Welcome to the new Schneider Electric Community

It's your place to connect with experts and peers, get continuous support, and share knowledge.

Important Announcement: WELCOME to the new Schneider Electric Community! Community is now no longer part of Exchange, and is now rebranded under se.com. If you have any bookmarks and links saved, we request you to update them to ensure that you continue accessing our community from this new location. For any issues that you might encounter as part of this change, please reach out to SchneiderCommunity.Support@se.com, and the team will help to get your issues resolved.
Invite a Co-worker
Send a co-worker an invite to the Exchange portal.Just enter their email address and we’ll connect them to register. After joining, they will belong to the same company.
Send Invite Cancel

How are you protecting your industrial control system from cyber security threats/attacks?

Industry Automation and Control Forum

This forum is addressing industrial automation design & engineering, operations, asset performance, cyber security and digital transformation for Plants & Machines.

Lieutenant JG
Lieutenant JG

How are you protecting your industrial control system from cyber security threats/attacks?

One of the easiest and successful ways to launch an attack in a manufacturing facility is to change an automation’s device program data. There are many products that claim to protect a facility from an attack and while many are useful, none can fully protect control logic from being changed inadvertently or maliciously. 


An integrated approach to cybersecurity is necessary for comprehensive protection and it must include the management of automated device programs and their changes. Read this Schneider Electric blog article for information on this topic and get recommendations on different ways to prepare, detect and recover from an attack on program data. 

1 Reply 1
Ensign Ensign

Denial of service is real, even in most surprising places

"Horror story" with a piece of practicality attached


Few years ago a customer asked for a solution for remote control of water gates.

The solution partners proposed, included simple GPRS routers which worked flawlessly most of the time.

The word "most" was a big problem for the customer as they required a reliable system.


After months of debugging including change to WiFi solution the problem was identified - a frequent military convoy, supplying a base in the mountain passed slowly next to the remote location. Often they had radio suppression on some of their machines.


Modbus cable solved it.



Аdvanced support on PLCs and HMIs for fun and glory