Monday, December 30, 2013

Thursday, December 26, 2013

Cyber Security: Effective Backups

Gary Kneeland, consultant for Invensys Critical Infrastructure & Security Practice, offers tips for effective backups.


Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on computer systems that have been configured to work in their specific environment. Because of these configuration differences, replacing one of these systems in the event of a failure is not as simple as buying a new one off the shelf. Reproducing a configuration of a system without good backups can take huge amounts of time, and also introduce errors into the system that were not originally there. In some cases, the time lost while these systems are being replaced can shut down a production line or power plant for extended periods of time, costing companies millions of dollars. All of these reasons and more are why effective backups are important for any computer system in an industrial environment.


Keep it simple

The first requirement for effective backups is to make them as simple as possible to execute. If the backup procedure for a system requires a technician to go to the machine, plug in a laptop, and manually execute a backup that takes 4 hours to complete, this not only wastes time, but could lead to human errors while performing the backup activities. There are many software suites available now that will automatically perform backups of other systems, either locally or to network drives, and are highly customizable in how these backups are performed. Using one of these software suites to automate the backup process can make them easier and more reliable.

Determine the frequency and types of backups to occur

The second requirement for effective backups is to identify what frequency backups need to occur at and what types of backups need to occur. To evaluate how often backups need to occur, you must first know how often changes are occurring on a system. A controller for an emergency fire protection system may not be used often, and backups every month or every quarter is sufficient; however, for a payroll system that is being changed on a daily basis, incremental backups every day would be more appropriate. Determining the frequency of backups will assure that backups are current and usable, but keep resource usage at a minimum and keep costs down.

Store backup files offsite

The third requirement for effective backups is to have offsite storage locations for the backup files. If a company has up-to-date backups, but they are all in the same building as the servers when a flood or fire occurs, they are of no use. Because most backup software solutions allow network backups, consider other locations on the company’s WAN that can house the backups more safely. Storing backups at a corporate location that is offsite from your industrial complex can save a company when large scale disasters strike, such as flood and fire.

Use a test system to ensure smooth recovery

Finally, once a company has backups created for their systems, they must test that they can actually recover from these backups. Using a test system to attempt and recover from these backups can ensure that when the time comes to use system backups, it goes smoothly. Creating and testing a disaster recovery plan can help make recovery as smooth and painless as possible, and with the help of good backups, can prevent extended downtime to a company’s critical infrastructure.

Tuesday, December 24, 2013

Cyber Security: Hackers make covert networks with sound

Hackers and spies have a slew of ways to pull data from your computer, but not if it's disconnected from the Internet. Click here to read the article.


Monday, December 23, 2013

Cyber Security: No Christmas fun for IT as they admit to losing the cyber-warfare battle

RedSeal Networks , the leader in network infrastructure security management, announced the results of a survey that was conducted amongst 350 IT professionals from a range of companies across the United Kingdom. Click here to read the article.


Thursday, December 19, 2013

Cyber Security: Cyber attack dodges sandbox to hit Adobe Reader, Windows XP

A technical analysis shows that a cyber-attack currently hitting systems in the wild is using two separate vulnerabilities to break out of the Adobe sandbox to infect Windows systems. Click here to read the article.


Wednesday, December 18, 2013

Cyber Security: Data stolen from 104,000 energy employees was more sensitive than first thought

Hackers that breached an Energy Department personnel database in July got away with more sensitive data than first disclosed by the government, including some banking information and password security questions of the 104,179 individuals affected, according to internal investigators. Click here for the article.


Tuesday, December 17, 2013

Cyber Security: Bogus antivirus program uses a dozen stolen signing certificates

A fake antivirus program is using at least a dozen stolen code-signing certificates, indicating hackers are regularly breaching the networks of developers. Click here to read the article.


Monday, December 16, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of December 9

Click the link below to view the summary of cyber security vulnerabilities for the week of December 9 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB13-350


Thursday, December 12, 2013

Cyber Security: Hackers steal 2M passwords to Facebook, Twitter, others

Online media reports indicate hackers have stolen usernames and passwords for nearly two million accounts on popular email and social media websites. Click here to read the article.


