Siemens and 16 Other Global Companies Support Cybersecurity for Telework

DCS 3 Siemens SPS 400

 April 13, 2020

To slow the spread of the coronavirus, millions of people around the world have been working from home for about three weeks now – including more than 100,000 Siemens employees. Siemens and 16 other global companies from the Charter of Trust (CoT) initiative have developed eight tips for boosting cybersecurity so that employees can work just as securely from home as they do at the office. Their recommendations are meant to help ward off hacker attacks and enable companies to maintain business continuity. These tips range from switching off voice-controlled devices and covering webcams to not mixing personal and business use of devices. All recommendations have been published on the Charter of Trust website: bit.ly/39BB8Gv.

“In particular in times of crisis, large enterprises have a special responsibility,” said Joe Kaeser, President and CEO of Siemens AG. “Living up to this responsibility also involves supporting others, jointly developing solutions and sharing knowledge for the benefit of all – just as the Charter of Trust partners have been doing for two years now.”

COVID-19 not only poses a health risk, but also a cybersecurity threat for many companies. To reduce the likelihood of infection, much of the workforce is now teleworking. Employees will also increasingly need to exchange sensitive data from home to keep business operations from coming to a standstill. At Siemens alone, an average of 130,000 employees all over the world have been connecting to the company’s intranet from home since mid-March – nearly four times more than usual.

IT infrastructure at home, however, is typically less secure than at the office – a vulnerability that hackers are increasingly exploiting. In addition, hackers are trying to use e-mail scams, for example, to take advantage of the uncertainty related to the COVID-19 crisis. This situation is making the employees’ role as guardians of cybersecurity even more important. The CoT partners’ eight recommendations can help avert hacker attacks:

  •  –   Bring home only the devices and information that are absolutely necessary.
  •  –   Safeguard your home network and communicate via secure connections.
  •  –   Keep the software on all your devices up to date.
  •  –   Switch off voice-controlled smart devices at your home workstation and cover the webcam when you’re not using it.
  •  –   Don’t mix personal and business use of devices.
  •  –   Proactively identify all participants in online meetings.
  •  –   Log off when you stop using your devices and store them securely.

 

  •  –   Be extremely wary of suspicious e-mails or attachments, particularly if you don’t know the sender.

To enable large numbers of employees to log in to the Siemens network from home as securely as possible, Siemens IT experts took action when the corona crisis began in mid-March. Within just 24 hours, they set up stable intranet access for some 140,000 employees and have thus provided cybersecurity at levels similar to those available at the office.

Source

Related Articles



Editor’s Pick: Featured Article

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s u-control 2000: The Automation Controller

Weidmüller’s scalable engineering software, u-control 2000, adapts individually to your requirements. And, the u-control is powerful, compact and fully compatible with Weidmüller’s I/O system u-remote. This article looks at what makes u-control the heart of your automation.

Programmable logic controllers (PLCs) are one of the main components of any automated system. A typical control system has inputs, outputs, controllers (i.e., PLCs), and some type of human interaction with the system, a human machine interface (HMI), for example.

Read More



Latest Articles

  • How to Select the Correct Data Cable for Your Industrial Application

    July 18, 2024 In this article, you will learn what the most common mistakes are when selecting Industrial Ethernet and bus cables and how to avoid them. All cables and wires that contribute to communication in any way are commonly referred to as data cables. However, there are significant differences such as the multitude of… Read More…

  • Legacy OT Risks: The Hinderances of Aging Systems – and How to Move Forward

    July 15, 2024 Today, the role of a chief information security officer (CISO) comes with a heavy ethical and social responsibility. Yes, we and our teams have a primary responsibility to protect the cybersecurity of critical infrastructures that provide vital services like electricity, water, oil, gas, healthcare, and food production, to name a few. As… Read More…