Segmentados Administración sistemas y redes TI

Contenido Segmentados Administración sistemas y redes TI

En esta sección se ofrecen contenidos de interés para los profesionales de TI que se ocupan de administrar sistemas, servicios, aplicaciones, equipos de redes, soporte técnico y de usuarios, controles de acceso y especialistas de SOC o de respuesta a incidentes de TI.

Dangers of drones in industrial settings

Posted on 21/01/2021, by
INCIBE (INCIBE)
dangers of drones in industrial settings
The attacks on the Saudi Aramco oil refinery have highlighted the vulnerabilities of these plants against physical attacks using drones. There’s a wide variety of physical and cyber attacks that use drones, from launching explosives, to capturing images, invasion of privacy or taking screenshots of Wi-Fi traffic, so companies should take new defense measures in order to protect their assets
Etiquetas

SweynTooth: Bluetooth in the spotlight

Posted on 17/12/2020, by
INCIBE (INCIBE)
Sweyntooth: Bluetooth in the spotlight
Wireless communications encompass a set of protocols that are widely used in some industrial sectors. In particular, building automation is based on these protocols, mainly using the BACNET and Lontalks protocols, but also making use of new ZigBee and Bluetooth based devices for IIoT. This article will provide information on SweynTooth, a set of vulnerabilities that affect Bluetooth technology.

INCIBE-CERT technical webinars

Posted on 24/09/2020, by
INCIBE (INCIBE)
INCIBE-CERT technical webinars
With the aim of increasing cybersecurity knowledge, INCIBE-CERT has published a series of webinars in video format, so that, in a light and entertaining way, knowledge and technical aspects of cybersecurity can be expanded in various areas of interest, for both INCIBE-CERT's technical audience and anyone interested in cybersecurity.

Preventing the leaking of information in ICS

Posted on 28/05/2020, by
INCIBE (INCIBE)
Preventing the leaking of information in ICS
Exfiltration of data, or information leakage, poses a threat to all companies throughout the world. It is important to know the possible ways information can get out to control them and avoid a loss of information in our organisation. Since in industry the most important factor is availability, this threat has to be put into perspective.

Teleworking: VPN and other recommendations

Posted on 30/03/2020, by
Adrián Flecha (INCIBE)
Teletrabajo: VPN y otras recomendaciones
In this article, we review virtual private networks, or VPNs, one of the most important measures for teleworking, as they allow a connection to the organization through secure networks, and the advantages they offer, as well as additional security recommendations to help ensure cyber security.

NTP, SNTP and PTP: what time synchronization do I need?

Posted on 05/03/2020, by
INCIBE (INCIBE)
NTP, SNTP and PTP
Time synchronization in industrial devices is a critical factor. In terms of time, industrial processes and the programming logic of industrial devices have specific needs. These may require specific accuracy that determines the need to use one protocol or another, as well as dependencies on cost or on the network infrastructure itself. Explaining the main differences is key when using one or another in industrial infrastructures. Just as each protocol has different nuances, there are certain differences to be taken into account within security.

Safety recommendations for electric vehicle charging stations

Posted on 06/02/2020, by
INCIBE (INCIBE)
station
Over the last few years we have seen how electric vehicles have experienced a boom in terms of their development and retail and, along with them, the deployment of their charging points. In this article we will discuss a series of requirements, in terms of security, that should be implemented in these charging stations in order to ensure their security.

Industrial security 2019 in figures

Posted on 23/01/2020, by
INCIBE (INCIBE)
Industrial security 2019
Throughout the year 2019, we have worked on the detection, treatment and preparation of notices related to cybersecurity in industrial environments, classifying them based on the sector, manufacturer, criticality, etc. This article summarises this work and makes a brief prediction of the events that will take place in 2020.