top of page
![](https://static.wixstatic.com/media/34c077_574821dcaa924717bdbcf531288ead78~mv2.gif/v1/fill/w_1688,h_1688,al_c,pstr/34c077_574821dcaa924717bdbcf531288ead78~mv2.gif)
Search
![](https://static.wixstatic.com/media/e3de0633fc9607c1fb1335c40d796247.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/e3de0633fc9607c1fb1335c40d796247.webp)
![Attention Industrial Control System Owners: "Lay some pavement and soon a road begins to form!"](https://static.wixstatic.com/media/e3de0633fc9607c1fb1335c40d796247.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/e3de0633fc9607c1fb1335c40d796247.webp)
Stephen Goldsworth
Jul 17, 2020
Attention Industrial Control System Owners: "Lay some pavement and soon a road begins to form!"
Benefits of a Cybersecurity Risk Assessment approach to developing a solid Cybersecurity Plan vs. moving immediately to best practices.
![](https://static.wixstatic.com/media/34c077_9cbf363493e84d69bb07ce3c71277f72~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_9cbf363493e84d69bb07ce3c71277f72~mv2.webp)
![Cyber-Psychology in the Water and Wastewater Industries](https://static.wixstatic.com/media/34c077_9cbf363493e84d69bb07ce3c71277f72~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_9cbf363493e84d69bb07ce3c71277f72~mv2.webp)
Stephen Goldsworth
Apr 18, 2020
Cyber-Psychology in the Water and Wastewater Industries
Psychology is one of the biggest obstacles to overcome in making Cybersecurity a substantial part of the Water and Wastewater Business Case.
![](https://static.wixstatic.com/media/34c077_0813f1143fcb45f2a6324b32ded16a7a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_0813f1143fcb45f2a6324b32ded16a7a~mv2.webp)
![15 Cybersecurity Fundamentals](https://static.wixstatic.com/media/34c077_0813f1143fcb45f2a6324b32ded16a7a~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_0813f1143fcb45f2a6324b32ded16a7a~mv2.webp)
Stephen Goldsworth
Apr 7, 2020
15 Cybersecurity Fundamentals
Great list originally published by WaterISAC on the 15 Cybersecurity Fundamentals for Water and Wastewater Utilities
![](https://static.wixstatic.com/media/34c077_d55ecd52ea1e40129cb3862219009644~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_d55ecd52ea1e40129cb3862219009644~mv2.webp)
![Cover your ASSets when it comes to Cybersecurity](https://static.wixstatic.com/media/34c077_d55ecd52ea1e40129cb3862219009644~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_d55ecd52ea1e40129cb3862219009644~mv2.webp)
Stephen Goldsworth
Mar 31, 2020
Cover your ASSets when it comes to Cybersecurity
The foundation of an effective operational technology (OT) Cybersecurity strategy is documented knowledge about the specific process...
![](https://static.wixstatic.com/media/34c077_6479156e1e324cc2a754089313d7656a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_6479156e1e324cc2a754089313d7656a~mv2.webp)
![Cybersecurity Risk Awareness First](https://static.wixstatic.com/media/34c077_6479156e1e324cc2a754089313d7656a~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_6479156e1e324cc2a754089313d7656a~mv2.webp)
Stephen Goldsworth
Mar 31, 2020
Cybersecurity Risk Awareness First
Awareness and acknowledgement of risk must occur before you can manage it.
![](https://i.ytimg.com/vi/q40eVyuxfW8/maxresdefault.jpg)
![Funny, but too close to reality!](https://i.ytimg.com/vi/q40eVyuxfW8/maxresdefault.jpg)
Stephen Goldsworth
Mar 30, 2020
Funny, but too close to reality!
Properly managed administrator credentials are one of the areas that has a low-cost but high-benefit impact to your Cybersecurity posture!
![](https://static.wixstatic.com/media/34c077_26feaad2749f457a90cd022e1c28a04c~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_26feaad2749f457a90cd022e1c28a04c~mv2.webp)
![Considerations for New Remote Workforce...All the ears in your home](https://static.wixstatic.com/media/34c077_26feaad2749f457a90cd022e1c28a04c~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_26feaad2749f457a90cd022e1c28a04c~mv2.webp)
Stephen Goldsworth
Mar 24, 2020
Considerations for New Remote Workforce...All the ears in your home
I don't think this is an irrational step, dependent of course on the sensitivity and confidentiality requirements of the information...
![](https://i.ytimg.com/vi/7htBb-w9fNw/sddefault.jpg)
![Changing passWORD habits to passPHRASE culture...long journey but we can smile along the way :)](https://i.ytimg.com/vi/7htBb-w9fNw/sddefault.jpg)
Stephen Goldsworth
Mar 18, 2020
Changing passWORD habits to passPHRASE culture...long journey but we can smile along the way :)
Use passphrases instead of passwords or complex nonsensical strings to strike the balance between easy to remember and adequate strength....
![AWIA Fact Sheet from EPA](https://static.wixstatic.com/media/34c077_246e0c370d554e0f91850ff13c55b44e~mv2.png/v1/fill/w_514,h_386,fp_0.50_0.50,q_95,enc_auto/34c077_246e0c370d554e0f91850ff13c55b44e~mv2.webp)
Stephen Goldsworth
Mar 10, 2020
AWIA Fact Sheet from EPA
Posting in case anyone is not yet aware of the drinking water utility requirement. Dates are approaching fast.
![Impressive Move from NJ Board of Public Utilities: State Mandated Cybersecurity](https://static.wixstatic.com/media/a27d24_facc3b542166442e8141769d690d39b9~mv2.png/v1/fill/w_514,h_386,fp_0.50_0.50,q_95,enc_auto/a27d24_facc3b542166442e8141769d690d39b9~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
Impressive Move from NJ Board of Public Utilities: State Mandated Cybersecurity
A document was passed to me from an industry resource regarding state-mandated Cybersecurity program requirements. The document is from...
