by Eugeniusz Wypior | 6 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 4 – Leave operational logic in the PLC wherever feasible Leave as much operational logic e.g., totalising or integrating, as possible directly in the PLC. The HMI does not get enough updates to do this...
by Eugeniusz Wypior | 5 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part III – Identify what’s happening How to prepare for a cyber incident, from response through to recovery Part 3 – Identify what’s happening In order to be able to mitigate a...
by Eugeniusz Wypior | 30 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 3 – Track operating modes Keep the PLC in RUN mode. If PLCs are not in RUN mode, there should be an alarm to the operators. Security Objective Target Group Integrity of PLC Logic Integration /...
by Eugeniusz Wypior | 28 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part II – Prepare for incidents How to prepare for a cyber incident, from response through to recovery Part 2 – Prepare for incidents Identify critical assets, systems, and contacts...
by Eugeniusz Wypior | 23 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 2 – Modularise PLC code Split PLC code into modules, using different function blocks (sub-routines). Test modules independently. Security Objective Target Group Integrity of PLC Logic Product Supplier...
by Eugeniusz Wypior | 21 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part I – Introduction Part 1 – Introduction These days most businesses rely on computers and the internet to do business. As they do so they become more and more dependent on the digital...