Click the link below to view the summary of cyber security
vulnerabilities for the week of December 23 as collected and reported
by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-364
Cyber Security Compliance for Power, Oil & Gas, Water Treatment, NERC-CIP, NEI 0809 and CFATS
Monday, December 30, 2013
Thursday, December 26, 2013
Cyber Security: Effective Backups
Gary Kneeland, consultant for Invensys Critical Infrastructure &
Security Practice, offers tips for effective backups.
Minimize Downtime Through Effective Backups
Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on computer systems that have been configured to work in their specific environment. Because of these configuration differences, replacing one of these systems in the event of a failure is not as simple as buying a new one off the shelf. Reproducing a configuration of a system without good backups can take huge amounts of time, and also introduce errors into the system that were not originally there. In some cases, the time lost while these systems are being replaced can shut down a production line or power plant for extended periods of time, costing companies millions of dollars. All of these reasons and more are why effective backups are important for any computer system in an industrial environment.Keep it simple
The first requirement for effective backups is to make them as simple as possible to execute. If the backup procedure for a system requires a technician to go to the machine, plug in a laptop, and manually execute a backup that takes 4 hours to complete, this not only wastes time, but could lead to human errors while performing the backup activities. There are many software suites available now that will automatically perform backups of other systems, either locally or to network drives, and are highly customizable in how these backups are performed. Using one of these software suites to automate the backup process can make them easier and more reliable.Determine the frequency and types of backups to occur
The second requirement for effective backups is to identify what frequency backups need to occur at and what types of backups need to occur. To evaluate how often backups need to occur, you must first know how often changes are occurring on a system. A controller for an emergency fire protection system may not be used often, and backups every month or every quarter is sufficient; however, for a payroll system that is being changed on a daily basis, incremental backups every day would be more appropriate. Determining the frequency of backups will assure that backups are current and usable, but keep resource usage at a minimum and keep costs down.Store backup files offsite
The third requirement for effective backups is to have offsite storage locations for the backup files. If a company has up-to-date backups, but they are all in the same building as the servers when a flood or fire occurs, they are of no use. Because most backup software solutions allow network backups, consider other locations on the company’s WAN that can house the backups more safely. Storing backups at a corporate location that is offsite from your industrial complex can save a company when large scale disasters strike, such as flood and fire.Use a test system to ensure smooth recovery
Finally, once a company has backups created for their systems, they must test that they can actually recover from these backups. Using a test system to attempt and recover from these backups can ensure that when the time comes to use system backups, it goes smoothly. Creating and testing a disaster recovery plan can help make recovery as smooth and painless as possible, and with the help of good backups, can prevent extended downtime to a company’s critical infrastructure.Tuesday, December 24, 2013
Cyber Security: Hackers make covert networks with sound
Hackers and spies have a slew of ways to pull data from your computer, but not if it's disconnected from the Internet. Click here to read the article.
Monday, December 23, 2013
Cyber Security: No Christmas fun for IT as they admit to losing the cyber-warfare battle
RedSeal Networks , the leader in network infrastructure security
management, announced the results of a survey that was conducted
amongst 350 IT professionals from a range of companies across the United
Kingdom. Click here to read the article.
Thursday, December 19, 2013
Cyber Security: Cyber attack dodges sandbox to hit Adobe Reader, Windows XP
A technical analysis shows that a cyber-attack currently hitting systems
in the wild is using two separate vulnerabilities to break out of the
Adobe sandbox to infect Windows systems. Click here to read the article.
Wednesday, December 18, 2013
Cyber Security: Data stolen from 104,000 energy employees was more sensitive than first thought
Hackers that breached an Energy Department personnel database in July
got away with more sensitive data than first disclosed by the
government, including some banking information and password security
questions of the 104,179 individuals affected, according to internal
investigators. Click here for the article.
Tuesday, December 17, 2013
Cyber Security: Bogus antivirus program uses a dozen stolen signing certificates
A fake antivirus program is using at least a dozen stolen code-signing
certificates, indicating hackers are regularly breaching the networks of
developers. Click here to read the article.
