Managing operational technology security in a changing business environment

Managing operational technology security in a changing business environment

Organizations are seeking to transform their businesses through digitalization, improving work flows and processes, adapting organization culture and changing supply chain relationships.

Although Digitalization can deliver significant value for organizations, it also increases the threat surface which, if not effectively managed, can create significant cyber security risks for industrial environments. In this article, Donal explores the changing business landscape and countermeasures to reduce cyber risk.

Read More

Industrial Cyber Security – Securing Operational Technology 101

Industrial Cyber Security – Securing Operational Technology 101

In the modern connected enterprise where your industrial systems are networked to your business systems (which they almost certainly are) and your business systems are Internet facing (again very likely) then your business systems should be regarded as a potential source of threat to the integrity, safety and security of your control systems. That threat should be properly managed.

Read More

Digital Security & Off-the-Shelf Solutions

Digital Security & Off-the-Shelf Solutions

Like physical security, the investment in digital security is a function of what we are trying to protect and the company's exposure if breached. It is not only a necessity to have a digital security system, but to also be keep abreast of the changes and threats that effect such security systems. Read about how the evolution of technologies put strong pressures on companies and operations, as well as the updates being made to common off-the-shelf digital security solutions.

Read More

Japan's Approach to Cyber-Security: Expectations for Tokyo 2020

Japan's Approach to Cyber-Security: Expectations for Tokyo 2020

The Olympic flag was handed to Prime Minister Abe to conclude the Rio de Janeiro Onlimpic Games. It is time for Japan must fully commit to protect the people of Japan and visitors from cyber-attacks. This article reviews the current regulations and what will be necessary to keep Japan prepared for the 2020 Olympic games, and beyond.

Read More

The Advent of Drones & the threats they bring

The Advent of Drones & the threats they bring

Recently, expert Jeff Melrose spoke at the prestigious security conference Blackhat in Las Vegas, Nevada on the topic of drones that can be bought off-the-shelf and used in cyber crime. Watch a James Bond parody on how drones can be used to implement a cone of silence on both stationary targets and moving targets.

Read More

New Solution Enables Customer to Take Preventive Measures against Cyber-Attacks

New Solution Enables Customer to Take Preventive Measures against Cyber-Attacks

Cybersecurity experts at Yokogawa headquarters provide a fit-for-purpose Network Healthiness Check Service, developed in 2015. The service is meant identify deviations from normal network behaviors so that appropriate preventive measures against attacks could be taken, and improved upon.

Read More

SecureIT - Cyber Security for Plug-ins

SecureIT - Cyber Security for Plug-ins

With web content becoming ever more dynamic, it’s now necessary for even casual users to be aware of Plug-in helper applications, and the vulnerabilities that they create. As the sophistication of hacker groups continues to grow, the dark side to Plug-in use becomes more threatening; as web Browsers inherently trust such Plug-ins, an unguarded backdoor if left open for unintended remote execution of malware. 

Read More

Cyber Doctors: Your Solution to the Common (and uncommon) Cold

Cyber Doctors: Your Solution to the Common (and uncommon) Cold

Just like the human body, even a healthy and well-managed industrial plant is susceptible to catching a cold. When a major plant catches a cold, however, it can effect millions. Read our introduction to a our recent video explaining the parallels in the importance on monitoring and maintaining a healthy facility.

Read More

How-To: Create Passwords that are Complex & Easy-to-Remember

How-To: Create Passwords that are Complex & Easy-to-Remember

It can be daunting to come up with and remember multiple passwords to meet the demands of complex password filters of the several e-businesses and social sites that we use everyday. But now using an easy to remember method you too can create complex passwords with the best security professionals. Learn from Jeff Melrose in our second article in our SecureIT series. 

Read More

SecureIT - Basic Cyber Defense

SecureIT - Basic Cyber Defense

The first article in a new security series: 'SecureIT.'  In this article, Jeff Melrose explains the various threats, key points, and simple tips in mitigating up to 85% of cyber intrusions. Learn about why it is necessary for all PC and mobile users to perform regular security administration functions, at the very least. 

Read More