Media Relations for a Connected World
SRS Tech PR client Icon Labs featured on cover of PenTest Magazine
SCADA protocols themselves are often inherently insecure. They may lack basic security measures. Instead they often rely on “security by obscurity” or on isolation from public networks for security. Without security measures such as authentication and encryption, the underlying protocols provide an easy avenue for hackers wishing to attack SCADA devices. Firewalls provide a simple and effective layer of security and have long been used to protect home and enterprise networks. A small, SCADA aware firewall can be used to protect devices in SCADA devices from a wide range of cyber-attacks. Learn how by controlling who the SCADA device talks to, most attacks can be blocked before a connection is even established.