Wednesday, December 11, 2013

Cyber Security: Group charged in PayPal cyber attack pleads guilty

A group of 13 defendants who had been charged in a cyber attack on PayPal's website pleaded guilty and admitted to the December 2010 attack over PayPal's suspension of WikiLeaks accounts. Click here to read the article.


Tuesday, December 10, 2013

Cyber Security: State tax refund debit card data exposed to hackers

The latest issue is personal information of around 6,000 Louisiana taxpayers and another 7,000 or so in Connecticut. Click here to read more.


Monday, December 9, 2013

Cyber Security: The Global Cyber Advisor Newsletter - Nov. 2013 Vol. 26

Welcome to the latest Global Cyber Advisor Newsletter.

Continuously Secure:   Invensys continues to prove to the industry that we stay vigilant and help our customers develop their Cyber Strategies and secure their process environments.      We have staff to help our clients on a global basis to assess, design, implement and manage their Cyber posture.     Invensys has developed suites of products with complementary consulting, which are unmatched in the industry.   

This month’s Consultant’s Corner is from Stephen Santee where he discusses approaches to Cyber Security programs.
                                                                                             
The Invensys Critical Infrastructure and Security Practice has the skills and the resources to help our clients no matter what industry.    We are structured to help with their entire Cyber Security program.   We have essentially the industry’s largest vendor-based Cyber Security team that assists our clients secure their entire process environment.    We understand that Cyber Security extends beyond a single system and our valued clients need assistance and advice in how to secure their entire plant infrastructure.   Cyber security is so much more than firewalls and anti-virus software.  

If you’ve missed our previous editions, you can find them at this location:   http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx

Click here to open the November 2013 newsletter.


Cyber Security: ICS-CERT Vulnerability Summary for Week of December 2

Click the link below to view the summary of cyber security vulnerabilities for the week of December 2 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB13-343


Thursday, December 5, 2013

Cyber Security: Tech giants are countering government spying

Google, Facebook, Microsoft and Twitter are engaged in a costly tech arms race, with their businesses and cultures at stake. Not against one another, mind you, but a common foe: the National Security Agency. Click here to read the article.

Wednesday, December 4, 2013

Cyber Security: Smart TVs, security cams now on hackers' radar: Symantec says

Besides PCs and mobile phones, internet-connected devices like smart TVs, routers and security cameras are also now vulnerable to attacks from cyber criminals, security software provider Symantec says. Click here to read the article.

Tuesday, December 3, 2013

Cyber Security: Energy industry is target for cyber attacks

Last year the hacker group Anonymous broke into computer systems of oil companies including Shell, Exxon Mobil and BP as a protest against Arctic drilling. Click here to read the article.


Monday, December 2, 2013

Cyber Security: Top ten Cyber Monday tips for staying safe when shopping online

Cyber Monday—the Monday after Thanksgiving—has officially replaced Black Friday—the day after Thanksgiving—as the most popular day to shop for the holidays.
 
Shopping online means avoiding the crowds, but it also opens the buyer up to attacks from scammers and hackers. In order to fight these online grinches, the Better Business Bureau of Southern Arizona recommends 10 tips for staying safe when holiday shopping online.
 
Click here to read the article.
 
 

Cyber Security: ICS-CERT Vulnerability Summary for Week of November 25

Click the link below to view the summary of cyber security vulnerabilities for the week of November 25 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB13-336


Wednesday, November 27, 2013

Cyber Security: DDoS threats: The disruption your organization can’t afford to ignore

The threat of a distributed denial of service attack has to be taken seriously, but what that threat is masking might be the real cause for alarm. Click here for the article.


Tuesday, November 26, 2013

Cyber Security: NSA infects 50,000 computer networks worldwide with malware

The U.S. National Security Agency hacked more than 50,000 computer networks worldwide last year, infecting them with malware used to conduct sophisticated spy operations, according to a top-secret slide leaked by Edward Snowden. Click here to read the article.




Monday, November 25, 2013

Thursday, November 21, 2013

Cyber Security: FBI warns hacking spree on government agencies is a “widespread problem”

The FBI is warning that members of the Anonymous hacking collective have breached computers belonging to multiple government agencies and made off with sensitive information in a series of attacks that started almost a year ago. Click here to read more.


