Category Archives for "24UP Support"
In June 2021, in response to a security vulnerability, Microsoft released a Windows update (KB KB5004442) to harden the DCOM component of Windows. Organizations should be aware that many industrial control system applications utilize DCOM protocols. This update can impact the ability of networked devices to communicate, resulting in effects such as the inability to use HMI or SCADA software, or loss of historical tag data.
Some impacted applications include: RSLogix 5/500/5000, RSLinx Classic, FactoryTalk applications, ThinManager, and KEPServer Enterprise.
Champion recommends that organizations review their installed software for use of DCOM and the potential impact of this update. Most ICS software vendors have published information on their affected software as well as possible mitigations for any impacts from applying these updates. For actively maintained software, vendors are working to deliver patches for their software to work with the update. Until these patches are available, it will be necessary to either postpone installation of the Windows updates or apply mitigations to disable the new DCOM hardening features. Be aware, however, that if the Windows updates are installed, it will not be possible to disable the DCOM hardening features after March 14, 2023.
Champion can work with you to help you decide which Windows updates are appropriate to install and deliver those updates to your critical ICS systems. Champion can also provide recommendations on working with software that may no longer be supported by the vendor or assist you with planning upgrade paths. Finally, when things do break, Champion can assist with recovery. We will continue to monitor the situation and be prepared to keep our clients informed.
Contact our OT Solutions Group at otsolutions@champtechnology.com.
Additional information on these changes can be found here: Microsoft.com Support, Microsoft.com MSRC
Apache Log4j is one of the most popular web server logging utilities used in thousands of software applications. The Apache Log4j logging service (v 2.14.1 and below) vulnerability can allow malicious users to remotely execute code which can compromise the integrity of the system.
Any software with a web-based client or configuration component may be affected if it uses the Apache Log4j library. Some of these valuable assets can include Virtualization Hypervisor servers, accounting software packages, and software that runs on firewalls protecting your environments.
If any active machines at your facility have vulnerable software with no readily-available fix, we recommend turning the off the machine(s) until a fix has been found. This is recommended for non-business critical assets only.
Champion is reaching out to our OT software partners and vendors to compile a list of known affected products, along with remediation strategies. We can also assist in verifying that your OT environments are safe.
Review the list
More information on this vulnerability can be found at these sites:
Statement from CISA Director Easterly on “Log4j” Vulnerability | CISA
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
Is your control system approaching its end-of-life product lifecycle?
Does your system rely on replacement parts that are increasingly harder to find?
Is it more difficult to find or hire personnel who have experience with your control system?
It may be time to upgrade.
But – How to choose the right system?
When you have identified that it’s time to upgrade your control system, you want to explore all the options that are available to you. It is especially important to find a control system that best fits your application. For example: if you need to upgrade a controller, you would avoid upgrading the entire control system.
Some manufacturers’ control system platforms offer a variety of upgrade and migration solutions and strategies. For some end users, there are migration strategies that may be a better solution than a complete upgrade. In other cases, a complete system upgrade may be the answer. Most of the time the best solution is somewhere in between.
How would you go about choosing which solution or strategy is right for your application? Maybe your company is standardizing on a single platform, which simplifies your options. But sometimes the field of options is wide open.
Understanding your unique needs and expectations is vital to choosing the proper system. This can be a challenging task if you don’t have the required information.
Champion understands the challenge of a new system meets your requirements, and how it will function or grow for your future needs. Our team specializes in leading clients through the process of choosing a control system that is right for their specific needs – and their budgets. As part of our process, we will work with your team to define your goals and expectations, conduct an assessment, and recommend the best, unbiased solution that aligns with your goals. Bring your control system from the past into the present, while you plan for the future. Contact us today for an assessment to plan your systems roadmap.
Champion Technology Services, Inc. is an industrial control systems integrator that provides OT services across the United States and abroad. Our team includes ISA/IEC 62443 Cybersecurity Experts and GICSP (Global Industrial Cyber Security Professional)-certified professionals in the latest NIST standards. We help small, medium, and large companies assess their existing control systems and implement protocols that meet their facility’s requirements while maintaining our status as an unbiased third-party solution provider.
What started out as a two-person endeavor in late 2000, steadily matured into a team of 125 people across the country in 2020. Champion has achieved amazing milestones – growing one office into nine, being part of the LSU Top 100, being named Control Engineering’s Systems Integrator Giant, and achieving steady growth year-over-year.
None of this would have been possible without our dedicated team, continual process improvement, and of course – our clients. We are thankful and humbled by our clients’ unwavering dedication!
Through the years, Champion has made strategic adjustments to generate a culture that inspires and empowers talented individuals to make the world a better place through technology. By always staying at the forefront of technology and investing in our team’s professional growth, our clients realize the benefits in their day to day operations.
