Comments 1 - 18 of 18 Search these comments
Most companies have publicly facing systems exposed to the Internet,
porkchopexpress saysThat's definitely true. For industrial control systems, etc., they should require VPN or Citrix to access. I'm just saying that most companies with Internet-facing systems will always be a potential point of entry to exploit and get inside the network.Most companies have publicly facing systems exposed to the Internet,
That's fine for companies like Amazon that rely on public access. There is no reason that pipelines and power stations need a "public facing system" through the common internet. If such entities need remote monitoring or control, use an old fashioned connection method (like a point to point modem) or if a series of connectionless protocols, use something other than TCP/IP.
In my industry, we don’t allow critical equipment control systems to be connected to the Internet or even for the wireless communications to be reachable by someone not on the terminal.
Shaman saysIn my industry, we don’t allow critical equipment control systems to be connected to the Internet or even for the wireless communications to be reachable by someone not on the terminal.
And how is that not a standard practice for all critical infrastructure?
HeadSet saysShaman saysIn my industry, we don’t allow critical equipment control systems to be connected to the Internet or even for the wireless communications to be reachable by someone not on the terminal.
And how is that not a standard practice for all critical infrastructure?
And voting?
Given I live and breathe cybersecurity
So this is how to cover up an economic collapse, blame every shortage on a cyber attack!?
@porkchopexpressI think it could go either way. There's no question that it could be outsiders (or gov't) leveraging exploits in Exchange, Solar Winds, PulseVPN, etc. This is why the Solar Winds hack was so brutal...so many companies own the product and hackers have likely had persistence for ages in all these companies, and probably still do because the damage is done.
porkchopexpress saysGiven I live and breathe cybersecurity
I'm curious to know your opinion on the reality of all these hacks being done by individuals unaffiliated with the target companies by exposing exploits in the networking stack or via software malware?
My personal feeling is that hollywood type hacking of systems is almost impossible - and that this endeavor almost always requires the help of a target company employee with access to non-public information.
What say you?
There's no question that it could be outsiders (or gov't) leveraging exploits in Exchange, Solar Winds, PulseVPN, etc.
How about chips in the motherboards of PCs and Servers having a built in back door? A little present from friends in China where these products are made.That too. Lenovo-gate. Who knows what else lurks in hardware, firmware and software these days.
https://www.abc.net.au/news/2021-05-31/cyber-attack-shuts-down-global-meat-processing-giant-jbs/100178310
"The world's largest meat processing company, JBS Foods, has fallen victim to cyber attacks that have shut down production around the world, including in Australia...
...It could be a day, it could be a week, it could be multiple weeks.
The longer it goes, the worse the situation in terms of supply and disruption. "
Energy and meat producers have been frequent targets of the globalist climate alarmists for a long time now. They warned us about a pandemic, and all of a sudden a pandemic shows up. They warned us of an increase in cyber attacks, lo-and-behold here they are and hitting convenient targets for them."
More on the way, I'm sure. Expect the things that directly affect you to be hit. Keep cash on hand, as well as other non-perishables you may need to avoid inconvenience during any of the attack-related disruptions.