Voices: Bonfante

How Vulnerable Is Your Safety?

Is Anyone Doing Anything to Protect Your Cybersecurity? You Betcha! The First Line of Defense Better Be You

By Katherine Bonfante

Back in the day, children were able to play outside for hours without telling their parents exactly where they would be, with whom and what games would be played. You were able to leave your car or house windows and doors open or unlocked, and nothing would be stolen. Chances were pretty high that if you lost your wallet, someone would return it with the money intact.

Today, safety is a different deal. You can't walk down the street without worrying about your bank account funds and credit card information being stolen through RFID technology. You can't even drop your ID or let anyone know what your email or Facebook password is because within seconds your identity will be stolen.

So, is anyone doing anything to protect your cybersecurity? You betcha! The first line of defense better be you. You're only as secure as you want to be and are willing to make the effort to be. It can be a daunting task, but help is out there. Many automation leaders are strengthening their industrial networks' security to protect their proprietary data and processes from hackers.

Also Read: Reader Feedback: Cybersecurity Risk

Our cybersecurity expert, Joe Weiss, covers this subject. In his "Unfettered" blog, he gives us insights into what automation professionals are doing—and not doing—about their cybersecurity. Joe is worth following.

"Aurora and Its Effectives on Cybersecurity" is a blog entry Weiss wrote in September, in which he discusses the merits of the test and the many conjectures concerning its validity. Read this blog entry at www.controlglobal.com/aurora-effectives to learn more.

Andrew Ginter, director of industrial security at Waterfall Security Solutions, wrote the article, "13 Ways Through a Firewall: What You Don't Know Can Hurt You." Make sure you haven't missed one of these back doors into your systems. Read the article at www.controlglobal.com/cybersecurity-can-hurt-you, and find a link to all 13 ways to breach a firewall.

Lastly, the U.S. National Institute of Standards and Technology (NIST) released the Cybersecurity Framework draft in October. Tofino's Ernie Hayden provides some background on how this document came to be, and explains what it could mean to you as a control system or security professional. Read the article, "Improving Critical Infrastructure Cybersecurity," at www.controlglobal.com/critical-cybersecurity to learn more.

You can find more insightful articles on cybersecurity by doing a search on our site. Get informed and be ready to defend your safety in cyber space.

More from this voice

Title

Understand the Function of Safety Instrumented Systems

SIF, SIS, SIL, SRS, SLC? What Does All This Mean?

02/22/2013

Safety Shutdown: How to Avoid the Cost of Separate Valves

Is It Allowable to Use the Control Valve as a Safety Shutdown System?

02/26/2013

Manage PLC Programs and Meet FDA Requirements

PLC or DCS Programs Are Not Submitted to the FDA, but They Do Require Validation to Ensure Proper Functionality

03/04/2013

Trending Developments in Flowmeter Technologies

Looking Back at Trends Among the Top 10 Flowmeter Technologies

03/15/2013

Power Can Make or Break Your Plant's Bottom Line

Find Out How and Why You should Monitor Your Plant's Power. It Could Make the Difference in Keeping You In Business

03/19/2013

Model Predictive Control Wins Over Professional Football

Would You Put Aside a Professional Football Career and Join the Automation Industry Instead? Charlie Cutler Did. Find Out Why

03/25/2013

How Can You Measure Viscosity With Coriolis Flowmeters?

What Is Coriolis Force, Who Discovered It and How Is Viscosity Defined?

03/31/2013

Cyber-Living. Are We Safe Enough?

We Think That the Security Settings We Put In Place Online Are Safe Enough, But the Reality Is That We All Are Vulnerable to Cyber Attacks

04/01/2013

Control Room Designs Revolutionize Work Environments

See How Control Rooms Were Originally Designed and How Differently They Are Designed Today

04/15/2013

Get to Know Our Site. Here's a Cheat Sheet

As Your Senior Digital Editor, Katherine Bonfante Knows this Website Inside and Out. Here Are Some Secret Passages to Getting to the Hidden Corners of this Site

08/01/2013

How Vulnerable Is Your Safety?

Is Anyone Doing Anything to Protect Your Cybersecurity? You Betcha! The First Line of Defense Better Be You

12/09/2013