INFOGRAPHIC
“
THE LARGEST NUMBER OF
THREATS COME FROM THE INTERNET,
WHICH OVER THE YEARS HAS BECOME
THE MAIN SOURCE OF INFECTION FOR ICS.
Kaspersky Lab ICS CERT recommends
the implementation of the following
technical measures:
• Regularly update operating systems,
application software and security
solutions on systems that are part of the
enterprise’s industrial network
• Restrict network traffic on ports and
protocols used on edge routers and inside
the organisation’s OT networks
• Audit access control for ICS components
www.intelligentcio.com
in the enterprise’s industrial network and
at its boundaries
• Deploy dedicated endpoint protection
solutions on ICS servers, workstations
and HMIs to secure OT and industrial
infrastructure from random cyberattacks;
and network traffic monitoring, analysis
and detection solutions for better
protection from targeted attacks.
• Provide dedicated training and support
for employees as well as partners and
suppliers with access to your network n
INTELLIGENTCIO
25