Cyber Security for Industrial Control Systems (ICS)

Our team of IT Security and Industrial Control Specialists employ a range of ICS hardening techniques to safeguard your network from cyber-attack. Along with our partners we offer a range of products that can strengthen and give you complete visibility over your ICS network. Speak with TES Cybersafe today.

The number of attacks on ICS environments has been consistently doubling year on year, meaning that it is only a matter of time before you experience an attack. TES Cybersafe are here to help you prepare your organisation and staff to recognise and prevent attacks and to also help you recover in the event of a successful attack.

TES have both Information Technology and Operation Technology teams in-house, with vast water and power industry experience. This puts us in a unique position to help protect your systems against attacks through training your employees, testing your systems and recommending security systems and processes to remain safe from attack.
TES can install and maintain security systems to safeguard your system from a cyber-attack occurring and can provide emergency assistance in the event of an attack successfully being carried out.

Critical National Infrastructure Cyber Attacks

100

Percent rise in 2016


There have been over 2400 attacks on critical national infrastructure in the past year.

Typical Attacks

  • Attackers can gain access to an ICS environment through multiple different ways, demonstrating the need for active security efforts and ICS training.
  • In many cases attacks are not a “one-off”, but are planned for reconnaissance, multiple attacks and adjustments.
  • Attacks are often long term campaigns that happen over the course of months and require constant vigilance.
  • Attacks are often carried out by Nation States, Insiders (such as contractors, vendors, integrators), criminal hackers and hacktivists (politically motivated attackers).

The first line of defence from insider threats is the employees themselves

Capelli et. al. (2006)

Cybersafe certifications;