Frequently Asked Questions

Our team of cybersecurity experts continually research, challenge, and put into place strategies, documentation, and tools to meet local, corporate or global requirements for OT cyber security.

How do security card readers enhance the protection of OT equipment?

Question:How do security card readers enhance the protection of OT equipment? Answer: Security card readers enhance the protection of OT equipment by providing a controlled ...
Read More →

Why is physical security crucial for OT equipment?

Question:Why is physical security crucial for OT equipment? Answer: Physical security is crucial for OT equipment because it protects against unauthorized access, tampering, theft, and ...
Read More →

Why is it crucial to manage and update non – connected devices?

Question: Why is it crucial to manage and update non-connected devices? Answer: Managing and updating non-connected devices is crucial to ensure they are protected against ...
Read More →

What are the best methods to identify non-connected OT devices?

Question:What are the best methods to identify non-connected OT devices? Answer:The best methods to identify non-connected OT devices include conducting physical audits,utilizing portable scanning tools, ...
Read More →

In the case of a cyber emergency, how can patches be applied effectively, for OEM vendors or otherwise?

Question:In the case of a cyber emergency, how can patches be applied effectively, for OEM vendors orotherwise? Answer: In a cyber emergency, patches can be ...
Read More →

What are the core components of an effective Emergency Response Plan (ERP) for OT environments?

Question:What are the core components of an effective Emergency Response Plan (ERP) for OTenvironments? Answer: An effective ERP for OT environments should include the identification ...
Read More →

What precautions should be in place if WLAN is used as a connection to OT systems?

Precautions for WLAN connecting with OT systems? Question: What precautions should be in place if WLAN is used as a connection to OT systems? Answer: ...
Read More →

Why are OT – specific password policies crucial for overall cybersecurity?

Question:Why are OT-specific password policies crucial for overall cybersecurity? Answer: OT-specific password policies are crucial because they are tailored to the unique requirementsand constraints of ...
Read More →

Under what circumstances is WLAN access to OT systems considered safe?

Question:Under what circumstances is WLAN access to OT systems considered safe? Answer: WLAN access to OT systems can be considered safe when it is implemented ...
Read More →

What are the core components of an effective Emergency Response Plan (ERP) for OT environments?

Question:What are the core components of an effective Emergency Response Plan (ERP) for OTenvironments? Answer: An effective ERP for OT environments should include the identification ...
Read More →

How frequently should organizations review and update cybersecurity practices for automation systems?

How often should organizations update cyber practices for automation? Question: How frequently should organizations review and update cybersecurity practices for automation systems? Answer: Organizations should ...
Read More →

Why is it essential to align cybersecurity measures with plant modifications?

Question:Why is it essential to align cybersecurity measures with plant modifications?   Answer: Aligning cybersecurity measures with plant modifications is essential because any change in ...
Read More →

What are the key elements of a strong password policy tailored for OT systems?

Question:What are the key elements of a strong password policy tailored for OT systems?   Answer:A strong password policy for OT systems should include elements ...
Read More →

What risks are associated with external media device access in OT systems?

Question:What risks are associated with external media device access in OT systems? Answer: External media device access in OT systems can introduce several risks, including ...
Read More →

How can OT environments implement effective access control for external devices?

Question:How can OT environments implement effective access control for external devices? Answer: OT environments can implement effective access control for external devices through a combination ...
Read More →

How does the hardware firewall differ in IT versus OT environments?

Question:How does the hardware firewall differ in IT versus OT environments? Answer:Hardware firewalls in IT environments are typically configured for maximum data protectionand confidentiality, with ...
Read More →

Why is a dedicated hardware firewall essential between business IT and OT?

Question: Why is a dedicated hardware firewall essential between business IT and OT? Answer:A dedicated hardware firewall is essential between business IT and OT networks ...
Read More →

How can organizations identify areas of highest risk of infection in their OT setup?

Question: How can organizations identify areas of highest risk of infection in their OT setup? Answer: Organizations can pinpoint high-risk areas in their OT setup ...
Read More →

What are the key data communication points that require safely implementing AV protection in your OT environment?

What are the key points for secure AV implementation in OT? Question: What are the key data communication points that require safely implementing AV protection ...
Read More →

What is the role of a dedicated hardware firewall in integrating IT and OT, and how do their functions vary?

Question: What is the significance of having a dedicated hardware firewall in bridging the gap between IT and OT environments, and how do their functionalities ...
Read More →

What criteria should be considered when selecting a firewall for OT environments?

Question: What criteria should be considered when selecting a firewall for OT environments? Answer: When venturing to select a firewall for OT environments, organizations must ...
Read More →
Scroll to Top