Skip to content

News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

Making Cybersecurity Approachable

Providing cybersecurity context, encouragement, protection and detection for users in multiple process industries There’s no way to go it alone on cybersecurity. Because no one knows everything, even the most informed and competent end user is going to need help from someone more know-how and information about a certain device, software, best practice or other protection their process or facility requires. Mere mortals usually need cybersecurity help just to get started. Fortunately, there are many well-informed and generous sources, who can provide history, education, encouragement and solutions to make cybersecurity projects workable, efficient, thorough, cost-effective and reliable over the long term.  We spoke to an E Tech Group executive about cybersecurity: how do they handle securing a facility’s network and operations, and how IT and OT must be managed to minimize malfunctions and associated downtime. E Tech Group is an Ohio-headquartered integration and automation firm with 18 locations covering all of North America. IT vs OT to Ethernet & IIoT  Laurie Cavanaugh, Business Development Director at E Tech Group, reports that cybersecurity’s recent evolution is a natural outgrowth of operations technology (OT) and information technology (IT) learning to work together and speak each other’s languages. Cavanaugh explains that OT and IT must cooperate on their organization’s overall cybersecurity assessment, which will give a true reading of its OT assets, PLCs and unmanaged devices, as well as its network topology, managed switches, firewall protections and IT-related components. IT/OT assessments don’t only identify weak points in the network and prioritize the fixes they need; they help modernize automation platforms, which eliminates the risks that obsolete hardware poses. Moving to a plant-wide IIoT-driven control system offers an easier-to-understand IT-OT dialect. Un-flatten Your Network To beginning addressing some of the IT-based tasks that cybersecurity requires, individual process and site characteristics can show what gaps need to … Continued

Read More
Cybersecurity Approachable

Exploring Industrial Wireless Best Practices: More Answers

More industrial wireless best practices were provided by speakers from a Control Engineering webcast, “Exploring industrial wireless best practices.” Laurie Cavanaugh, business development manager, E Technologies, and Dean Fransen, Applied Intelligence, Wood, answered more industrial wireless audience questions below that were submitted but not answered in the one-hour July 8 webcast.

Read More