//////////////////////////
BOTH EMPLOYEES
AND VENDORS
COMING IN NEED
TO BE AWARE OF
THE SECURITY
POLICIES OR
RISK BEING
DENIED ACCESS
TO SENSITIVE
EQUIPMENT AND
OPERATIONS
SOFTWARE.
and robust security policies. The added
connectivity of these devices makes it easy
for outsiders who guess or steal passwords to
penetrate the control environment.
A reasoned – and steady – approach
for deploying cybersecure solutions
Fortunately, there are several steps that oil
and gas companies can pursue in order to
minimise the threat to cyberattack-driven
disruptions to business continuity:
Step one involves building firewalls to keep
outsiders from entering the corporate
network and gaining access to control
systems. This will work in environments
where entry points into the system are
somewhat limited. However, in an IIoT
world, cybersecurity will need to be built into
every control system hardware and software
component, protecting every node that has
computing capability.
Step two requires a gradual approach to
strengthening cybersecurity infrastructure.
Responsible control systems manufacturers
are now designing cybersecurity into every
module they build and deliver so that clients
don’t have to concern themselves with
building in cybersecurity after they purchase
a new product.
INTELLIGENTCIO
41