Monday, December 16, 2013
Cyber Security: ICS-CERT Vulnerability Summary for Week of December 9
Click the link below to view the summary of cyber security
vulnerabilities for the week of December 9 as collected and reported
by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-350
http://www.us-cert.gov/ncas/bulletins/SB13-350
Thursday, December 12, 2013
Cyber Security: Hackers steal 2M passwords to Facebook, Twitter, others
Online media reports indicate hackers have stolen usernames and
passwords for nearly two million accounts on popular email and social
media websites. Click here to read the article.
Wednesday, December 11, 2013
Cyber Security: Group charged in PayPal cyber attack pleads guilty
A group of 13 defendants who had been charged in a cyber attack on
PayPal's website pleaded guilty and admitted to the December 2010 attack
over PayPal's suspension of WikiLeaks accounts. Click here to read the article.
Tuesday, December 10, 2013
Cyber Security: State tax refund debit card data exposed to hackers
The latest issue is personal information of around 6,000 Louisiana taxpayers and another 7,000 or so in Connecticut. Click here to read more.
Monday, December 9, 2013
Cyber Security: The Global Cyber Advisor Newsletter - Nov. 2013 Vol. 26
Welcome to the latest Global Cyber Advisor Newsletter.
Continuously
Secure: Invensys continues to prove to the industry that
we stay vigilant and help our customers develop their Cyber Strategies and
secure their process environments. We have staff
to help our clients on a global basis to assess, design, implement and manage
their Cyber posture. Invensys has developed suites of
products with complementary consulting, which are unmatched in the
industry.
This month’s Consultant’s Corner is from Stephen Santee
where he discusses approaches to Cyber Security programs.
The Invensys Critical Infrastructure and Security Practice
has the skills and the resources to help our clients no matter what
industry. We are structured to help with their entire Cyber Security program. We
have essentially the industry’s largest vendor-based Cyber Security team that
assists our clients secure their entire process environment.
We understand that Cyber Security extends beyond a single system and our valued
clients need assistance and advice in how to secure their entire plant
infrastructure. Cyber security is so much more than firewalls and
anti-virus software.
If you’ve missed our previous editions, you can find them at this location: http://iom.invensys.com/EN/Pages/CyberSecurity-Newsletters.aspx
Click here to open the November 2013 newsletter.
Cyber Security: ICS-CERT Vulnerability Summary for Week of December 2
Click the link below to view the summary of cyber security
vulnerabilities for the week of December 2 as collected and reported
by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-343
http://www.us-cert.gov/ncas/bulletins/SB13-343
Thursday, December 5, 2013
Cyber Security: Tech giants are countering government spying
Google, Facebook, Microsoft and Twitter are engaged in a costly tech arms race, with their businesses and cultures at stake. Not against one another, mind you, but a common foe: the National Security Agency. Click here to read the article.
Wednesday, December 4, 2013
Cyber Security: Smart TVs, security cams now on hackers' radar: Symantec says
Besides PCs and mobile phones, internet-connected devices like smart TVs, routers and security cameras are also now vulnerable to attacks from cyber criminals, security software provider Symantec says. Click here to read the article.
Tuesday, December 3, 2013
Cyber Security: Energy industry is target for cyber attacks
Last year the hacker group Anonymous broke into computer systems of oil
companies including Shell, Exxon Mobil and BP as a protest against
Arctic drilling. Click here to read the article.
Monday, December 2, 2013
Cyber Security: Top ten Cyber Monday tips for staying safe when shopping online
Cyber Monday—the Monday after Thanksgiving—has officially replaced Black Friday—the day after Thanksgiving—as the most popular day to shop for the holidays.
Shopping online means avoiding the crowds, but it also opens the buyer up to attacks from scammers and hackers. In order to fight these online grinches, the Better Business Bureau of Southern Arizona recommends 10 tips for staying safe when holiday shopping online.
Click here to read the article.
Cyber Security: ICS-CERT Vulnerability Summary for Week of November 25
Click the link below to view the summary of cyber security vulnerabilities for the week of November 25 as collected and reported by ICS-CERT.
http://www.us-cert.gov/ncas/bulletins/SB13-336
http://www.us-cert.gov/ncas/bulletins/SB13-336
Subscribe to:
Posts (Atom)