Click the link below to view the summary of cyber security
vulnerabilities for the week of December 23 as collected and reported
by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-364
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Monday, December 30, 2013
Thursday, December 26, 2013
Cyber Security: Effective Backups
Gary Kneeland, consultant for Invensys Critical Infrastructure &
Security Practice, offers tips for effective backups.
Minimize Downtime Through Effective Backups
Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on computer systems that have been configured to work in their specific environment. Because of these configuration differences, replacing one of these systems in the event of a failure is not as simple as buying a new one off the shelf. Reproducing a configuration of a system without good backups can take huge amounts of time, and also introduce errors into the system that were not originally there. In some cases, the time lost while these systems are being replaced can shut down a production line or power plant for extended periods of time, costing companies millions of dollars. All of these reasons and more are why effective backups are important for any computer system in an industrial environment.Keep it simple
The first requirement for effective backups is to make them as simple as possible to execute. If the backup procedure for a system requires a technician to go to the machine, plug in a laptop, and manually execute a backup that takes 4 hours to complete, this not only wastes time, but could lead to human errors while performing the backup activities. There are many software suites available now that will automatically perform backups of other systems, either locally or to network drives, and are highly customizable in how these backups are performed. Using one of these software suites to automate the backup process can make them easier and more reliable.Determine the frequency and types of backups to occur
The second requirement for effective backups is to identify what frequency backups need to occur at and what types of backups need to occur. To evaluate how often backups need to occur, you must first know how often changes are occurring on a system. A controller for an emergency fire protection system may not be used often, and backups every month or every quarter is sufficient; however, for a payroll system that is being changed on a daily basis, incremental backups every day would be more appropriate. Determining the frequency of backups will assure that backups are current and usable, but keep resource usage at a minimum and keep costs down.Store backup files offsite
The third requirement for effective backups is to have offsite storage locations for the backup files. If a company has up-to-date backups, but they are all in the same building as the servers when a flood or fire occurs, they are of no use. Because most backup software solutions allow network backups, consider other locations on the company’s WAN that can house the backups more safely. Storing backups at a corporate location that is offsite from your industrial complex can save a company when large scale disasters strike, such as flood and fire.Use a test system to ensure smooth recovery
Finally, once a company has backups created for their systems, they must test that they can actually recover from these backups. Using a test system to attempt and recover from these backups can ensure that when the time comes to use system backups, it goes smoothly. Creating and testing a disaster recovery plan can help make recovery as smooth and painless as possible, and with the help of good backups, can prevent extended downtime to a company’s critical infrastructure.Tuesday, December 24, 2013
Cyber Security: Hackers make covert networks with sound
Hackers and spies have a slew of ways to pull data from your computer, but not if it's disconnected from the Internet. Click here to read the article.
Monday, December 23, 2013
Cyber Security: No Christmas fun for IT as they admit to losing the cyber-warfare battle
RedSeal Networks , the leader in network infrastructure security
management, announced the results of a survey that was conducted
amongst 350 IT professionals from a range of companies across the United
Kingdom. Click here to read the article.
Thursday, December 19, 2013
Cyber Security: Cyber attack dodges sandbox to hit Adobe Reader, Windows XP
A technical analysis shows that a cyber-attack currently hitting systems
in the wild is using two separate vulnerabilities to break out of the
Adobe sandbox to infect Windows systems. Click here to read the article.
Wednesday, December 18, 2013
Cyber Security: Data stolen from 104,000 energy employees was more sensitive than first thought
Hackers that breached an Energy Department personnel database in July
got away with more sensitive data than first disclosed by the
government, including some banking information and password security
questions of the 104,179 individuals affected, according to internal
investigators. Click here for the article.
Tuesday, December 17, 2013
Cyber Security: Bogus antivirus program uses a dozen stolen signing certificates
A fake antivirus program is using at least a dozen stolen code-signing
certificates, indicating hackers are regularly breaching the networks of
developers. Click here to read the article.
Monday, December 16, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of December 9
Click the link below to view the summary of cyber security
vulnerabilities for the week of December 9 as collected and reported
by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-350
http://www.us-cert.gov/ncas/bulletins/SB13-350
Thursday, December 12, 2013
Cyber Security: Hackers steal 2M passwords to Facebook, Twitter, others
Online media reports indicate hackers have stolen usernames and
passwords for nearly two million accounts on popular email and social
media websites. Click here to read the article.
Wednesday, December 11, 2013
Cyber Security: Group charged in PayPal cyber attack pleads guilty
A group of 13 defendants who had been charged in a cyber attack on
PayPal's website pleaded guilty and admitted to the December 2010 attack
over PayPal's suspension of WikiLeaks accounts. Click here to read the article.
