Cyber security essentials: Part III

Posted by Josh Bozeman on January 21, 2015 @ 12:11 pm

The third and final installment of the Cyber Security Essentials series identifies best practices for protecting your internal and external networks, components of well-secured networks, and other dangers to be aware of.

ICourtesy: Maverick Technologiesn Parts I & II of this article, we outlined some of the most common cyber attacks, and got some great feedback from an ethical hacker on system architecture that can protect your network. In this final section we... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags:

Cyber security essentials: Part II

Posted by Josh Bozeman on January 9, 2015 @ 10:22 am

The second installment of the Cyber Security Essentials series looks at what a robust network security system looks like, with insights from an ethical, professional hacker.

Courtesy: Maverick TechnologiesIn Part I of this series, we outlined some of the most common cyber attacks and some of the simple ways a user can guard against them. I sat down with an ethical hacker to hash out what robust network security looks like. The interview: He’s a hacker, but it’s okay… A long-time friend of mine has a pretty unique job; he’s an ethical ... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags:

Cyber security essentials: Part I

Posted by Josh Bozeman on January 7, 2015 @ 5:11 pm

The first installment of the Cyber Security Essentials series introduces the topic of cyber security and outlines the major concepts to be aware of.

Courtesy: Maverick Technologies “What’s the worst that could happen?” This question is at the heart of so many plant-wide discussions. Deliberations on safety interlocks, alarm rationalization, hazard analyses, job safety plans, and process equipment design routinely center on this premise. Why, then, do some facilities have a lackadaisical approach to the layout and protection of their network security? In this first installment, we’ll introduce the topic of cyber security and outline the major concepts ... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags:

How to upgrade your control system with limited resources, budget

Posted by Michel Ho on January 5, 2015 @ 5:07 pm

Take advantage of your system integrator’s time and expertise by allowing them to execute acceptance testing methods, freeing up plant personnel.

Are you faced with limited resource and shrinking budget when upgrading your control system? You are not alone. Many of the customers we work with face the same challenges. One way to address both issues at the same time is to have effective factory acceptance testing (FAT) and site acceptance testing (SAT). No matter what the scope is, the strategies to keep testing at a minimum while maintaining effectiveness remain the same. For FAT, those are:
  1. Agree on the FAT plan prior to the actual FAT. This will help to identify gaps and prepare for them.
  2. Let the system integrator test 100% on their internal testing and a sample size during FAT for non critical items such as tag description, engineering unit, I/... Continue Reading

    Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags:

Webinar recap: High Performance–HMI Done Right

Posted by MAVERICK Leadership Team on December 17, 2014 @ 8:00 am

Webinar recap: High Performance–HMI Done Right We had a great turnout at the High Performance–HMI webinar last week, and we’re glad so many of you could attend. Chad Harper and Lee Swindler were on hand to demonstrate the graphical downfalls of many older human-machine interfaces (HMIs) and discuss the benefits of transitioning to High Performance–HMIs. Thank you to everyone who attended, and especially to those who participated by submitting questions. If you couldn’t make it, you can watch the webinar here or read on for a recap of what you missed: The evolution of HMI The information communicated by the first HMIs wasn’t any different from that of modern-day HMIs, but the way the original HMIs presented it was much simpler. A... Continue Reading

Continue ReadingLeave a Comment
VN:F [1.9.22_1171]
Tags: