Connected manufacturing: Three steps to cloud security: Page 3 of 3

August 15, 2016 //By Martyn Williams
You wouldn’t allow an intruder to spend 229 days in your house undetected, so why would you do that with your manufacturing facility? As incredible as that sounds, the average time between a cyber security breach and its detection is 229 days. Manufacturing facilities are leading the list of potential targets for cyber espionage, denial of service (DoS) and web-application attacks. Here, Martyn Williams, Managing Director of industrial automation software supplier, COPA-DATA UK, discusses three steps manufacturers should take to stay safe in the cloud.

For Industrial Automation and Control Systems (IACS), IEC-62443 offers industry guidance that allows end users, systems integrators, security practitioners and the designers and manufacturers of industrial automation and control systems to work to the same standards. This results in a comprehensive and secure hardware and software system — the basis of any cyber-secure manufacturing facility.

Although cyber security in today’s connected factory is never 100 per cent airtight, best practice helps manufacturers detect threats early and address them in an effective way. This means your industrial security system will be able to spot intruders early rather than after 200 odd days when it might just be too late.

www.copadata.com

 

Recent Design Articles

Cellular and Wi-Fi clash in air war
RF design in the 21st century
Transmitter FFE makes the channel do the work
How to right-size your wireless testing
FPGAs solve core IoT challenges
Interference testing on CPRI links at wireless cell sites
Achieving voice service parity for VoLTE subscribers
Brush up on the theory before designing a high power Class‐E amplifier
Who killed that component?
The future of wearable medical devices
Managing power dissipation in 5G antenna design
Design and evaluation of a 5-W X-band PA using a low-cost plastic-packaged GaN transistor

Design category: