Ten Articles on Industrial Network Security You Must Read

The safety of your industrial networks is no joke. Are you doing enough to protect your plant, machines and processes from cyber attacks?

By Katherine Bonfante


With all the latest security breaches and hackers breaking down firewalls to steal information as if hacking was an accepted and recognized global sport, industry leaders are rethinking the safety of their industrial networks.

There's nothing fun about an unscheduled plant shutdown thanks to someone remotely taking control of your plant. This is why industry leaders are now heavily investing in robust security systems.

Manufacturers are not the only ones taking cybersecurity issues seriously, the government is too.

Here at ControlDesign.com, we've gathered a few articles that talk about how and why you should secure industrial networks.

CD1501 Cyber1

Seven Steps to Network Security

Security specialists build a list of safety measures to take.

CD1501 Cyber2

Cooperation on Cybersecurity Standard

Government, trade organizations and corporate team up to establish uniform best practices for network security.

CD1501 Cyber3

Cybersecurity Threats Are Everywhere

Don't worry about an isolated cybersecurity attack on your network. Worry about keeping your network safe from the cloud of threats that is out there every second of every day.

CD1501 Cyber4

Do Not Slip Up On Security

When it comes to protecting your network against intruders, you can't afford to fall down on the job.

CD1501 Cyber5

The 10 Commandments of Industrial Ethernet

This white paper discusses hazards and solutions you should consider when designing and building an industrial Ethernet network.

CD1501 Cyber6

How Much Network Access Should You Allow

As external dangers multiply, network security gets more complicated. Better tools and clearer standards can help make secure access easier and safer.

CD1501 Cyber7

Network Security

No help for naked turtles - Do not slip up on security. As a plant manager, my first impulse would be to cut all ties with Ethernet-based networking and the Internet.

CD1501 Cyber8

Identify the Network Threat

Effective security has to keep its firewalls up, but it also must track down and eliminate internal menaces.

CD1501 Cyber9

Remote Access Is a Big Problem for Target Corp. and Fazio

Find out why corporations have a problem with remote access and cybersecurity.

CD1501 Cyber10

Tips for Building a Network Security Strategy

Practical steps companies should take to protect against cybersecurity threats.

Show Comments
Hide Comments

Join the discussion

We welcome your thoughtful comments.
All comments will display your user name.

Want to participate in the discussion?

Register for free

Log in for complete access.

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments