by Eugeniusz Wypior | 16 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 1 – Introduction For many years, the workhorses of industrial automation as some call the Programmable Logic Controllers (PLCs) have been insecure by design. Several years into customising and applying...
by Eugeniusz Wypior | 14 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part VI – Avoiding phishing attacks. Part 6 – Avoiding phishing attacks A phishing attack is a social engineering tool combined with technology.The most common type is an email that is sent...
by Eugeniusz Wypior | 9 September 2021 | Blog-EN, Newest post
Eugene Wypior Proactive Approach to Incident Response. Part 4 – Practicing your Incident Response plan The last three articles covered the topics of an efficient and effective Incident Response plan, the importance of cross-training your IT / OT teams and the...
by Eugeniusz Wypior | 7 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part V – Using passwords to protect your data. Part 5 – Using passwords to protect your data Passwords are an important step in keeping your and your customers’ information safe and when used...
by Eugeniusz Wypior | 2 September 2021 | Blog-EN, Newest post
Eugene Wypior Proactive Approach to Incident Response. Part 3 – Establishing OT Security Baseline In previous articles, we covered the importance of an IR plan and cross-training of your IT and OT teams. Today we will focus on Establishing OT Security Baseline...
by Eugeniusz Wypior | 31 August 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Resilience Improvement Guide. Part IV – Keeping your mobile devices safe. Part 4 – Keeping your mobile devices safe Here are five tips to help you keep your smartphones and tablets safe: Enable PIN or password protection...