Download document () of 20
In our hyper-connected world it's critical for organizations of any size to be cyber aware. As new system technologies are onboarded and legacy systems are being updated and recalibrated, cybersecurity must now become a standard requirement for OT networks. In addition, maintaining security awareness across all functions, from legal to supply chain management (SCM), finance, engineering, IT and OT, is vital. Tracking, monitoring and applying good cybersecurity hygiene to your assets will help keep your operation running smoothly.  

1. Know your assets and patch them regularly

Start by inventorying all your network assets. Keeping an up-to-date, detailed record of all your assets will help you better manage and maintain them. Ensure they are within the warranty period and receive security updates regularly. It's also important to establish a process to monitor vendor websites for patches so you can deploy those fixes and update devices expeditiously.

2. Purchase secure products

When establishing or auditing your supply chain management (SCM) process, make sure you're considering security when making purchase decisions. Choose products that not only meet quality standards, but follow cybersecurity guidelines as well.

3. Connect and configure assets

When evaluating your operation, ensure that each asset is connected and configured with the most secure device and network configurations. Not every device is shipped with secure default settings—set them if they don’t exist. Review the hardening guidelines and industry standards that govern devices.

4. Monitor devices and investigate anomalies

Ensure security is a key focus of all operational practices. Monitor every device, network and facility log. Use a performance baseline to know when things go awry. Conduct a thorough investigation to understand and address any anomalies.

5. Securely dispose of devices

Devices contain valuable information. Securely erasing any information that could be abused [PII, Device Configurations etc.] is an absolute must. In addition, follow the product guidelines on how to properly to dispose of the device.

Take the lead on cybersecurity

Is your organization maintaining security awareness across all functions?  Use our graphic and presentation notes to help educate your team on the importance of OT network security at every level. 

Learn more