News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

Cybersecurity Crash Course, Pt 1 of 2: The Case for Investing in Cybersecurity 

In an era of increased frequency and sophistication of cyber threats, any one defensive approach can be hacked. To be fully guarded, a secured network must incorporate several different components. A cyberattack on an exposed OT network is a looming security risk with potentially devastating consequences, including extended production downtime, system reformatting and possible hardware replacement. The costs of a cyberattack can be financially catastrophic, but can also hurt your reputation or cause compliance issues that result in hefty fines and even shutdowns. Part 1 of this 2-part blog series helps the reader to understand both the challenge of securing a network as well as the urgent need to do so. Part 2 of the series will discuss most of the OT network components and structuring strategies that collectively build a Zero Trust network architecture. Cyberattacks are a reality; no one can avoid them forever. The goal is to be sufficiently resilient to remain in operation in the midst of an attack. And to accomplish that, we must understand the whats, whys and hows of industrial security automation. Understanding the OT Network in an Automated Facility The Operational Technology (OT) space on a plant floor is a highly complex network environment with distinct characteristics from its Information Technology (IT) network cousin. The space has traditionally been used in a limited manner, connecting local devices that communicate with each other for production purposes and little else. While these devices may be of varying ages and vulnerabilities, as a group their network use patterns are similar, and distinct from typical IT network traffic. Devices on an OT network are generally setup to run all the time, requiring very reliable, and continuous communication as they control and coordinate the manufacturing process. The lifespan of OT devices is typically longer than IT devices, which means … Continued

Read More

E Tech Group Announces Critical Achievement of a Certified Information Systems Security Professional (CISSP)

E Tech Group has attained Certified Information Systems Security Professional status to help intensify and strengthen their delivery of sophisticated cybersecurity programs to protect manufacturers and industrial clients integrating OT assets and systems to front office IT systems. West Chester, OH – E Tech Group, a leader in providing high-quality automation, control and engineering services for industrial clients and Gold Certified Rockwell Automation Partner, announced today that they completed and earned the Certified Information Systems Security Professional (CISSP) status. CISSP certification is a globally accepted standard that validates IT security professionals’ skills and experience in handling and executing security plans. As manufacturing and industrial companies progress with the adoption of more industry 4.0 solutions, the need to integrate IT into traditionally siloed operational technology (OT) securely is imperative. E Tech Group provides cybersecurity services with expertise in both IT and OT industrial control systems (ICS). “This achievement aligns with our firm’s ‘beyond automation and control’ vision, and demonstrates our focus on delivering sophisticated yet practical solutions to clients,” said Nick Hasselbeck, Vice President of Cybersecurity at E Tech Group. “This accomplishment elevates E Tech Group’s professional profile and strengthens our team’s ability to provide nuanced sophisticated security solutions to our clients.” CISSP professionals have proven they are able to effectively design, implement, and manage a best-in-class cybersecurity program. To earn this certification, a professional must possess five or more years of work experience, pass a written exam, maintain good standing within the cybersecurity industry, hold membership with ISC2, and commit to adhering to the ISC2 Code of Ethics and privacy policy. “Earning this certification brings a new level of expertise and authority to showcase our cybersecurity and networking capabilities,” said Kevin Romer, Solutions Architect at E Tech Group. “We see a high demand for cybersecurity professionals that understand the OT side and are excited to … Continued

Read More

Integrating an Electrical Power Monitor System in Parallel with an Existing System

E Tech Group installed and commissioned a standard Electrical Power Monitoring System (EPMS) in parallel with a data center’s existing system to maintain the original combined EPMS and Building Management System (BMS) until it could be upgraded.

The Project: Install a New EPMS in Tandem with an Existing EPMS & BMS System

A social media platform Data Center needed their standard Electrical Power Monitor System (EPMS) installed and commissioned to work in parallel with their older existing system. The existing system was a combined EPMS and Building Management System (BMS) and needed to remain in place, as the BMS portion of the system wasn’t being replaced yet.

The multi-building Data Center campus and the SCADA system in some of the buildings is the current standard SCADA software, but in other buildings, older SCADA software was in place from a different vendor needing alignment.

The client wanted to eliminate device connections utilizing the BACnet/IP protocol and replace them with Modbus/TCP protocol to ensure current system standards are being met. As well, they wanted to standardize points being polled and monitored to match the current standards of the newer sites within the data center fleet.

E Tech Group’s reputation within the client’s organization, performance on a prior project, and because our feasibility study gave the client confidence that the project had a high level of probability that it could be accomplished within the limited timeframe allowed, we were selected to complete this project.