Whether implementing a control system upgrade, designing a new installation, assessing cybersecurity gaps, improving a facility’s safety systems, or enabling secure remote access for a full suite of OT Managed Services – our commitment to excellence remains steadfast.
At Champion, we believe the success of our clients is a direct reflection of our own efforts and successes. That’s why we will continue to provide the best solutions available at any given time. Independent of any equipment manufacturer or technology platform, our experts partner with you to evaluate needs, make recommendations, and execute the rollout that brings the most value to your facility.
From all of us at Champion, we thank you for trusting in our team to provide the solutions and systems that best achieve your goals. We look forward to the next 20 years, as we continue to grow together.
Champion Technology Services, Inc. is an industrial control systems integrator that provides OT services across the United States and abroad. Our team includes ISA/IEC 62443 Cybersecurity Experts and GICSP (Global Industrial Cyber Security Professional)-certified professionals in the latest NIST standards. We help small, medium, and large companies assess their existing control systems and implement protocols that meet their facility’s requirements while maintaining our status as an unbiased third-party solution provider.
Anytime a new conduit to an ICS network is created – especially one which transits the internet – there is inevitable trepidation about the potential security risks it might create. So, when we talk about creating a tunnel from your network into the cloud, you’re going to have mental alarms going off. This article will describe how Champion keeps your network secure while providing unprecedented levels of service and support.
A security zone is created in the cloud specifically for you. Here, it serves as an extension of the Demilitarized Zone (DMZ) of your control system. The same security concepts that apply to your DMZ apply here as well.
These paths are restricted by routing and firewall rules to pass only the authorized data.
No windows administrative connections (RDP, WMI, RPC, and other evil acronyms) can be made from outside the DMZ and cloud zones. All administrative activity happens within the cloud zone via hosted desktop sessions. These sessions are delivered using virtual desktop presentation technologies so that only the video stream leaves, and only keyboard and mouse commands enter. No proprietary data or external threats can be transferred via either cloud path.
In order to connect your site to the cloud, a tunnel must be created. This tunnel is built using the best available VPN protocols . Like most tunnels, its job is to keep the good things in and the bad things out.
It’s often stated that if you can’t see it, you can’t secure it. To ensure your network stays safe, it’s vital to have eyes on the traffic that’s going through it. Like a building with door sensors, motion detectors, smoke detectors, security cameras, and a remote monitoring service… Champion can be your partner in notifying you in real-time of any abnormal activity.
While opening a tunnel between your network and the cloud might sound scary, using the proper technology and partner allows your network and OT assets to be safer than ever. Not only will you be better protected from security threats, but now we can even alert you to process issues before they become big problems.
Remote support engineers can respond even quicker and without introducing you to unnecessary risks like VPN connections from untrusted computers, unmonitored persistent virtual desktop access, or cellular modems.
Champion Technology Services, Inc. is an industrial control systems integrator that provides OT services across the United States and abroad. Our team includes ISA/IEC 62443 Cybersecurity Experts and GICSP (Global Industrial Cyber Security Professional)-certified professionals in the latest NIST standards. We help small, medium, and large companies assess their existing control systems and implement protocols that meet their facility’s requirements while maintaining our status as an unbiased third-party solution provider.
While everyone is familiar with the term “IT” (Information Technology), the term “OT” (Operational Technology) is far less familiar to the general public. That is not to say OT is newly emerging; quite the opposite. Over the last two decades, IT and OT have begun to converge. You’ve likely heard terms like “IIoT” (Industrial Internet of Things) or “Industry 4.0.” But there are unique differences that set OT apart from IT:
Since production is the livelihood of any industrial facility, so too are the operational systems that keep them moving. Loss of production for any reason has a direct impact on a company’s bottom-line. Whether due to an outdated, unreliable platform, poor configuration, unprepared support staff, or insecure technology allowing for system breaches – many factors can affect production. Be sure to utilize an OT specialist with the experience to reach your maximum production output.
Securing proprietary information is a major concern with any corporate IT network. But cybersecurity is equally (if not more) important for a facility’s Industrial Control Systems. In past years, many have taken the “air gap” approach to securing their OT control systems – keeping any production equipment separated from Internet-connected Enterprise equipment. In theory – and in a time before flash drives and smartphones – this was enough to mitigate operational risks. But, as consumer technologies emerged, so too did many large-scale security breaches affecting Industrial Control Systems.
Air gapped systems that were not physically connected to the Internet would run on outdated security patches because they were seemingly “secure.” With the advent of devices like flash drives and smartphones, however, control systems around the globe became vulnerable. Cyber-attacks could now halt production, disable critical safety systems, or result in catastrophic loss simply by altering production readings.
