by Eugeniusz Wypior | 28 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 7 – Validate timers and counters If timers and counters values are written to the PLC program, they should be validated by the PLC for reasonableness and verify backward counts below zero Security...
by Eugeniusz Wypior | 26 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part VI – Learn from the incident How to prepare for a cyber incident, from response through to recovery Part 6 – Learn from the incident Once the incident has been resolved it is important...
by Eugeniusz Wypior | 21 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 6 – Use cryptographic and / or checksum integrity checks for PLC code Use cryptographic hashes, or checksums if cryptographic hashes are unavailable, to check PLC code integrity and raise an alarm when...
by Eugeniusz Wypior | 18 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part V – Report the incident to the wider stakeholders How to prepare for a cyber incident, from response through to recovery Part 5 – Report the incident to the wider stakeholders After...
by Eugeniusz Wypior | 13 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 5 – Use PLC flags as integrity checks Put counters on PLC error flags to capture any math problems Security Objective Target Group Integrity of PLC Logic Product SupplierIntegration /Maintenance Service...
by Eugeniusz Wypior | 11 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part IV – Resolve the incident How to prepare for a cyber incident, from response through to recovery Part 4 – Resolve the incident Once you identified what type of cyber attack you have...