by Eugeniusz Wypior | 18 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part V – Report the incident to the wider stakeholders How to prepare for a cyber incident, from response through to recovery Part 5 – Report the incident to the wider stakeholders After...
by Eugeniusz Wypior | 13 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 5 – Use PLC flags as integrity checks Put counters on PLC error flags to capture any math problems Security Objective Target Group Integrity of PLC Logic Product SupplierIntegration /Maintenance Service...
by Eugeniusz Wypior | 11 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part IV – Resolve the incident How to prepare for a cyber incident, from response through to recovery Part 4 – Resolve the incident Once you identified what type of cyber attack you have...
by Eugeniusz Wypior | 6 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 4 – Leave operational logic in the PLC wherever feasible Leave as much operational logic e.g., totalising or integrating, as possible directly in the PLC. The HMI does not get enough updates to do this...
by Eugeniusz Wypior | 5 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part III – Identify what’s happening How to prepare for a cyber incident, from response through to recovery Part 3 – Identify what’s happening In order to be able to mitigate a...