Moxa - Defend Your Industrial Networks - Tuesday, 2 April 2019

While companies are tapping into the opportunities that the Industrial Internet of Things (IIoT) has to offer, digitalization has become a key initiative for industries. Digitalization has allowed the industrial control system (ICS) landscape to develop quickly in recent years. Originally, ICS networks were physically isolated and almost immune to cyberattacks. However, recently, there has been a rise in the sophistication of cyberattacks, which has prompted everyone form IT to OT personnel to produce solutions that enhance industrial cybersecurity. Thus, understanding industrial cybersecurity requirements will help companies mitigate cybersecurity risks.

Debunk Industrial Cybersecurity Myths

There are some myths about industrial cybersecurity that may put your facilities and businesses at risk. Click here to watch the video to learn how to debunk the myths and build defence-in-depth security for your industrial networks to ensure continuous operations and the safety of personnel.

Vast Difference Between IT and OT

  • IT No 1 Priority _ Confidentiality  /  OT No 1 Priority _ Availability
  • IT Focus _ Data integrity is key  /  OT Focus _ Control processes can't tolerate downtime
  • IT Protection Target _ Windows computers, servers  /  OT Protection Target _ Industrial legacy devices, barcode readers 
  • IT Environmental Conditions _ Air-conditioned  /  OT Environmental Conditions _ Extreme temperatures, vibration, shock

Case Study

With over 30 years of experience in industrial networking, Moxa draws on this expertise to help customers build secure networks by offering protection for PLC's , SCADA systems, factory networks and remote access. Click here to download the case study.

Checklist for Your Industrial Cybersecurity

You can use the checklist below to make sure you do not forget any of the defence-in-depth security measures and select solutions that fit your needs. Click here to download the checklist and recommendations.

Secure Devices

  • Identify and control who can log into devices
  • Increase password complexity to enhance access control
  • Verify authorised devices before the devices gain access to the network and communicate with other devices
  • Encrypt confidential serial interface data to ensure data integrity
  • Encrypt configuration data to increase confidentiality
  • Select device vendors that respond quickly to reported vulnerabilities and fix them

Secure Network Infrastructure

  • Segment large-scale networks into smaller networks to avoid networking issues interrupting operations or crashing the network
  • Filter out unauthorised packets and block unauthorised access to enhance access control
  • Create a secure tunnel for encrypted data transmission to ensure data integrity
  • Deploy industrial firewalls, VLAN or ACL, which are the most feasible and cost-effective options for industrial control systems

Security Management

  • Create security policies that meet your network requirements
  • Ensure all network devices are configured to the same security level
  • Continuously scan the security status of devices to ensue the whole network is secure
  • Regularly monitor the network to see if any new devices were added
  • Save all event logs for reference in the event of a security breach
  • Compare the network configurations before and after incidents to find the root cause of the problem

Moxa Product Portfolio With Enhanced Security Functions