Skip to content
info@johnstek.com Corporate HQ: Coral Gables, FL, USA +1.786.375.9020 Latin American HQ: Asuncion, Paraguay +595.213.277.395
Search:
Search
JohnsTek
Strategic Technology Engineering
JohnsTekJohnsTek
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact
  • About
  • Products & Services
  • Cyber Risk
    • Managed Security Services Provider (MSSP)
    • Cyber Risk Management Solution
  • Markets
    • Commercial
    • Government
  • Resource Center
  • Contact

Industrial Control Systems and SCADA Vulnerability, Employees Email Accounts

You are here:
  1. Home
  2. Blog
  3. Industrial Control Systems and SCADA…
Jun232017
BlogCyberSecurityLooseLips_Phishing

“Loose Lips Sink Ships”, that age old Force Protection measure from WWII posters has been replaced with “Don’t Click on That Link” warnings in an effort to protect critical infrastructure and corporate enterprises.  It is about as serious as it can get, with a simple click of a link, a selection of a file icon, or a mouse cursor hover over an image, the worst can happen!  An electrical grid can become infected with a Ransomware virus that shuts down service and causes disruption to one of our basic needs of survival. Or, worse, the infection may be a worm that embeds itself into the utility system, causing physical damage when the worm’s code executes and causes critical infrastructure systems to overrun and damage itself.

We see infestations already in electrical grids, traffic lights, and other Internet-of-Things control systems that are not properly protected by current updates to applications, or patches. The threat is real, and the vulnerability may be reading this article right now.

What can you do about it? Be paranoid. All email recipients must not be quick to click on email links or attempt to open attached files that were not expected.  Take an extra second and look at the link or file.  Ask yourself:

Does it look like something work related that you normally receive?

Do I recognize the account that sent this?

Those are two separate questions to ask yourself before acting upon the email attachment or link.  Just because you recognize the name that displays on the FROM line of the email, does not mean the email is legitimate, or that it actually came from that individual.  Hackers have been known to spoof contacts listed in the recipients contact list. A quick hover over the SENDER name could reveal a different email address hidden beneath.

Users are encouraged to contact their IT department if they feel that they receive a suspicious email.  It is best to know the corporate policy on how to act before being faced with the unfortunate situation when a decision has to be made.

Remember, “Only You Can Prevent Forest Fires!” Another relevant propaganda campaign of days gone by!

 

Please contact us for more information!

Author:  Scott A. Johnston @JTI_SJohnston (Twitter)
Scott A. Johnston is the President and Founder of JohnsTek, Incorporated.
www.johnstek.com
@JOHNSTEK (Twitter)
Categories: Blog, CyberSecurityBy Scott JohnstonJune 23, 2017
Tags: Critical InfrastructureCybersecurityICSSCADA

Author: Scott Johnston

https://johnstek.com

Post navigation

PreviousPrevious post:Alert Dispatch 23JUN17 ~ By JohnsTekNextNext post:Corporate Cyber Risk Management Goes Beyond Ransomware Protection

Related posts

CyberShield
Stay Secure During the Holiday Season!
December 13, 2020
Cafe Photo
Data Protection In Cafes And Restaurants
February 10, 2019
JohnsTek Capability Statement 2019
February 9, 2019
EOC_ops
Five Things Local Governments Can Do Now To Prepare For Disaster Response
January 11, 2019
Cyber_Pentagon_Transparent
Five Things You Can Do Now To Implement Or Improve Cybersecurity
January 8, 2019
IBM_JohnsTek
JohnsTek Partners with IBM Security!
November 19, 2018
Shortcuts
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
JohnsTek News
  • CyberShield
    Stay Secure During the Holiday Season!
    December 13, 2020
  • Cafe Photo
    Data Protection In Cafes And Restaurants
    February 10, 2019
  • JohnsTek Capability Statement 2019
    February 9, 2019
Security Alerts
  • Alert Dispatch 23JUN17 ~ By JohnsTek
    June 23, 2017
  • Alert Dispatch 5JUN17 ~ By JohnsTek
    June 5, 2017
  • Alert Dispatch 18MAY17 ~ By JohnsTek
    May 18, 2017
Intel Brief
  • The Intel Brief 02OCT17 ~ By JohnsTek
    September 28, 2017
  • The Intel Brief 16AUG17 ~ By JohnsTek
    August 16, 2017
  • The Intel Brief 16JUN17 ~ By JohnsTek
    June 16, 2017
Press Releases
  • JohnsTek Capability Statement 2019
    February 9, 2019
  • IBM_JohnsTek
    JohnsTek Partners with IBM Security!
    November 19, 2018
  • Veterans Day
    JOHNSTEK WISHES YOU A HAPPY VETERAN’S DAY!
    November 10, 2017
Copyright © 2022 JohnsTek | All Rights Reserved.
  • About Us
  • Offerings
  • Products & Services
  • Commercial
  • Government
  • Privacy
  • Terms
Footer