The Challenge: Keep Everyone Calm, Meet Harsh Deadlines, Exceed Client Expectations

E Tech Group’s automation team knew they needed to provide continuity to rectify the impact the client was currently experiencing as well as become familiar with and operate within two systems instead of just one. The aggressive timeline coupled with multiple moratorium periods to work around required an incredibly strategic and efficient approach.

The client was concerned that it wasn’t feasible to have an additional system polling for data in parallel and the equipment wouldn’t be able to support the additional requests. Some of the equipment was already being polled by 3-4 other systems monitoring the data. E Tech Group:

  • Performed a feasibility study/risk assessment as an initial phase of this project.
  • Evaluated each device type to determine limitations and assess which devices might experience bandwidth, connection limit, and response time issues.
  • Developed a plan to mitigate the issues.

The BACnet/IP communication modules in the generator control panels needed to be replaced with Modbus/TCP communication modules. The design of the panels made it necessary to perform a Lock Out – Tag Out (LOTO) of each generator to install the new communication modules safely.  We worked with site Operations and developed a schedule to perform the work, aligning as much as possible with their planned maintenance activities.

The Solution: Gain the Client Confidence Needed for Our Team to Divide & Conquer

The Feasibility Study mentioned earlier provided confidence in the proposed solution, and its approval was a catalyst for team members to move forward knowing they had a tight timeline they were up against.

To divide and conquer, E Tech Group subcontracted the SCADA developer required by the customer and managed the development of the EPMS SCADA application.

  • PowerSCADA was the software platform used as the client’s standard.
  • It was developed in phases in order to meet the project schedule, which required tracking changes with each version and verification to ensure the final application incorporated all of the necessary edits.
  • Our team performed bench testing of each field equipment type using a Modbus simulation device to verify the graphic templates and tags were linked as expected.
  • We developed a commissioning plan and corresponding method of procedures for bringing the new system online.  To avoid impacts to the live system our team tested one device type at a time and monitored the health of the existing system, ensuring the two were able to function together without interruption or conflict.
  • Onsite and remote commissioning of the SCADA system and the data center infrastructure management (DCIM) interface.

The Result: Active Partnerships Create the Most Effective Control Systems

By partnering with the client, as opposed to just fulfilling a role or requirement, E Tech Group helped the customer get closer to their long-term vision of the system. The new EPMS system follows the standards used at other sites within the data center fleet.

The findings of the feasibility study proved to be accurate, and the information gathered allowed the system to be successfully commissioned without any major impacts to the live system.

The client stated they were incredibly satisfied with the way the project was executed during the lessons learned meeting at project completion. This successful commissioning of the EPMS SCADA application allowed the client to be ready for the upcoming project of integrating the Building Management System.

Proactively Protecting Against Cyber Threats

Secure Your Company with a Cybersecure Control System   Cybersecurity continues to gain more and more momentum in manufacturing, and for good reason. Some of these facilities can be responsible for millions, sometimes billions of dollars in business, quickly gaining attention and unfortunately becoming a target for a cyberattack if not properly secured.  At a time when manufacturing facilities tend to be one of the most impacted by the decline in available workforce, the need for more flexibility in production capabilities takes precedence over most other initiatives. The rush to connect available assets for consolidated control and monitoring, and integrating their data collection and analysis will sometimes push decision makers to leap before they look. Not always considering any of the following, or lack thereof, may become an active threat without proper planning:   Increasing IT/OT Convergence: Industry 4.0 & improving plant efficiency is a major driver for this convergence trend. Organizations see improved efficiency as a worthwhile end goal, but it does come with an expanding OT attack surface.   High-Profile Incidents: Noteworthy OT/ICS cyberattacks over the last several years have proved how easily these high-profile OT systems can be broken into causing real concern. Some examples are the Stuxnet worm, the Ukraine power grid attack, and the Colonial Pipeline ransomware attack. These examples show that OT/ICS incidents affect more than the targeted organizations.  Nation-State Threats: Nation-state actors have shown interest in targeting critical infrastructure and industrial sectors as part of cyber espionage or cyber warfare efforts.   Ransomware and Monetization: Ransomware attacks have evolved to target critical infrastructure and manufacturing facilities. These attacks have led to large downtime windows for the target organizations.   Regulatory and Compliance Frameworks: Governments and regulatory bodies are recognizing the need to establish cybersecurity standards for critical infrastructure sectors. Compliance requirements and guidelines are being developed to ensure the security of OT and ICS systems.  Supply … Continued

Read More