by Eugeniusz Wypior | 8 November 2021 | Blog-EN, Newest post
Eugene Wypior Data Privacy, Data Security, Vol. II Data Security Data security is all the things you do and solutions you implement to protect digital information from unauthorised access, corruption, or theft throughout its entire lifecycle. I am sure the reader is...
by Eugeniusz Wypior | 3 November 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 8 – Validate and alert for paired inputs / outputs If you have paired signals, ensure that both signals are not asserted together. Alarm the operator when input / output states occur that are physically...
by Eugeniusz Wypior | 1 November 2021 | Blog-EN, Newest post
Eugene Wypior Data Privacy, Data Security. Vol. I Data Privacy Privacy, in general terms, is the right to be free from intrusion and interference. In common language, the right to be left alone. In the legal system of a lot of countries privacy is one of the...
by Eugeniusz Wypior | 28 October 2021 | Blog-EN, Newest post
Eugene Wypior The Top 20 Secure PLC Coding Practices. Part 7 – Validate timers and counters If timers and counters values are written to the PLC program, they should be validated by the PLC for reasonableness and verify backward counts below zero Security...
by Eugeniusz Wypior | 26 October 2021 | Blog-EN, Newest post
Eugene Wypior Small Business Cyber Security Response and Recovery. Part VI – Learn from the incident How to prepare for a cyber incident, from response through to recovery Part 6 – Learn from the incident Once the incident has been resolved it is important...