News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

Cybersecurity Crash Course, Pt 2 of 2: Zero Trust Ensures Plant Resilience During a Cyberattack 

In the second edition of this two-part series on OT network security, the popular term “Zero Trust architecture” is fully broken down into individual devices that together take both an offensive and defensive approach to securing an OT network.   Zero Trust Architecture: An All-Encompassing Term for a Defensible OT Network  While the term “zero trust” has become popular within the field of operational technology (OT) network security, its meaning stems from the evolution of ever-increasing network security measures that have had to be implemented in response to increasingly complex threats. As the threat frequency and sophistication of a breach has increased, security measures have also had to increase in lockstep, assuming less and less trust for devices operating on the network. At this point in time, the most robust network design always assumes the worst – trusting absolutely nothing attempting to access an OT network until full authentication has occurred, and regularly interrogating devices currently on the network as if they’ve become malicious. Trust no device, at any point in time – zero trust. Simply put, when it comes to cybersecurity, you’ll find safety in skepticism. Zero Trust vs Safe Zones: Why Assuming the Worst is Best In the Zero Trust model, full identification and credentialing occurs on a continual basis for every single device attempting to access the network. Traffic monitoring is continual, access is limited, and no safe perimeter is assumed. This is a different, nearly inverse approach than that traditionally implemented within an IT network, which assumes a “safe zone” and primarily defends that zone at its perimeter. The Zero Trust approach requires a collection of network components and software solutions, each doing their own task, that work together to collectively keep the network secure.   Some components monitor data; some log events; some actively interrogate existing devices using the … Continued

Read More
Zero-Trust: Ensuring Plant Resilience During a Cyber Attack

Cybersecurity Crash Course, Pt 1 of 2: The Case for Investing in Cybersecurity 

In an era of increased frequency and sophistication of cyber threats, any one defensive approach can be hacked. To be fully guarded, a secured network must incorporate several different components. A cyberattack on an exposed OT network is a looming security risk with potentially devastating consequences, including extended production downtime, system reformatting and possible hardware replacement. The costs of a cyberattack can be financially catastrophic, but can also hurt your reputation or cause compliance issues that result in hefty fines and even shutdowns. Part 1 of this 2-part blog series helps the reader to understand both the challenge of securing a network as well as the urgent need to do so. Part 2 of the series will discuss most of the OT network components and structuring strategies that collectively build a Zero Trust network architecture. Cyberattacks are a reality; no one can avoid them forever. The goal is to be sufficiently resilient to remain in operation in the midst of an attack. And to accomplish that, we must understand the whats, whys and hows of industrial security automation. Understanding the OT Network in an Automated Facility The Operational Technology (OT) space on a plant floor is a highly complex network environment with distinct characteristics from its Information Technology (IT) network cousin. The space has traditionally been used in a limited manner, connecting local devices that communicate with each other for production purposes and little else. While these devices may be of varying ages and vulnerabilities, as a group their network use patterns are similar, and distinct from typical IT network traffic. Devices on an OT network are generally setup to run all the time, requiring very reliable, and continuous communication as they control and coordinate the manufacturing process. The lifespan of OT devices is typically longer than IT devices, which means … Continued

Read More

E Tech Group Announces Critical Achievement of a Certified Information Systems Security Professional (CISSP)

E Tech Group has attained Certified Information Systems Security Professional status to help intensify and strengthen their delivery of sophisticated cybersecurity programs to protect manufacturers and industrial clients integrating OT assets and systems to front office IT systems. West Chester, OH – E Tech Group, a leader in providing high-quality automation, control and engineering services for industrial clients and Gold Certified Rockwell Automation Partner, announced today that they completed and earned the Certified Information Systems Security Professional (CISSP) status. CISSP certification is a globally accepted standard that validates IT security professionals’ skills and experience in handling and executing security plans. As manufacturing and industrial companies progress with the adoption of more industry 4.0 solutions, the need to integrate IT into traditionally siloed operational technology (OT) securely is imperative. E Tech Group provides cybersecurity services with expertise in both IT and OT industrial control systems (ICS). “This achievement aligns with our firm’s ‘beyond automation and control’ vision, and demonstrates our focus on delivering sophisticated yet practical solutions to clients,” said Nick Hasselbeck, Vice President of Cybersecurity at E Tech Group. “This accomplishment elevates E Tech Group’s professional profile and strengthens our team’s ability to provide nuanced sophisticated security solutions to our clients.” CISSP professionals have proven they are able to effectively design, implement, and manage a best-in-class cybersecurity program. To earn this certification, a professional must possess five or more years of work experience, pass a written exam, maintain good standing within the cybersecurity industry, hold membership with ISC2, and commit to adhering to the ISC2 Code of Ethics and privacy policy. “Earning this certification brings a new level of expertise and authority to showcase our cybersecurity and networking capabilities,” said Kevin Romer, Solutions Architect at E Tech Group. “We see a high demand for cybersecurity professionals that understand the OT side and are excited to … Continued

Read More

E Tech Group Team Members Earn Siemens Certifications

Congratulations to our team members who recently completed the recertification process for Siemens. E Tech Group supports the continuous education and improvement of our team members. Through earning professional certifications with our industry and technology partners we not only support the advancement of our team members, but we can better serve and respond to the diverse needs of our clients. To earn the Siemens certifications, team members must complete several Siemens courses and pass an 8-hour exam that tests their developed solutions and implementations in a simulated environment. To maintain the certifications, team members must complete additional courses. Congratulations and thank you to these Siemens-certified team members for continually bettering themselves and our abilities to serve our clients: For Factory Automation: For Motion & Control Drives: About Siemens Global Siemens has been at the helm of engineering for well over a century, building the first elevator motor in 1880 and first reversing electric drive in 1907. They led the way to today’s complex, integrated automation systems with the Simodrive Posmo A in 1999. Today, Siemens’ automation products are known for their innovation, reliability and focus on critical logistics. E Tech Group is a Solution Partner in Automation drives with Siemens. About E Tech Group E Tech Group is committed to supporting the advancement of manufacturing and industry through providing advanced automation and control system solutions utilizing bleeding-edge technology and methodology. Our brand of engineering services is collaborative, communicative and strategic. Serving clients across North America and beyond, E Tech Group is a Main Automation Partner you can count on to provide services that add value at every stage.

Read More