Tuesday, December 10, 2013
Cyber Security: State tax refund debit card data exposed to hackers
The latest issue is personal information of around 6,000 Louisiana taxpayers and another 7,000 or so in Connecticut. Click here to read more.
Monday, December 9, 2013
Cyber Security: The Global Cyber Advisor Newsletter - Nov. 2013 Vol. 26
Welcome to the latest Global Cyber Advisor Newsletter.
Continuously
Secure: Invensys continues to prove to the industry that
we stay vigilant and help our customers develop their Cyber Strategies and
secure their process environments. We have staff
to help our clients on a global basis to assess, design, implement and manage
their Cyber posture. Invensys has developed suites of
products with complementary consulting, which are unmatched in the
industry.
This month’s Consultant’s Corner is from Stephen Santee
where he discusses approaches to Cyber Security programs.
The Invensys Critical Infrastructure and Security Practice
has the skills and the resources to help our clients no matter what
industry. We are structured to help with their entire Cyber Security program. We
have essentially the industry’s largest vendor-based Cyber Security team that
assists our clients secure their entire process environment.
We understand that Cyber Security extends beyond a single system and our valued
clients need assistance and advice in how to secure their entire plant
infrastructure. Cyber security is so much more than firewalls and
anti-virus software.
If you’ve missed our previous editions, you can find them at this location: http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx
Click here to open the November 2013 newsletter.
Cyber Security: ICS-CERT Vulnerability Summary for Week of December 2
Click the link below to view the summary of cyber security
vulnerabilities for the week of December 2 as collected and reported
by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-343
http://www.us-cert.gov/ncas/bulletins/SB13-343
Thursday, December 5, 2013
Cyber Security: Tech giants are countering government spying
Google, Facebook, Microsoft and Twitter are engaged in a costly tech arms race, with their businesses and cultures at stake. Not against one another, mind you, but a common foe: the National Security Agency. Click here to read the article.
Wednesday, December 4, 2013
Cyber Security: Smart TVs, security cams now on hackers' radar: Symantec says
Besides PCs and mobile phones, internet-connected devices like smart TVs, routers and security cameras are also now vulnerable to attacks from cyber criminals, security software provider Symantec says. Click here to read the article.
Tuesday, December 3, 2013
Cyber Security: Energy industry is target for cyber attacks
Last year the hacker group Anonymous broke into computer systems of oil
companies including Shell, Exxon Mobil and BP as a protest against
Arctic drilling. Click here to read the article.
Monday, December 2, 2013
Cyber Security: Top ten Cyber Monday tips for staying safe when shopping online
Cyber Monday—the Monday after Thanksgiving—has officially replaced Black Friday—the day after Thanksgiving—as the most popular day to shop for the holidays.
Shopping online means avoiding the crowds, but it also opens the buyer up to attacks from scammers and hackers. In order to fight these online grinches, the Better Business Bureau of Southern Arizona recommends 10 tips for staying safe when holiday shopping online.
Click here to read the article.
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 25
Click the link below to view the summary of cyber security vulnerabilities for the week of November 25 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-336
http://www.us-cert.gov/ncas/bulletins/SB13-336
Wednesday, November 27, 2013
Cyber Security: DDoS threats: The disruption your organization can’t afford to ignore
The threat of a distributed denial of service attack has to be taken
seriously, but what that threat is masking might be the real cause for
alarm. Click here for the article.
Tuesday, November 26, 2013
Cyber Security: NSA infects 50,000 computer networks worldwide with malware
The U.S. National Security Agency hacked more than 50,000 computer
networks worldwide last year, infecting them with malware used to
conduct sophisticated spy operations, according to a top-secret slide
leaked by Edward Snowden. Click here to read the article.
Monday, November 25, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 18
Click the link below to view the summary of cyber security
vulnerabilities for the week of November 18 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-329
http://www.us-cert.gov/ncas/bulletins/SB13-329
Thursday, November 21, 2013
Cyber Security: FBI warns hacking spree on government agencies is a “widespread problem”
The FBI is warning that members of the Anonymous hacking collective have
breached computers belonging to multiple government agencies and made
off with sensitive information in a series of attacks that started
almost a year ago. Click here to read more.
Wednesday, November 20, 2013
Cyber Security: Hacker virus seizes files, ransoms for cash
An MIT expert is warning that Hub government agencies, businesses and
personal PC users could be "paralyzed" if they fall prey to the same
scheme that hit the Swansea Police Department - the latest victim of an
Internet virus that forces computer users to pony up an online ransom
for an encryption key to unlock their files.
Read the article here.
Read the article here.
Tuesday, November 19, 2013
Cyber Security: 'Arms dealers' supply malware for cyberattacks, research says
Companies battling tireless cyberespionage campaigns may be up against
well-organized attackers that are fed a steady stream of malware from a
talented developer of cyber-arms.
Click here to read more.
Click here to read more.
