by Józef Sulwiński | 30 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 3 – Track operating modes Keep the PLC in RUN mode. If PLCs are not in RUN mode, there should be an alarm to the operators. Security Objective Target Group Integrity of PLC Logic Integration /...
by Józef Sulwiński | 28 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part II – Prepare for incidents How to prepare for a cyber incident, from response through to recovery Part 2 – Prepare for incidents Identify critical assets, systems, and contacts...
by Józef Sulwiński | 23 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 2 – Modularise PLC code Split PLC code into modules, using different function blocks (sub-routines). Test modules independently. Security Objective Target Group Integrity of PLC Logic Product Supplier...
by Józef Sulwiński | 21 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part I – Introduction Part 1 – Introduction These days most businesses rely on computers and the internet to do business. As they do so they become more and more dependent on the digital...
by Józef Sulwiński | 16 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 1 – Introduction For many years, the workhorses of industrial automation as some call the Programmable Logic Controllers (PLCs) have been insecure by design. Several years into customising and applying...