{"id":11048,"date":"2021-06-10T13:08:49","date_gmt":"2021-06-10T11:08:49","guid":{"rendered":"https:\/\/sertalink.com\/?page_id=11048"},"modified":"2021-06-10T16:20:23","modified_gmt":"2021-06-10T14:20:23","slug":"industrial-cybersecurity","status":"publish","type":"page","link":"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/","title":{"rendered":"Industrial CyberSecurity"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.6.6&#8243; custom_padding=&#8221;1px|||||&#8221;][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/04\/Capture.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|-22px||2px||&#8221; custom_padding=&#8221;38px|0px||21px||&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h2 class=\"ProductOverview-module--pageTitle--2lQv2\" data-product-name=\"Kaspersky Small Office Security\"><span class=\"ProductOverview-module--surtitle--1Qlcs\" style=\"color: #008080;\">Kaspersky<\/span><span class=\"ProductOverview-module--surtitle--1Qlcs\" style=\"color: #008080;\"><\/span><span class=\"ProductOverview-module--surtitle--1Qlcs\" style=\"color: #008080;\"><\/span><\/h2>\n<h3 class=\"ProductOverview-module--pageTitle--2lQv2\" data-product-name=\"Kaspersky Small Office Security\"><span style=\"color: #000000;\">Industrial CyberSecurity<\/span><\/h3>\n<p class=\"ProductOverview-module--description--oUbYU\">Specialized protection for industrial control systems<\/p>\n<div class=\"ProductOverview-module--buttons--1N9p-\">\n<div class=\"ProductOverview-module--button--2hx_v\">\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<div class=\"ProductOverview-module--buttons--1N9p-\">\n<div class=\"ProductOverview-module--button--2hx_v\">\n<div class=\"\"><\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-42-300&#215;269.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;24px&#8221; hover_enabled=&#8221;0&#8243; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#1d7c15&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"ProductArticles-module--title--36sHb\" style=\"text-align: center;\">Overview<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Kaspersky Industrial Cybersecurity is a portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMI, engineering workstations, PLCs, network connections and people \u2013 without impacting on operational continuity and the consistency of industrial processes.<\/p>\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Our solution delivers a logical, incremental path to holistic industrial cybersecurity, from people through to processes and technologies.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Training and Awareness&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/trainings.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; title_text=&#8221;trainings&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Industrial cybersecurity awareness development and skills development training for C-level, IT, OT and Security Professionals<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Services and Threat Intelligence&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/services.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; title_text=&#8221;services&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">In addition to the full cycle of dedicated industrial services, from cybersecurity assessment to incident response, we provide industrial threat intelligence and reporting.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Technologies&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/technologies.png&#8221; icon_placement=&#8221;left&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; hover_enabled=&#8221;0&#8243; title_text=&#8221;technologies&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/overview\" data-at-selector-content-key=\"industrialSolution\">\n<div data-at-selector=\"ent-overview\" class=\"Overview-module--background--3esW7\">\n<div class=\"Overview-module--container--1IIwq\">\n<div class=\"Overview-module--products--2TBGG\">\n<div class=\"Products-module--products--2kFa5\">\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--summary--3vRvj\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Kaspersky Lab has developed dedicated Industrial Endpoint protection plus Industrial Anomaly and Breach detection products to protect the OT layers of industrial enterprises.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Anchor\" data-at-selector-content-key=\"anchor\">\n<div class=\"AnchorBase-module--container--acSVV\">\n<div id=\"ent-features\" class=\"AnchorBase-module--anchor--2kiku\"><\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/EntFeatures\" data-at-selector-content-key=\"IndustrialSolution\">\n<div>\n<section class=\"EntFeatures-module--wideBG--3YbTd\" data-at-sector=\"EntFeatures\">\n<div class=\"EntFeatures-module--host--1-eTU\">\n<div class=\"EntFeatures-module--texts--3xiF8\"><\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"Products-module--productWrapper--1P0BA\">\n<div class=\"Products-module--product--_HWrc\">\n<div class=\"Products-module--header--1p64m\">\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-42-300&#215;269.png&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;24px&#8221; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#1d7c15&#8243;]<\/p>\n<div class=\"ProductArticles-module--title--36sHb\" style=\"text-align: center;\">The use<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_video src=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Kaspersky-Industrial-CyberSecurity-solution-overview.mp4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;Kaspersky Industrial CyberSecurity solution overview&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_video][et_pb_blurb