorism
How to protect your Critical Infrastructure?
Awareness is often lacking in making your key assets safe from a cyber attack. Watching the Web Warriors movie is a good start. You need to develop a vital assets protection plan by implementing redundant FT systems, Monitoring and Training form a key part of the safe system. We recommend implementation of Red Zone system for all your PLC based industrial automation controllers.
Red Zone System
How to Implement a Secure Process Control System?
First
step is to implement a completely isolated network for the PLC's
with Air-Gap. All elements have to be color coded
for separation, implementing a
clean room secure computer system install. All I/O devices will be blocked
and or removed. System
will have intrusion monitoring and locking devices. Network has no
routers or access to internet implementing locked static IP's with
custom addressing scheme through switches & certain key networking parameters
disabled. Please contact us for more
information.
*> ** CYBER TERRORISM? -How it can Impact your Business? Act Now !! - Before it is Too Late !!, Schedule a Anti-Virus Cyber Security Solution Training Today !! **
A lot of emphasis is placed on protecting brick & mortar' the Physical assets of the corporation which are often protected by Insurance. There is still a dedicated staff in a large company putting asset tags on a 5 year old desk or a chair so that one can find out if they are lost or stolen. In a typical hospital the Beds & Ivy drip machines are tracked by RFID tags but patient records get frequently hacked & carried on a thumb drive.
The challenge is how to protect the Digital Assets, 'the intellectual property -important corporate information, your customers personal information these are the real crown jewels of the corporation. By the time you find out that they are stolen, it is too late. This can happen through a in-visible process, at the click of an e-mail or a user visiting a compromised web site innocently. It is unfortunate that not enough emphasis is placed in protecting the Digital Assets of the corporation. You can still find computer passwords under the keyboard or on a sticky note. This awareness needs to happen at the highest level of the corporation by developing policies, compliance procedures and implementing cyber security solution to limit your liability.
Links
- Security Challenge
Four Essential Steps to Meet Security Challenge - Infrastructure Security
How to Protect your Key Infrastructure from Cyber Attack? - Cyber attacks target Smart Phones
-Smart Phone security at work place - Experts say Cyber crime is likely to increase
this year
A WSOC TV Report & FBI comments - Solutions for Retail
Trends - Other Soluions
Video Surveillance, Digital Signage