Voices: Bonfante

How Vulnerable Is Your Safety?

Is Anyone Doing Anything to Protect Your Cybersecurity? You Betcha! The First Line of Defense Better Be You

By Katherine Bonfante

Back in the day, children were able to play outside for hours without telling their parents exactly where they would be, with whom and what games would be played. You were able to leave your car or house windows and doors open or unlocked, and nothing would be stolen. Chances were pretty high that if you lost your wallet, someone would return it with the money intact.

Today, safety is a different deal. You can't walk down the street without worrying about your bank account funds and credit card information being stolen through RFID technology. You can't even drop your ID or let anyone know what your email or Facebook password is because within seconds your identity will be stolen.

So, is anyone doing anything to protect your cybersecurity? You betcha! The first line of defense better be you. You're only as secure as you want to be and are willing to make the effort to be. It can be a daunting task, but help is out there. Many automation leaders are strengthening their industrial networks' security to protect their proprietary data and processes from hackers.

Also Read: Reader Feedback: Cybersecurity Risk

Our cybersecurity expert, Joe Weiss, covers this subject. In his "Unfettered" blog, he gives us insights into what automation professionals are doing—and not doing—about their cybersecurity. Joe is worth following.

"Aurora and Its Effectives on Cybersecurity" is a blog entry Weiss wrote in September, in which he discusses the merits of the test and the many conjectures concerning its validity. Read this blog entry at www.controlglobal.com/aurora-effectives to learn more.

Andrew Ginter, director of industrial security at Waterfall Security Solutions, wrote the article, "13 Ways Through a Firewall: What You Don't Know Can Hurt You." Make sure you haven't missed one of these back doors into your systems. Read the article at www.controlglobal.com/cybersecurity-can-hurt-you, and find a link to all 13 ways to breach a firewall.

Lastly, the U.S. National Institute of Standards and Technology (NIST) released the Cybersecurity Framework draft in October. Tofino's Ernie Hayden provides some background on how this document came to be, and explains what it could mean to you as a control system or security professional. Read the article, "Improving Critical Infrastructure Cybersecurity," at www.controlglobal.com/critical-cybersecurity to learn more.

You can find more insightful articles on cybersecurity by doing a search on our site. Get informed and be ready to defend your safety in cyber space.

More from this voice

Title

April 2008 Web Highlights

What’s New This Month on ControlGlobal.com

03/31/2008

Are You Watching Us?

ControlGlobal Re-Defines Web Approach Moving Multimedia Resources to Center Stage

10/06/2008

Be Sustainable or Be Doomed

We Have Made Major Contributions to the Death of Planet Earth. We Need to Change Our Way of Living and Be a Lot More Sustainable

12/03/2012

Browsing ControlGlobal.com Can Be Fun-and Funny!

Comics, Videos and Podcasts. Reading the News Is Entertaining Too!

07/09/2009

Calling All Future Engineers

Engineers Always Come Up with Inventions We Love. 2010 Is a Promising Year for Future Engineers

01/08/2010

CG’s Local Heroes

Normal Everyday Professionals are Also Stars. Our Process Automation Writers Have Fans Following Each and Every Word They Type

09/05/2008

Christmas at the Plant-Floor Level

The iPad and Other Mobile Devices Will Become Part of Your Everyday Tools to Get Your Job Done

12/02/2011

Control Room Designs Revolutionize Work Environments

See How Control Rooms Were Originally Designed and How Differently They Are Designed Today

04/15/2013

Convenience Is Just a Click Away

You Want to Read Our Articles as Soon as They Get Posted on Our Website. This Is Why We Give You the Opportunity to Sign Up for Our RSS Feeds

08/01/2011

Cyber-Living. Are We Safe Enough?

We Think That the Security Settings We Put In Place Online Are Safe Enough, But the Reality Is That We All Are Vulnerable to Cyber Attacks

04/01/2013

Do Not Be Afraid

We Don't Fear Technology Taking Over Our Jobs, We Fear Having to Use New Technology at the Workplace

11/03/2009

Don't Blink Twice. You Might Miss It.

Finding Control's Magazine Exclusive Articles Has Never Been So Easy

05/04/2008

Every Day Changes

Looking at Three Technologies That Have Matured In Recent years—Distributed Control Systems (DCSs), Control Software and Process Analyzers

12/12/2008

Extreme Makeover, ControlGlobal.com Edition

ControlGlobal.com Revamps the Homepage. We’ve Dumped Our Pre-Web 2.0 Look

08/05/2008

First Annual Valuable Digital Content (VDC) Awards

The VDCs Honor Our Editors and Contributors, for Covering the Process Automation Industry by Gathering Information, Analyzing Data and Presenting the Findings in News Form. See Who the Winers Are

12/11/2009

Foreseeing the Future of Process Automation Technologies

Control Editors Make Prognostications on the Future of Automation Technologies. We Have These on Video

07/01/2008

Gasoline and Technology— Two Things We Can’t Live Without

Technology, Like Gasoline, Is Something We Don’t Know How to Live Without Any Longer

06/12/2008

Get to Know Our Site. Here's a Cheat Sheet

As Your Senior Digital Editor, Katherine Bonfante Knows this Website Inside and Out. Here Are Some Secret Passages to Getting to the Hidden Corners of this Site

08/01/2013

Hidden Treasures

OPC Connection Channel, Our Well-Guarded Online Treasure

02/06/2009

Hot Stuff on the Web

You Have Decided What Our Web Trends Are. Check Them Out

01/10/2011