by Eugeniusz Wypior | 3 November 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 8 – Validate and alert for paired inputs / outputs If you have paired signals, ensure that both signals are not asserted together. Alarm the operator when input / output states occur that are physically...
by Eugeniusz Wypior | 1 November 2021 | Blog-EN, Newest post
Eugene Wypior Data Privacy, Data Security. Vol. I Data Privacy Privacy, in general terms, is the right to be free from intrusion and interference. In common language, the right to be left alone. In the legal system of a lot of countries privacy is one of the...
by Eugeniusz Wypior | 28 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 7 – Validate timers and counters If timers and counters values are written to the PLC program, they should be validated by the PLC for reasonableness and verify backward counts below zero Security...
by Eugeniusz Wypior | 26 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part VI – Learn from the incident How to prepare for a cyber incident, from response through to recovery Part 6 – Learn from the incident Once the incident has been resolved it is important...
by Eugeniusz Wypior | 21 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 6 – Use cryptographic and / or checksum integrity checks for PLC code Use cryptographic hashes, or checksums if cryptographic hashes are unavailable, to check PLC code integrity and raise an alarm when...