Wednesday, November 20, 2013

Cyber Security: Hacker virus seizes files, ransoms for cash

An MIT expert is warning that Hub government agencies, businesses and personal PC users could be "paralyzed" if they fall prey to the same scheme that hit the Swansea Police Department - the latest victim of an Internet virus that forces computer users to pony up an online ransom for an encryption key to unlock their files.

Read the article here.




Tuesday, November 19, 2013

Cyber Security: 'Arms dealers' supply malware for cyberattacks, research says

Companies battling tireless cyberespionage campaigns may be up against well-organized attackers that are fed a steady stream of malware from a talented developer of cyber-arms.

Click here to read more.


Monday, November 18, 2013

Thursday, November 14, 2013

Cyber Security: Decoding the cyber attacks

"The Messiah" claiming to speak for Anonymous has issued a warning through a video circulated online to "go to war" with the Singapore government. Click here to read the article.


Wednesday, November 13, 2013

Cyber Security: Hackers expose Asia's weak cyber defenses

A rash of website hackings in the Asia-Pacific has exposed weak cyber defenses which must be improved to help the region deal with more sophisticated and sinister threats, particularly from criminal organizations, analysts said. Click here to read more.


Tuesday, November 12, 2013

Cyber Security: Obamacare website threatened by hackers

A politically-charged tool has been circulating around the Internet called "Destroy Obama Care!" that claims its use would overload the Obamacare site. Click here to read the article.



Monday, November 11, 2013

Cyber Security: The Global Cyber Advisor Newsletter - Oct. 2013 Vol. 25

Welcome to the latest Global Cyber Advisor Newsletter,

Breaking News:  Invensys’ Mike Caliel meets with the White House to discuss industry’s view of the newest version of the NIST framework.
 
Continuously Secure:   Invensys continues to prove to the industry that we stay vigilant and help our customers develop their cyber strategies and secure their process environments.      We have staff to help our clients on a global basis to assess, design, implement, and manage their cyber posture.     Invensys has developed suites of products with complementary consulting, which are unmatched in the industry.   

This month’s Consultant’s Corner is from James Bassett where he discusses using a test bed to test your Cyber Mitigations.
                                                                                             
The Invensys Critical Infrastructure and Security Practice has the skills and the resources to help our clients no matter what industry.    We are structured to help with their entire Cyber Security program.   We have essentially the industry’s largest vendor-based Cyber Security team that assists our clients secure their entire process environment.    We understand that Cyber Security extends beyond a single system and our valued clients need assistance and advice in how to secure their entire plant infrastructure.   Cyber security is so much more than firewalls and anti-virus software.  

Also, if you’ve missed our previous editions, you can find them at this location:   http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx

Click here to open the October 2013 newsletter.


Cyber Security: ICS-CERT Vulnerability Summary for Week of November 4

Click the link below to view the summary of cyber security vulnerabilities for the week of November 4 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB13-315


Thursday, November 7, 2013

Cyber Security: Singapore on alert for cyber attacks after websites hacked

Singapore's government has been put on heightened alert for cyber attacks after people claiming to be from international hacking collective Anonymous defaced several web sites in the city-state and threatened further action. Click here to read more.


Wednesday, November 6, 2013

Monday, November 4, 2013

Thursday, October 31, 2013

Cyber Security: Cyber attack shuts down Israeli toll road tunnel

A month after Israel’s military chief, Benny Gantz, listed computer sabotage as a top threat, a major link in the country’s national road network was shut down by a cyber attack. The attack took down key operations for two days, causing hundreds of thousands of dollars in damage, experts told The Associated Press, according to the Washington Post. The attack indicates that cyber war is now a reality, the paper said.

Click here for the full article.

Wednesday, October 30, 2013

Cyber Security: The Global Cyber Advisor Newsletter - Sep. 2013 Vol. 24

Welcome to the latest Global Cyber Advisor Newsletter.

