Operational practice shows that although programming tools and applications sometimes provide a relatively high level of security, their capabilities are not exploited – mostly out of convenience or ignorance of how to set them up correctly. Let’s try to think about the following tips and, where it makes sense, actively promote them.
In recent days, we have seen an attempt to abuse our company through fraudulent emails signed by our CEO. We would like to ask you for increased caution and emphasis on cyber-security.
Let’s look at the classic control system topology from a safety point of view and find some rules according to which the control system should be designed and installed to be able to be successfully handed over to the operator from a cybersecurity point of view – while operating and servicing comfortably and efficiently.
Establishment of a new project and efficient creation of data points. Mass operations on data points, creation of repetitive parts of the project. Creation of diagrams, mass connection of repeating parts of diagrams.