Having a team of Globally Certified Cybersecurity Experts at your fingertips is now vital for any industrial environment.
While the fundamental principles of IT networks are shared with OT networks, Industrial Control Systems require a much more specialized set of skills to implement and maintain. For starters, the very environment of each are vastly different. IT networks are often climate-controlled in office environments, whereas OT networks can be exposed to extreme elements and process environments.
More importantly, what sets OT professionals apart is their knowledge of how to implement specific industry processes, using a range of industrial controls across multiple platforms. Lastly, they must use this knowledge to make everything communicate in an efficient, reliable, and intuitive manner.
With vast experience across numerous industries, platforms and technologies, Champion’s OT professionals deliver on this expertise.
The natural lifecycle of IT versus OT lends itself to completely different budget approaches. While IT environments typically change every 12-18 months, OT environments can last 10-15 years or more – if they are properly designed and maintained.
The key to enabling Industrial Control Systems for the extended durations is proper maintenance and support. In addition to cybersecurity risk mitigation, including budgetary funds for preventive maintenance and support is essential in any OT environment. As a system ages, it is key to provide regular security patches, scheduled backups, and a supply of spare parts to achieve the greatest production output.
Champion’s knowledge of these items, paired with our 24UP Support Solutions, allow customers to tailor specific needs into one easily-predictable budgetary plan.
Another unique difference between IT and OT is the types of compliance each must meet. Industrial Control processes are typically subject to far more scrutiny due to their ability to impact more than a corporate entity; if improperly maintained, a process can harm employees, communities, or the environment. For this reason, it is imperative that OT systems function correctly and reliably.
OT networks continuously monitor process stages, operating temperatures and pressures, environmental emissions, leaks, or any other number of factors associated with the facility. Having reliable systems in place not only raise overall safety. They allow companies to provide real-time or historic reporting to compliance agencies, such as the EPA, DEQ, FDA, or OSHA.
Champion engineers and professionals hold the experience necessary to implement the reliable OT systems our customers demand.
Champion Technology Services, Inc. is an industrial control systems integrator that provides OT services across the United States and abroad. Our team includes ISA/IEC 62443 Cybersecurity Experts and GICSP (Global Industrial Cyber Security Professional)-certified professionals in the latest NIST standards. We help small, medium, and large companies assess their existing control systems and implement protocols that meet their facility’s requirements while maintaining our status as an unbiased third-party solution provider.
“Security by isolation” or air-gapping previously worked in Operational Technology (OT) environments when OT and IT were completely isolated from one another. Many older systems based on PLC’s and SCADA were built without cybersecurity in mind. OT and IT are now converging as organizations embrace the digital transformation, and security experts are now declaring the air gap dead as security by isolation is not a long-term solution for protecting OT assets.
Air Gapping an OT system has very limited value in today’s constant technological advances. It can no longer be used as a sole security solution in the long term for three reasons:
While air-gapped OT systems can minimize risks, organizations are not able to benefit from the highly valuable data these systems generate. Data analyzed in real time can provide business intelligence to cut costs, reduce downtime, and improve efficiency. These opportunity costs outweigh air-gapping as a viable cyber security measure.
Maintaining air-gapped OT systems are more expensive and difficult because the engineering tools of a connected system cannot be used to perform routine maintenance or troubleshoot problems. It also limits the system from secure remote support by technical experts. Without remote access, facilities experience higher support costs and increased downtime. The reality is that even a properly air-gapped system is not completely protected; Every system is a potential breach target, and even air-gapped systems can be infiltrated. Organizations must engage in active monitoring and security measures to mitigate the risks.
Air Gaps can be physically breached by a third-party networked laptop, USB drive, removable media, smartphone, or other devices. Allowing OT systems to connect with these devices creates vulnerabilities that air gapping cannot protect against. Air gapping makes it difficult for users to move back and forth between the air-gapped device and network-connected devices. For ease of use, an individual may use an unsecure USB drive to transfer data which could compromise an air-gapped system.
OT infrastructure is only as secure as the user operating the devices. An openly accessible USB port can serve as an entry route for malware. Smartphones provide another convenient route to cross air gaps when switched to Wi-Fi hotspot mode. The Wi-Fi hotspots can also be used as an entry point by hackers or those with ill intentions.
FUN FACT:
Source: Kapersky
90+% of randomly found USB drives are picked up by the casual person and more than half are plugged into a PC.
OT cyber-attacks are more dangerous in nature. An OT attack can pose risks to operational and safety systems, employees, plant, and environment. Because the outcome of an OT cyber-attack is more catastrophic, it is essential that organizations prioritize cybersecurity. While air gapping provides some security, it is not the best option to select in the competitive marketplace.
