Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

How are you protecting your industrial control system from cyber security threats/attacks?

Industry Automation and Control Forum

This forum is addressing industrial automation design & engineering, operations, asset performance, cyber security and digital transformation for Plants & Machines.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Industrial Automation
  • Industry Automation and Control Forum
  • How are you protecting your industrial control system from cyber security threats/attacks?
Options
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
Bastian_Schmitz
Admiral Bastian_Schmitz Admiral
31
LeTomas
Lt. Commander LeTomas Lt. Commander
11
RoozeeR
Lt. Commander RoozeeR Lt. Commander
6
JerryBartlemay
Lieutenant JG JerryBartlemay Lieutenant JG
6
View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Back to Industry Automation and Control Forum
AUVESY_MDT
Lieutenant JG AUVESY_MDT
Lieutenant JG

Posted: ‎2019-03-19 08:17 AM

2 Likes
1
2052
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-19 08:17 AM

How are you protecting your industrial control system from cyber security threats/attacks?

One of the easiest and successful ways to launch an attack in a manufacturing facility is to change an automation’s device program data. There are many products that claim to protect a facility from an attack and while many are useful, none can fully protect control logic from being changed inadvertently or maliciously. 

 

An integrated approach to cybersecurity is necessary for comprehensive protection and it must include the management of automated device programs and their changes. Read this Schneider Electric blog article for information on this topic and get recommendations on different ways to prepare, detect and recover from an attack on program data. 

Labels
  • Labels:
  • Cyber Security
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic
Reply 1
KamenTcho
Ensign KamenTcho Ensign
Ensign

Posted: ‎2019-03-19 10:57 AM

0 Likes
0
2051
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-03-19 10:57 AM

"Horror story" with a piece of practicality attached

 

Few years ago a customer asked for a solution for remote control of water gates.

The solution partners proposed, included simple GPRS routers which worked flawlessly most of the time.

The word "most" was a big problem for the customer as they required a reliable system.

 

After months of debugging including change to WiFi solution the problem was identified - a frequent military convoy, supplying a base in the mountain passed slowly next to the remote location. Often they had radio suppression on some of their machines.

 

Modbus cable solved it.

 

 

Аdvanced support on PLCs and HMIs for fun and glory
Reply

Link copied. Please paste this link to share this article on your social media post.

Preview Exit Preview

never-displayed

You must be signed in to add attachments

never-displayed

 
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of