![9 smart questions to ask when evaluating Cybersecurity certification programs](https://static.wixstatic.com/media/34c077_2cc59200ae24407b8126d06cb79960f3~mv2.png/v1/fill/w_375,h_190,fp_0.50_0.50,q_95,enc_auto/34c077_2cc59200ae24407b8126d06cb79960f3~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
9 smart questions to ask when evaluating Cybersecurity certification programs
Great post by ISASecure on Cybersecurity certification programs! Original article can be found here #ics #ot #isa #industialcontrol...
![FBI recommends passphrases over password complexity](https://static.wixstatic.com/media/34c077_f5d81b6e3e0c41bbaf3680bac0fb1d72~mv2.png/v1/fill/w_514,h_386,fp_0.50_0.50,q_95,enc_auto/34c077_f5d81b6e3e0c41bbaf3680bac0fb1d72~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
FBI recommends passphrases over password complexity
Some practical knowledge that may not be so common regarding passwords, great info from FBI. Original article can be found here...
![Industrial Cybersecurity: Asking the right Questions](https://static.wixstatic.com/media/34c077_65b5b119aeb04891bca109c947ce3bc2~mv2.png/v1/fill/w_514,h_377,fp_0.50_0.50,q_95,enc_auto/34c077_65b5b119aeb04891bca109c947ce3bc2~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
Industrial Cybersecurity: Asking the right Questions
I appreciate published works from major manufacturers like Rockwell on the subject of Cybersecurity for many reasons, not the least of...
![](https://static.wixstatic.com/media/34c077_b362a8b32e3042799cebb5b769388f00~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_b362a8b32e3042799cebb5b769388f00~mv2.webp)
![First Industrial Controller Certified to IEC 62443-4-2 Demonstrates Strengthened Security](https://static.wixstatic.com/media/34c077_b362a8b32e3042799cebb5b769388f00~mv2.jpg/v1/fill/w_312,h_255,fp_0.50_0.50,q_90,enc_auto/34c077_b362a8b32e3042799cebb5b769388f00~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
First Industrial Controller Certified to IEC 62443-4-2 Demonstrates Strengthened Security
ISA 62443 is making a positive impact on ICS manufacturers who are following the Security Level model for Cybersecurity in development of...
![Remote access according to IEC 62443 Architecture - Ignition forum post](https://static.wixstatic.com/media/34c077_a62cb35315e74106a77d0b524818dfd5~mv2.png/v1/fill/w_514,h_386,fp_0.50_0.50,q_95,enc_auto/34c077_a62cb35315e74106a77d0b524818dfd5~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
Remote access according to IEC 62443 Architecture - Ignition forum post
Helpful post from some Inductive Automation Ignition users about adhering to ISA 62443 Cybersecurity practices when setting up a secure...
![](https://static.wixstatic.com/media/34c077_c28e98da5eab4bd5a20821933031b1f8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_c28e98da5eab4bd5a20821933031b1f8~mv2.webp)
![2020 CrowdStrike Global Threat Report](https://static.wixstatic.com/media/34c077_c28e98da5eab4bd5a20821933031b1f8~mv2.jpg/v1/fill/w_514,h_349,fp_0.50_0.50,q_90,enc_auto/34c077_c28e98da5eab4bd5a20821933031b1f8~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
2020 CrowdStrike Global Threat Report
This is a must read for anyone that feels the ongoing threat of Cybersecurity is overstated. Page 22/23 documents the Dharma ransomware...
![](https://static.wixstatic.com/media/d0a8e4173846447b82803dcd0299e216.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/d0a8e4173846447b82803dcd0299e216.webp)
![IEC 62443: The New Gold Standard for Network Segmentation in ICS and SCADA Networks](https://static.wixstatic.com/media/d0a8e4173846447b82803dcd0299e216.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/d0a8e4173846447b82803dcd0299e216.webp)
Stephen Goldsworth
Mar 9, 2020
IEC 62443: The New Gold Standard for Network Segmentation in ICS and SCADA Networks
In relation to my previous post regarding the ransomware disruption to an OT system, this article was published by Palo Alto in 2014...
![](https://static.wixstatic.com/media/34c077_c4710ec651b446d791659a58a5a39e21~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_c4710ec651b446d791659a58a5a39e21~mv2.webp)
![Alert (AA20-049A) from CISA - Ransomware Impacting Pipeline Operations](https://static.wixstatic.com/media/34c077_c4710ec651b446d791659a58a5a39e21~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_c4710ec651b446d791659a58a5a39e21~mv2.webp)
Stephen Goldsworth
Mar 9, 2020
Alert (AA20-049A) from CISA - Ransomware Impacting Pipeline Operations
This recent alert from CISA discusses the immediate impact ransomware can have to an ICS environment when segmentation and data flow...
![](https://static.wixstatic.com/media/34c077_95f78d0035a54990a9a6e56525798ab2~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/34c077_95f78d0035a54990a9a6e56525798ab2~mv2.webp)
![WinCC Open Architecture V3.17 achieves ISA/IEC 62443-4-2 Certification!](https://static.wixstatic.com/media/34c077_95f78d0035a54990a9a6e56525798ab2~mv2.jpg/v1/fill/w_514,h_386,fp_0.50_0.50,q_90,enc_auto/34c077_95f78d0035a54990a9a6e56525798ab2~mv2.webp)
Stephen Goldsworth
Mar 8, 2020
WinCC Open Architecture V3.17 achieves ISA/IEC 62443-4-2 Certification!
Security enhancements V3.17 received IEC 62443-4-2 certification. Additionally, new security measures have been implemented, such as...
bottom of page