Protect Yourself With Good Cyber Hygiene Practices

Rockwell Cyberhygeine

Sept 4, 2018

Global cyber attacks — like WannaCry and Petya — affected thousands of targets and networks around the world.

Even if you escaped these, attacks targeting an industry, company or country can cause as much damage, whether the goal is to disrupt operations, gain attention or ransom data.

In just the last few years I’ve seen substantial maturing around how food and beverage companies manage cyber risk within their industrial environment.

We’re beginning to see companies not just think about cybersecurity from the perspective of defense in depth, but also starting to adopt capabilities that allow them to address cyber risk across an attack continuum.

They’re doing this by focusing in on the five functions:

  • Identify what they have and the associated risks
  • Put protection mechanisms in place to protect what they have
  • Detect when threats bypass those protection mechanisms
  • Implement capabilities to respond to incidents quickly
  • Develop a system to support rapid recovery

These are the five functions addressed in the NIST cybersecurity framework, and they’re a good place to start to understand what capabilities are needed to implement a base level of cyber hygiene within your industrial control environment.

Decrease your attack surface

Right now I’d say food and beverage companies are getting better at basic cyber hygiene. That approach starts with not just understanding what is connected on your plant floor, but understanding its attack surface.

In other words, what are those assets’ vulnerabilities? Then use that knowledge to address the known vulnerabilities by patching them.

To help minimize your risk, consider a security program focused on four key areas:

1. Maintain an asset inventory with an emphasis on understanding the attack surface or vulnerability

2. Vulnerability, patch and configuration management. Have programs in place to address known vulnerabilities, patch regularly and have mature processes around how configuration changes are made and tracked

3. Employ backup and recovery mechanisms for all critical assets to help ensure you have the ability to quickly pull from a known good backup.

4. Complete regular risk assessments to measure risk and manage it. Use the assessments to show your organization the level of risk they are exposed to and the resources (time, money, people) needed to mitigate it

Successfully implementing these tenets of basic cyber hygiene are the first steps in building an effective cyber security program for your organization and improving your ability to defend against future cyber attacks.

Obsolescence and cyber risk

A key tenet of basic cyber hygiene is the ability to address known vulnerabilities. But in some instances a vendor might no longer support a critical asset. Consider the following questions when evaluating the overall risk of maintaining obsolete hardware or software:

  • What is the impact of someone exploiting this vulnerability?
  • Is there a way to address this vulnerability through the application of an alternative mitigating control?
  • If not, can I justify migrating to a supported platform/solution/product set for this application?

The answers to these questions become the basis for your discussions around mitigation and migration. You can begin budgeting funds to move from basic cyber hygiene to an industrial cyber program that allows you to continually evaluate risk and match funding and resources to keep that risk to a tolerable level.

For all the benefits that smart manufacturing can offer, it also requires a more comprehensive approach to security. Seamless connectivity and smart devices are the catalysts to smart manufacturing — they but can also be a conduit for security threats.

Take these basic steps to help secure your infrastructure, protect assets and maintain network availability.

For more information HERE

https://www.rockwellautomation.com/global/overview.page

Related Articles


Changing Scene

  • CDM2 and Electec Announce Partnership to Enhance Lighting and Electrical Solutions in BC

    CDM2 and Electec Announce Partnership to Enhance Lighting and Electrical Solutions in BC

    CDm2 is excited to announce a new strategic partnership with Electec, a pioneer in innovative wiring and cabling solutions. This collaboration aims to enrich our service offerings, technical expertise, and customer service to clients across various market sectors. Electec, founded in 1978, brings its robust experience in engineered cabling systems that are both sustainable and reliable.… Read More…

  • Wholesale Trade: Early Indicator, March 2024

    Wholesale Trade: Early Indicator, March 2024

    Statistics Canada is providing an advance estimate of sales in the wholesale trade sector for March. The advance results for March indicate that wholesale sales (excluding petroleum, petroleum products, and other hydrocarbons and excluding oilseed and grain) fell 1.3%. The decrease reflects lower sales in the motor vehicle and motor vehicle parts and accessories subsector and… Read More…


Peers & Profiles

  • Taken from Graybar Canada Linkedin Post Enjoy a glimpse of the wonderful moments from Graybar Canada’s recent customer appreciation BBQs! The company was grateful for the smiles and connections made with our amazing customers and vendors. They are looking forward to the next gathering! Source Read More…

  • Article taken from Linkedin Post Electrozad is thrilled to spotlight their Chatham Branch and recognize their exceptional efforts in cleaning up their community. The team took time to coordinate a community clean-up around their branch. This is a commendable initiative that not only helps maintain the cleanliness and hygiene around the branch but also contributes… Read More…