title=&#8221;Choosing the Right Security Vendor for ICS&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; custom_margin=&#8221;-2px||||false|false&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"LayerOfProtection-module--item--2Y7x-\">\n<div class=\"FormattedHTMLContent-module--host--2o1Qf LayerOfProtection-module--description--SdUEy\">\n<div class=\"LayerOfProtection-module--item--2Y7x-\">\n<div class=\"FormattedHTMLContent-module--host--2o1Qf LayerOfProtection-module--description--SdUEy\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Choosing the right industrial cybersecurity vendor has never been more important. Aside from developing specialised industrial cybersecurity technologies, at Kaspersky Lab:<\/p>\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<ul xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<li>We work with leading automation vendors to continuously discover ICS vulnerabilities<\/li>\n<li>We consult with regulators and government agencies on ICS cybersecurity worldwide<\/li>\n<li>Our ICS Cyber Emergency Response Team constantly monitors the global industrial threat landscape<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;The Adaptive Security Model for Industrial Facilities&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/ics-overview-thumbnail.jpg&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; custom_margin=&#8221;-2px||||false|false&#8221; hover_enabled=&#8221;0&#8243; title_text=&#8221;ics-overview-thumbnail&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"FormattedHTMLContent-module--host--2o1Qf Article-module--description--FlaAs\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Taking a holistic approach to industrial cybersecurity \u2013 from prediction of potential attack vectors and new attack surfaces, through specialised industrial prevention and detection technologies, to responding proactively to a cyber-incident &#8211; is the ultimate guarantee of your company\u2019s uninterrupted and safe functioning. Kaspersky Industrial Cybersecurity provides tools to enhance your security at all stages of the Adaptive Security Model life cycle.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_blurb title=&#8221;Different Industries have different security needs&#8221; image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/ics-map-300&#215;164.jpg&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; header_text_color=&#8221;#000000&#8243; custom_margin=&#8221;-2px||||false|false&#8221; hover_enabled=&#8221;0&#8243; title_text=&#8221;ics-map&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">We provide tailor-made security solutions reflecting the individual demands of industries including:<\/p>\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<ul xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">\n<li>Energy generation, transmission &amp; distribution \u2013\u00a0 recognizing the security challenges posed by openness, integration and smart grids<\/li>\n<li>Oil and gas &#8211; providing cybersecurity for all streams of an industry under constant attack<\/li>\n<li>Continuous manufacturing \u2013 defending continuous processes against the risk of disastrous downtime<\/li>\n<\/ul>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; background_image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Capture-42-300&#215;269.png&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; text_font_size=&#8221;24px&#8221; hover_enabled=&#8221;0&#8243; border_width_bottom=&#8221;1px&#8221; border_color_bottom=&#8221;#1d7c15&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"ProductArticles-module--title--36sHb\" style=\"text-align: center;\">The Risk<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_text _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Threats-module--description--2HDrx\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Industrial cyber-risk can have many causes \u2013 not just a targeted attack or an insider threat, but also the application unsuitable security technologies. Getting it wrong can leave your systems vulnerable to:<\/p>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; column_structure=&#8221;1_2,1_2&#8243;][et_pb_column _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/fin-risk-targeted-attacks-25.png&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;fin-risk-targeted-attacks-25&#8243; icon_placement=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Targeted attacks. The volume of attacks targeting PLCs and other industrial components is increasing significantly.<\/p>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/Icon_Physical_Device-300&#215;300.png&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;Icon_Physical_Device&#8221; icon_placement=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">IIoT. The ongoing growth of IIoT increases the potential vulnerability and exposure of industrial systems.