Continuously Secure:   Invensys continues to prove to the industry that we stay vigilant and help our customers develop their Cyber Strategies and secure their process environments. We have staff to help our clients on a global basis to assess, design, implement and manage their Cyber posture. Invensys has developed suites of products with complementary consulting, which are unmatched in the industry.   

This month’s Consultant’s Corner is from Charles Smith, where he discusses encryption in his article, "Transporting Data Securely."

The Invensys Critical Infrastructure and Security Practice has the skills and the resources to help our clients no matter what industry. We are structured to help with their entire Cyber Security program. We have essentially the industry’s largest vendor-based Cyber Security team that assists our clients secure their entire process environment. We understand that Cyber Security extends beyond a single system and our valued clients need assistance and advice in how to secure their entire plant infrastructure. Cyber security is so much more than firewalls and anti-virus software. 

If you’ve missed our previous editions, you can find them at this location:   http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx

Click here to open the September 2013 newsletter.


Cyber Security: UK man charged with breaching U.S. Army, NASA, and other federal government computer networks

A British man has been arrested and charged with hacking into computer systems of the U.S. Army, NASA, the Environmental Protection Agency, and other agencies at a cost of millions of dollars to the federal government. Click here to read the article.


Tuesday, October 29, 2013

Cyber Security: NatGeo's American Blackout imagines 10 days of a nationwide power outage due to cyber attacks

What does it mean to be powerless? That question is at the center of American Blackout, a new found-footage style suspense/horror movie from National Geographic Channel that imagines 10 days of a nationwide power outage caused by a devastating cyber attack.

Though former deputy of Homeland Security Jane Holl Lute called the movie "extreme," Michael Hayden, retired general and former director of the NSA and CIA, said we don't know how big of a risk a cyber attack is.

Robert Bristow, Medical Director of Emergency Management at New York Presbyterian Hospital, said most hospitals have a plan to sustain services for about 96 hours without needing external assistance. Lute added that there is an old saying among first responders that the "first 72 is on you," and that many people don't have the capability to withstand 72 hours in case emergency services cannot reach them.

American Blackout will air on November 13 at 9 p.m. ET.

Click here to read the full article.



Monday, October 28, 2013

Thursday, October 24, 2013

Cyber Security: U.S. universities under cyber attacks originating in China

Recently, U.S. universities have found themselves under cyber attacks with "hacking attempts invading networks by the millions weekly. Many of the attacks have been traced back to China, and the theft of personal data is happening more frequently." Read what colleges are doing to in response to these attacks and how they are working to strengthen their security.

Wednesday, October 23, 2013

Cyber Security: Body hacking

3 million Americans have implanted medical devices, and the possibility of cyber attacks on these devices is increasing. Even Dick Cheney, who has a pacemaker, feared a "cyber assassination." Click here to read the article.


Tuesday, October 22, 2013

Cyber Security: Staged cyber attacks help Wall Street banks learn to survive

In a staged simulation called Quantum Dawn 2, bank executives were faced with the task of spotting a small "red flag" and then communicating with "rivals, exchanges and government authorities to conclude that markets were in the throes of a systemic crisis and needed to be shut down." Click here to read the article.


Monday, October 21, 2013

Cyber Security: ICS-CERT Vulnerability Summary for Week of October 14

Click the link below to view the summary of cyber security vulnerabilities for the week of October 14 as collected and reported by ICS-CERT.

http://www.us-cert.gov/ncas/bulletins/SB13-294


Cyber Security: Cyber Security Compliance



Compliance is the assurance that the cyber security program is in place, regulations are implemented and the plant is monitoring and tracking changes. Compliance is the assurance of preparedness. In this video, Michael Martinez discusses why a mindset change is required that not only addresses the technology but also involves personal awareness and ownership of responsibility.
 

Friday, October 18, 2013

Thursday, October 17, 2013

Cyber Security: Top 7 tactics of hack attacks

Click here to read the top 7 tactics of hackers and malware, including fake wireless access points, cookie theft, and waterhole attacks.

Wednesday, October 16, 2013

Cyber Security: UK banks to face simulated cyber attacks

UK banks will face simulated cyber attacks in an effort to see if these financial systems are prepared for a sustained online attack. Operation Waking Shark 2 begins in mid-November. Click here to read the article.