Monday, November 18, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 11
Click the link below to view the summary of cyber security
vulnerabilities for the week of November 11 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-322
http://www.us-cert.gov/ncas/bulletins/SB13-322
Thursday, November 14, 2013
Cyber Security: Decoding the cyber attacks
"The Messiah" claiming to speak for Anonymous has issued a warning
through a video circulated online to "go to war" with the Singapore
government. Click here to read the article.
Wednesday, November 13, 2013
Cyber Security: Hackers expose Asia's weak cyber defenses
A rash of website hackings in the Asia-Pacific has exposed weak cyber defenses which must be improved to help the region deal with more
sophisticated and sinister threats, particularly from criminal organizations, analysts said. Click here to read more.
Tuesday, November 12, 2013
Cyber Security: Obamacare website threatened by hackers
A politically-charged tool has been circulating around the Internet called
"Destroy Obama Care!" that claims its use would overload the Obamacare
site. Click here to read the article.
Monday, November 11, 2013
Cyber Security: The Global Cyber Advisor Newsletter - Oct. 2013 Vol. 25
Welcome to the latest Global Cyber Advisor Newsletter,
Breaking News: Invensys’ Mike Caliel meets with the
White House to discuss industry’s view of the newest version of the NIST
framework.
Continuously
Secure: Invensys continues to prove to the industry that
we stay vigilant and help our customers develop their cyber strategies and
secure their process environments. We have staff
to help our clients on a global basis to assess, design, implement, and manage
their cyber posture. Invensys has developed suites of
products with complementary consulting, which are unmatched in the
industry.
This month’s Consultant’s Corner is from James Bassett where
he discusses using a test bed to test your Cyber Mitigations.
The Invensys Critical Infrastructure and Security Practice
has the skills and the resources to help our clients no matter what
industry. We are structured to help with their entire Cyber Security program. We
have essentially the industry’s largest vendor-based Cyber Security team that
assists our clients secure their entire process environment.
We understand that Cyber Security extends beyond a single system and our valued
clients need assistance and advice in how to secure their entire plant
infrastructure. Cyber security is so much more than firewalls and
anti-virus software.
Also, if you’ve missed our previous editions, you can find
them at this location: http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx
Click here to open the October 2013 newsletter.
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 4
Click the link below to view the summary of cyber security
vulnerabilities for the week of November 4 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-315
http://www.us-cert.gov/ncas/bulletins/SB13-315
Friday, November 8, 2013
Cyber Security: Internet malware turns 25
Read about the first instance of internet malware introduced on November 3, 1988 by a grad student who was trying to build the first botnet.
Thursday, November 7, 2013
Cyber Security: Singapore on alert for cyber attacks after websites hacked
Singapore's government has been put on heightened alert for cyber
attacks after people claiming to be from international hacking
collective Anonymous defaced several web sites in the city-state and
threatened further action. Click here to read more.
Wednesday, November 6, 2013
Cyber Security: 11 sure signs you've been hacked
Think you've been hacked? Read this article for 11 sure signs and what to do if your computer has been compromised.
Tuesday, November 5, 2013
Cyber Security: July-September 2013 ICS-CERT Monthly Monitor
View ICS-CERT's July-September 2013 newsletter, with a feature article on a critical manufacturing cyber incident.
https://ics-cert.us-cert.gov/sites/default/files/Monitors/NCCIC_ICS-CERT_Monitor%20July-Aug-Sept.pdf
https://ics-cert.us-cert.gov/sites/default/files/Monitors/NCCIC_ICS-CERT_Monitor%20July-Aug-Sept.pdf
Monday, November 4, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of October 28
Click the link below to view the summary of cyber security
vulnerabilities for the week of October 28 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-308
http://www.us-cert.gov/ncas/bulletins/SB13-308
Thursday, October 31, 2013
Cyber Security: Cyber attack shuts down Israeli toll road tunnel
A month after Israel’s military chief, Benny Gantz, listed computer sabotage as a top threat, a
major link in the country’s national road network was shut down by a cyber attack. The attack took
down key operations for two days, causing hundreds of thousands of dollars in damage, experts
told The Associated Press, according to the Washington Post. The attack indicates that cyber war is now a reality, the paper said.
Click here for the full article.
Click here for the full article.
Wednesday, October 30, 2013
Cyber Security: The Global Cyber Advisor Newsletter - Sep. 2013 Vol. 24
Welcome to the latest Global Cyber Advisor Newsletter.
Continuously Secure: Invensys
continues to prove to the industry that we stay vigilant and help our
customers develop their Cyber Strategies and secure their process
environments. We have staff to help our clients on a global basis to
assess, design, implement and manage their Cyber posture. Invensys has
developed suites of products with complementary consulting, which are
unmatched in the industry.
This month’s Consultant’s Corner is from Charles Smith, where he discusses encryption in his article, "Transporting Data Securely."
