We use cookies to make sure our website better meets your expectations.
You can adjust your web browser's settings to stop accepting cookies. For further information, read our cookie policy.
SEARCH
IN Warsaw
Exchange Rates
Warsaw Stock Exchange - Indices
The Warsaw Voice » Business » November 3, 2014
Business & Economy
You have to be logged in to use the ReadSpeaker utility and listen to a text. It's free-of-charge. Just log in to the site or register if you are not registered user yet.
Stopping Hacker Attacks
November 3, 2014   
Article's tools:
Print

Odet Gonda, vice president of Check Point Software Technologies, talks to Jolanta Wolska

How does Check Point Software Technologies help companies in securing technological processes?
Check Point was established in Israel in 1993 and is a worldwide leader in securing the internet and provides industry with uncompromised protection against all types of threats.

We start by looking at the company’s potential risks, internal and external, analyze which environments are most critical in the organization and where the main vulnerabilities are. These can be in the technologies and electronics areas, manufacturing processes or people—that is, who has access to which systems and who may make changes to them. Then we work out which systems ought to be implemented to ensure total control.

SCADA (supervisory control and data acquisition) is an industrial environment we are attempting to protect. SCADA is used in power plants as well as in telecommunications, transportation, water control and manufacturing.

What are the advantages of using the SCADA program?
We encourage companies to ensure that they have an application program in place that can secure their operations to minimize any potential damage of their indistrial environment. For example, we work out how to better secure the operations of manufacturing processors by collecting electronic data, which then helps understand what is happening within the network. If something goes wrong we advise how to quickly pinpoint where the problem is coming from and hence minimize the damage, including that from hackers. For example, through the SCADA environment we work out how to better secure the operations of manufacturing processors by collecting electronic data, which then helps understand what is happening within the network. If something goes wrong we can quickly pinpoint where the problem is coming from and hence minimize the damage.

How aware are companies of the need to protect their electronic infrastructure?
Some manufacturing companies concentrate more on physical protection from fire, rain or physical damage than on protecting their electronic infrastructure. The problem is that an electronic attack can take place from the other side of the world, by an unseen and unknown person who is difficult to track down. Such an attack can be much more costly and dangerous than the physical damage from fire. Today, it is very important that company management realize that they have a responsibility to protect their companies and people and that there are steps that can be taken to make it much more difficult for hackers to do damage.
© The Warsaw Voice 2010-2018
E-mail Marketing Powered by SARE