article thumbnail

The A to E of cyber maturity

SRM

In a recent report, the Philippine government’s Department of Information and Communications Technology (created in 2016) outlined a scale of cyber resilience based on an A to E grading system. They do not proactively seek out vulnerabilities and exploit them to ascertain the extent of a weakness.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021) You can see from Table 1 that there is a wide variety of different industries, processes attacked, countries affected, methodologies used for the attack. Managers or controllers may want remote access to the control room, but this can lead to vulnerabilities.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Process Controls, SCADA and Cyber Security

Plan B Consulting

Table 1: A list of important attacks between 1982-2016 (Yadav & Paul, 2021). Access Vulnerabilities – Often, passwords are shared due to the installer changing it for additional users or manufacture default passwords are not changed. These links can be intercepted and are vulnerable to attack. Is ransomware a threat?

article thumbnail

School Security & Active Shooter Interdiction: A Q&A With Vince Riden

Security Industry Association

In 2016 I began my developing my patent, USPTO #11125537 B2, essentially an active shooter interdiction system. I taught the teachers how to use these systems, taught the principals how to manage these systems and instructed county employees on how to maintain these systems. Even some newer schools are designed and built “campus-style.”

article thumbnail

Guest Post: Cybersecurity Incidents Lead to New Standards, Requirements

Security Industry Association

The two most significant recent incidents in the cybersecurity timeline were the Mirai botnet of 2016 and the SolarWinds breach of 2020. SSDF ensures that password complexity, authentication, encryption, software updates, and vulnerability management occur throughout a product’s life cycle. and parts of Europe.