Exfiltration of data, or information leakage, poses a threat to all companies throughout the world. It is important to know the possible ways information can get out to control them and avoid a loss of information in our organisation. Since in industry the most important factor is availability, this threat has to be put into perspective.
Specialized blog with informative contents destined to a public with marked technical profile, in order to improve knowledge and create a culture about the security in Internet.
Post related to: Data protection
The union of the IT and OT worlds is unstoppable, which means that the cybersecurity strategy, traditionally focused on the IT field, must now include aspects related to the industrial world. Having a good cybersecurity strategy is essential for IC systems to survive in this new era.
The Internet of Things (IoT) has started to become part of daily life in society: intelligent homes, intelligent education, intelligent healthcare, wearable devices, the Internet of Vehicles (IoV) and other industries make great use of this technology, with it playing a key role in the digital transformation and the hyper-connection of their elements.
Tomando en consideración las amenazas y los riesgos detallados anteriormente queda de manifiesto la necesidad de desarrollar acciones o modelos de protección para mitigar las vulnerabilidades que surgen del tratamiento de los datos de los usuarios así como prácticas de seguridad en la funcionalidad y el despliegue de tecnologías IoT.
Sometimes it is necessary to make some adjustments to control system devices, which leads to a reprogramming of PLC, RTU and similar devices. Reprogramming is a complicated step in terms of security and if the process is not adequately executed, the entire process of which the device is a part may be at risk.
Blockchain is in fashion. Every month, new systems of this type emerge, applications that use them or companies who base their business models on the opportunities provided by this technology. Despite this boom, there is still a lot of uncertainty surrounding the protocol.
Today there is not a mobile phone on the planet that does not feature Bluetooth technology to connect to other wireless devices. To add to this, the emergence of the Industrial Internet of Things (IIoT) has generated multiple vectors of attack through this technology.
As Francis Bacon famously states: "knowledge is power," but what if, in addition to possessing an abundance of information, it could also be analysed quickly and efficiently? This will be one of the challenges facing Industrial Control Systems, where the processing of information in real time can provide major advantages.