Air gapped control systems are also more vulnerable because they don’t receive the latest Windows security patches easily, therefore are usually neglected. As new virus threats emerge, the OT system will likely be unprotected, unlike its Enterprise counterpart.
We must accept the fact that air gapping as a security control is no longer a valid option. IT and OT will continue to converge leaving air gapping to be useless. Facilities should take advantage of the opportunities from integrated technologies to reduce costs and downtime while improving efficiency. While doing so, they must prioritize OT security to lessen the risk and still capitalize on the advantages of a connected IT and OT world.
How can you proactively address these issues while ensuring that your control system is not an impediment in reaching your goals?
Consider partnering with a solution provider who specializes in keeping your control system functioning as intended so your team can overcome today’s toughest challenges.
24UP® is Champion’s premier Industrial Control System, Operational Technology and Industrial Cybersecurity support solution led by the experts who have seen it all, supported by the company you’ve come to trust. Clients rely on 24UP® support to ensure a proactive response to issues that often arise, but not often considered – or simply haven’t had the time to address.
Whether simply providing you with the tools to be prepared for unexpected challenges, or being your primary provider of maintenance and 24/7 emergency support – we work with you to tailor a plan that fits your needs and budget. Your company’s 24UP® support solution could include as few or as many of the services that help you achieve your goals, including:
Is your industrial control system comprised of multiple manufacturers or platforms? Do you know which service team to call when an issue arises? Original Equipment Manufacturers (OEMs) can offer support on their products but often come up short in environments where their equipment is integrated with other “unsupported” equipment.
This is where a System Integrator comes in. Champion, with expertise in every major industrial control system, supports all parts of your facility’s systems under one agreement tailored to your specific needs. Typically, response times are quicker than a manufacturer would be thanks to the extent and experience of our team. Combined with our Secure Remote Support offerings technology, we are able to you services anywhere at any time.
Whether your facility already has in-house support staff, or requires a primary support contact, Champion can offer guaranteed response times based on your needs. Industrial clients can also benefit from our multi-vendor support by receiving unbiased recommendations about system upgrades, network configuration, cybersecurity, and more.
Lastly, Champion’s 24UP® Support Solutions often save clients money over multiple OEM service contracts or in-house support staff with a ‘one stop shop’ support solution for your industrial control systems and Operational Technology (OT) assets. So whether you prefer a secondary support option or a full umbrella of support, we can tailor and provide the right solution for your needs and budget.
Along the United States Coasts, Hurricane Season is a lengthy period of anxiety and uncertainty for many – especially if your industrial facility is tasked with achieving maximum production and uptime.
Disasters can strike at any time – but not all disasters are in the form of hurricanes, floods, or other natural phenomena. Let’s face it: equipment failures are inevitable; cyber attacks have become commonplace; human error is unavoidable. These are only a few ways your facility can be hurled into “Disaster Recovery Mode.” But, are you prepared?
There is a direct correlation between Preventive Maintenance and how quickly your operation can recover from any given disaster. Do you have up-to-date incident response procedures in place to get systems back online should they be compromised? Is your staff trained on those procedures? Do you have adequate spare parts for process-critical and at-risk components?
If you are unsure or responded, “no” to any of these questions, don’t worry – you aren’t the only one! But: How to change those answers with confidence, and not lose sleep at night? One way is to sit down with the 24UP professionals at Champion Technology Services, Inc.
24UP® Support is Champion’s solution led by the experts who have seen it all. They understand that no facility, industry, or Industrial Control System is exactly alike. Maybe you have an in-house department dedicated to the livelihood of your Operational Technology (lucky you!). Maybe you rely on support from a major equipment manufacturer. Maybe your industrial process consists of multiple systems and manufacturers working together to achieve your goals.
Regardless of the situation and your facility’s level of in-house expertise, Champion’s 24UP professionals can make recommendations, develop procedures & training documentation for your site’s staff, provide routine hardware & system diagnostics, backups & imaging – everything you might need from a Preventive Maintenance angle to ensure the least amount of downtime when disaster strikes.
Our Support Solutions are tailored to your specific needs. Whether simply providing you with the tools to be prepared, or being your one-stop “go to” for maintenance and 24/7 emergency support – we work with you to build a plan that fits.
Don’t have an OT cybersecurity expert on staff? Clients who take advantage of our 24UP Support plans also have access to Champion’s Certified Cybersecurity Experts. Trained in the latest ISA/IEC 62443 standards for Cybersecurity, and holding GICSP certifications in current NIST standards, these experts can be leveraged to provide third-party (read: “unbiased”) system audits, identify and mitigate potential weaknesses, and maintain the latest protections against OT cybersecurity threats.
Find out if 24UP is right for you. Read our brochure, or contact us to schedule a free consultation.