by Eugeniusz Wypior | 30 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 3 – Track operating modes Keep the PLC in RUN mode. If PLCs are not in RUN mode, there should be an alarm to the operators. Security Objective Target Group Integrity of PLC Logic Integration /...
by Eugeniusz Wypior | 28 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part II – Prepare for incidents How to prepare for a cyber incident, from response through to recovery Part 2 – Prepare for incidents Identify critical assets, systems, and contacts...
by Eugeniusz Wypior | 23 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 2 – Modularise PLC code Split PLC code into modules, using different function blocks (sub-routines). Test modules independently. Security Objective Target Group Integrity of PLC Logic Product Supplier...
by Eugeniusz Wypior | 21 September 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part I – Introduction Part 1 – Introduction These days most businesses rely on computers and the internet to do business. As they do so they become more and more dependent on the digital...
by Eugeniusz Wypior | 16 September 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 1 – Introduction For many years, the workhorses of industrial automation as some call the Programmable Logic Controllers (PLCs) have been insecure by design. Several years into customising and applying...