Categories: Energia

Cyberattacks can bring everything to a halt or worse, learn ways to thwart hackers as our tech world sprawls

Author: Steven Carlini Schneider Electric Blog

It seems like everyday the news is packed with stories on the latest cyberattack. After waiting in a long line to buy limited gas for my car (the result of a cyberattack on a pipeline), I was going to grill a few steaks this weekend, but hackers attacked the world’s largest meat supplier. The attack halted operations in the United States where I live, so meat prices spiked and availability shrank. I may be rethinking those plans.

What I eat on any given day is not a big deal, but my medical records are important to me and if I had them in the Irish health system, which has also been hacked, I’d be concerned. While the target of these attacks changes – from an oil pipeline to media giant to the New York City transit system – one thing remains the same: in this age of digital transformation, the hits keep on coming.

A change of menu or a wait for gas are minor inconveniences. Imagine a shutdown of the entire transportation industry, the entire electrical grid, or, even worse, contamination of the water supply. All possible by cyberattacks.

An overview of best cybersecurity practices

To support todays digital lifestyle, IOT is proliferating and data center architecture is spreading with edge computing deployments, making cybersecurity much more challenging. Schneider Electric has released White Paper 12: An Overview of Cybersecurity Best Practices for Edge Computing to provide guidance on how to secure networks with edge computing installations and the associated exponential rise in endpoint devices. The overview of best practices is provided for each of these four elements:

  1. Device selection criteria
  2. Secure network design:Defense-in-Depth Network (DDN), network segmentation, intrusion detection system, Secure Access Service Edge (SASE)
  3. Device setup/configuration
  4. Operation and maintenance:patch management, vulnerability management, penetration testing

Digital transformation is everywhere and so is risk

When you add sensors to your operations, you are adding data and opening more windows for potential cyberattacks. My new blog looks at Staying Cybersafe When IT and OT Converge: Adding Compute and IoT at the Edge.

You can access all of these materials for free. I hope they help you on the path to protecting your data center operations from cyberattack. So, please check out these resources. If you have questions, feel free to leave a comment below and I will reply.

admin

Recent Posts

Una missione tagliata da The Witcher 3: Wild Hunt è stata ripristinata grazie ad una mod – Multiplayer.it

Author: Multiplayer.it Il lancio del REDkit, ossia gli strumenti per il modding di The Witcher…

7 Luglio 2024

Flint Treasure of Oblivion: il fumetto è il fulcro di un’avventura tattica GDR | GamesVillage.it

Author: GamesVillage.it Microids e Savage Level presentano la seconda parte del making of di Flint Treasure of Oblivion! Dopo…

7 Luglio 2024

L’indice MEMEMEXTUSDT è ufficialmente disponibile sull’exchange BitMEX: un rischio per i meme token?

Author: Webnews BitMEX, il popolare exchange crypto, ha lanciato il contratto di swap perpetuo MEMEMEXTUSDT…

7 Luglio 2024

Il Samsung Galaxy Fold6 Slim è pronto per sfidare Xiaomi

Author: Tom's Hardware Il settore degli smartphone pieghevoli si sta preparando per alcuni importanti aggiornamenti,…

7 Luglio 2024

Perché iRacing è l’unico VERO simulatore di corse automobilistiche sul mercato

Author: GAMEmag iRacing è spesso considerato un colosso nel settore delle simulazioni automobilistiche, distinguendosi per…

7 Luglio 2024

Il porting dei giochi macOS su iOS è molto più semplice grazie ad Apple Game Porting Toolkit 2 | AGEMOBILE

Author: Agemobile Apple lo scorso anno ha introdotto un nuovo Game Porting Toolkit per aiutare…

7 Luglio 2024