The Invensys Critical Infrastructure and Security Practice has the skills and the resources to help our clients no matter what industry. We are structured to help with their entire Cyber Security program. We have essentially the industry’s largest vendor-based Cyber Security team that assists our clients secure their entire process environment. We understand that Cyber Security extends beyond a single system and our valued clients need assistance and advice in how to secure their entire plant infrastructure. Cyber security is so much more than firewalls and anti-virus software.
If you’ve missed our previous editions, you can find them at this location: http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx
Click here to open the September 2013 newsletter.
Cyber Security: UK man charged with breaching U.S. Army, NASA, and other federal government computer networks
A British man has been arrested and charged with hacking into computer
systems of the U.S. Army, NASA, the Environmental Protection Agency, and
other agencies at a cost of millions of dollars to the federal
government. Click here to read the article.
Tuesday, October 29, 2013
Cyber Security: NatGeo's American Blackout imagines 10 days of a nationwide power outage due to cyber attacks
What does it mean to be powerless? That question is at the center of American Blackout, a new found-footage style suspense/horror movie from National Geographic Channel that imagines 10 days of a nationwide power outage caused by a devastating cyber attack.
Though former deputy of Homeland Security Jane Holl Lute called the movie "extreme," Michael Hayden, retired general and former director of the NSA and CIA, said we don't know how big of a risk a cyber attack is.
Robert Bristow, Medical Director of Emergency Management at New York Presbyterian Hospital, said most hospitals have a plan to sustain services for about 96 hours without needing external assistance. Lute added that there is an old saying among first responders that the "first 72 is on you," and that many people don't have the capability to withstand 72 hours in case emergency services cannot reach them.
American Blackout will air on November 13 at 9 p.m. ET.
Click here to read the full article.
Though former deputy of Homeland Security Jane Holl Lute called the movie "extreme," Michael Hayden, retired general and former director of the NSA and CIA, said we don't know how big of a risk a cyber attack is.
Robert Bristow, Medical Director of Emergency Management at New York Presbyterian Hospital, said most hospitals have a plan to sustain services for about 96 hours without needing external assistance. Lute added that there is an old saying among first responders that the "first 72 is on you," and that many people don't have the capability to withstand 72 hours in case emergency services cannot reach them.
American Blackout will air on November 13 at 9 p.m. ET.
Click here to read the full article.
Monday, October 28, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of October 21
Click the link below to view the summary of cyber security
vulnerabilities for the week of October 21 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-301
http://www.us-cert.gov/ncas/bulletins/SB13-301
Thursday, October 24, 2013
Cyber Security: U.S. universities under cyber attacks originating in China
Recently, U.S. universities have found themselves under cyber attacks with "hacking attempts invading networks by the millions weekly. Many of the attacks
have been traced back to China, and the theft of personal data
is happening more frequently." Read what colleges are doing to in response to these attacks and how they are working to strengthen their security.
Wednesday, October 23, 2013
Cyber Security: Body hacking
3 million Americans have implanted medical devices, and the possibility of cyber attacks on these devices is increasing. Even Dick Cheney, who has a pacemaker, feared a "cyber assassination." Click here to read the article.
Tuesday, October 22, 2013
Cyber Security: Staged cyber attacks help Wall Street banks learn to survive
In a staged simulation called Quantum Dawn 2, bank executives were faced with the task of spotting a small "red flag" and then communicating with "rivals, exchanges and government authorities to conclude that markets
were in the throes of a systemic crisis and needed to be shut down." Click here to read the article.
Monday, October 21, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of October 14
Click the link below to view the summary of cyber security
vulnerabilities for the week of October 14 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-294
http://www.us-cert.gov/ncas/bulletins/SB13-294
Cyber Security: Cyber Security Compliance
Compliance is the assurance that the cyber security program is in place, regulations are implemented and the plant is monitoring and tracking changes. Compliance is the assurance of preparedness. In this video, Michael Martinez discusses why a mindset change is required that not only addresses the technology but also involves personal awareness and ownership of responsibility.
Friday, October 18, 2013
Cyber Security: Invensys Cyber Security Team Helps Customers Comply with Cyber Security
Did you know that Invensys has a well-established Cyber Security team? Listen to this interview with Doug Clifton to hear more.
Thursday, October 17, 2013
Cyber Security: Top 7 tactics of hack attacks
Click here to read the top 7 tactics of hackers and malware, including fake wireless access points, cookie theft, and waterhole attacks.
Wednesday, October 16, 2013
Cyber Security: UK banks to face simulated cyber attacks
UK banks will face simulated cyber attacks in an effort to see if these financial systems are prepared for a sustained online attack. Operation Waking Shark 2 begins in mid-November. Click here to read the article.
Subscribe to:
Posts (Atom)