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/3356_Visibility_and_monitoring_internal_and_external.png&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;3356_Visibility_and_monitoring_internal_and_external&#8221; icon_placement=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/Threats\" data-at-selector-content-key=\"IndustrialSolution\">\n<div>\n<div class=\"Threats-module--container--2AhuS\" data-at-selector=\"smb-threats\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Espionage. Your confidential data obtained by industrial rivals or hostile powers<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div data-at-selector-plugin-name=\"@kl\/content\/Ent\/Awards\" data-at-selector-content-key=\"industrialSolution\">\n<div class=\"Awards-module--rootContainer--3c1AS\" data-at-selector=\"ent-awards\">\n<div class=\"Awards-module--container--11RDB\">\n<div class=\"Awards-module--descPart--1i5qf\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; type=&#8221;1_2&#8243;][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/generic-malware-icon.png&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;generic-malware-icon&#8221; icon_placement=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Generic malware, including ransomware, straddling the air gap and affecting industrial control systems<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][et_pb_blurb image=&#8221;https:\/\/sertalink.com\/wp-content\/uploads\/2021\/06\/error-increase-attack-icon.png&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;error-increase-attack-icon&#8221; icon_placement=&#8221;left&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<div class=\"Threats-module--itemDescription--1pCGV\">\n<p xmlns=\"http:\/\/www.w3.org\/1999\/xhtml\">Employee or service provider error, both intentional and unintentional, can lead to downtime or fraud<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221;][et_pb_button button_url=&#8221;mailto:sales@sertalink.com&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;Contact us &#8221; button_alignment=&#8221;center&#8221; _builder_version=&#8221;4.9.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#000000&#8243; button_border_color=&#8221;#000000&#8243; button_border_radius=&#8221;86px&#8221; button_icon=&#8221;%%3%%&#8221;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Industrial CyberSecurity Specialized protection for industrial control systems OverviewKaspersky Industrial Cybersecurity is a portfolio of technologies and services designed to secure every industrial layer, including SCADA servers, HMI, engineering workstations, PLCs, network connections and people \u2013 without impacting on operational continuity and the consistency of industrial processes. Our solution delivers a logical, incremental path [&hellip;]<\/p>\n","protected":false},"author":26,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-11048","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.1.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Industrial CyberSecurity | Sertalink Belgium &amp; Luxembourg<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"nl_BE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial CyberSecurity | Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Sertalink Belgium &amp; Luxembourg\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sertalink\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T14:20:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sertalink_bnlx\" \/>\n<meta name=\"twitter:site\" content=\"@sertalink_bnlx\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\",\"name\":\"Sertalink Belgium\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/sertalink\/\",\"https:\/\/www.linkedin.com\/company\/sertalink\/\",\"https:\/\/twitter.com\/sertalink_bnlx\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\",\"inLanguage\":\"nl-BE\",\"url\":\"https:\/\/sertalink.com\/wp-content\/uploads\/2016\/09\/sertaLinkLogo.png\",\"width\":90,\"height\":112,\"caption\":\"Sertalink Belgium\"},\"image\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#logo\"},\"location\":{\"@id\":\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/#local-place\"},\"address\":{\"@id\":\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/#local-place-address\"},\"email\":\"sales@sertalink.com\",\"telephone\":\"+3293109351\",\"areaServed\":\"Benelux\",\"vatID\":\"BE 0632.806.125\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sertalink.com\/nl\/#website\",\"url\":\"https:\/\/sertalink.com\/nl\/\",\"name\":\"Sertalink Belgium &amp; Luxembourg\",\"description\":\"Your link to a safe environment\",\"publisher\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/sertalink.com\/nl\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"nl-BE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/#webpage\",\"url\":\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/\",\"name\":\"Industrial CyberSecurity | Sertalink Belgium &amp; Luxembourg\",\"isPartOf\":{\"@id\":\"https:\/\/sertalink.com\/nl\/#website\"},\"datePublished\":\"2021-06-10T11:08:49+00:00\",\"dateModified\":\"2021-06-10T14:20:23+00:00\",\"inLanguage\":\"nl-BE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/\"]}]},{\"@type\":\"Place\",\"@id\":\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/#local-place\",\"address\":{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/sertalink.com\/nl\/industrial-cybersecurity\/#local-place-address\",\"streetAddress\":\"Gentse Steenweg 47\",\"addressLocality\":\"Lokeren\",\"postalCode\":\"9160\",\"addressRegion\":\"Oost-Vlaanderen\",\"addressCountry\":\"BE\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"\",\"longitude\":\"\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:30\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"telephone\":\"+3293109351\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Lokeren\" \/>\n<meta name=\"geo.region\" content=\"Belgium\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/11048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/comments?post=11048"}],"version-history":[{"count":4,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/11048\/revisions"}],"predecessor-version":[{"id":11093,"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/pages\/11048\/revisions\/11093"}],"wp:attachment":[{"href":"https:\/\/sertalink.com\/nl\/wp-json\/wp\/v2\/media?parent=11048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}