News & Knowledge

We’re your source for automation news. Keep up with the latest industry updates and E Tech employee spotlights, as well as tips and guidance from our manufacturing experts.  

How to Identify & Mitigate Plant Floor Cybersecurity Risks

Manufacturers are implementing more technology to provide efficiency, consistency and profitability. However, as the number of devices on the network continually increases, so do the implications of threat of a cyberattack. Industrial control systems (ICS) and operations technology (OT) are inherently vulnerable to cyberthreats like hackers or ransomware that can target crucial industrial processes. The effects go far beyond data breaches and have the power to upend entire industries, jeopardize security and even put lives in danger. It follows, then, that identifying and understanding security risks within your operational environment is key to minimizing the vulnerability of your control systems and plant network. This article details best practices for managing cybersecurity risks both on the floor and in the cloud. Identifying Risks from Every Angle When identifying risks and factors to consider for OT/ICS environments, the following are often noted as being most critical: Operational downtime and productivity loss: Any successful cyberattack on OT/ICS technologies could cause system downtime and significantly reduce productivity. Delivery of goods and services to customers may be delayed because of stalled production lines. As a result, financial impacts can be significant, with losses in market reputation and investor confidence in addition to revenue losses. Compromised safety systems: Extremely serious accidents can result from a breach that jeopardizes OT/ICS safety systems. For instance, a cyberattack on the control systems of a power plant could cause power outages that would impact not only businesses but also homes, hospitals and other vital services that depend on electricity. Physical harm and safety risks: Accidents and fatalities can result from a successful attack on transportation infrastructure, such as rail networks or traffic control systems. Patient safety in the healthcare industry could be put at risk by malfunctions of medical equipment controlled by OT/ICS systems. Environmental impact: Pipeline or chemical plant control system breaches can … Continued

Read More

E Tech Group Acquires Automation Group

Acquisition adds to E Tech Group’s growing expertise and reach into the Data Center and Food & beverage industries E Tech Group announced today the acquisition of Automation Group, a California-headquartered system integrator specialized in automation, robotics and cybersecurity. Terms were not disclosed. Automation Group will operate under the name “Automation Group, an E Tech Group Company.” Founder Brad Stegmann will step down from his CEO role but will consult with the business during the transition. Automation Group President Randy Ruano will remain with the company, and no significant employment changes are anticipated in any of Automation Group’s locations. Automation Group’s 12 locations are spread throughout northern and southern California, as well as Denver, Dallas-Fort Worth, Indianapolis and Williamsburg, Virginia. Together, the combined company is one of the largest independent automation engineering and system integration firms in North America, with approximately 30 locations and 600 team members. This is E Tech’s second acquisition in 2023, capping off another year of strategic growth that began with the acquisition of E-Volve Systems in February. “With the addition of Automation Group, E Tech Group expands its market-leading positions in automation of Life Sciences, Data Centers, Consumer Packaged Goods, and Food and Beverage industries,” said E Tech Group CEO Matt Wise. “The addition also brings significant cybersecurity expertise, accelerating our rapid growth in this segment and enabling us to better serve our clients with IT/OT vulnerability assessments and remediation.” Said Stegmann and Ruano in a joint statement: “We have tremendous respect for the E Tech Group platform and are confident this will be a seamless transition that will quickly pay dividends for clients of both companies. We’re also excited about the career opportunities members of the Automation Group team will enjoy as part of a larger, fast-growing organization like E Tech Group.” About E … Continued

Read More

Detecting Cybersecurity Threats in Operational Technology (OT) and Industrial Control Systems (ICS) 

One of the most crucial safeguards for Operation Technology (OT) is the ability to detect cyber threats within OT networks in real time. Given the importance of availability and uptime, the ability to quickly detect potential threats and respond with appropriate measures is highly stressed. Detection and prevention strategies must be carefully crafted for OT Networks to avoid excessive false positives and potentially unnecessary disruptions.  Let’s look at the key characteristics of a threat detection program:   Tracking key assets and data: Automatically tracking and assigning value to all OT assets, including hardware, software, and network devices.   Logging and Auditing: Comprehensive logging of all activities and events for auditing and forensic analysis in a centralized system.  Alerting and Response: It includes alerting mechanisms and a well-defined incident response plan to respond quickly to detected threats.  Threat Intelligence: To stay informed about emerging threats specific to OT environments, the program integrates threat intelligence feeds and data from various sources.  Continuous Monitoring: The program entails real-time monitoring of the OT network to detect anomalies and potential threats.   Utilize your Asset Inventory to scope your Detection System  Organizations need to first determine what their critical assets are and then prioritize resources accordingly, such as log retention, and frequency of log reviews making informed decisions about which log data should be forwarded to their centralized logging solution.  Identify key assets and data   Assess common threat vectors   Review industry best practices   What logs should be monitored?   Not all unusual events point to malicious activity or demand further investigation. Here are some examples of events that should be monitored on a regular basis, according to the NIST 800-82r3 Publication:  Information Events   Account lockouts   Unauthorized creation of new user accounts   Unanticipated remote login activities   The deliberate erasure of event logs   Event logs becoming unexpectedly saturated with data  Antivirus … Continued

Read More

Nick Hasselbeck Promoted to Vice President of Information Technology

Congratulations to Nick Hasselbeck on his promotion to Vice President of Information Technology! Nick is a valued member of our executive team, providing leadership and guidance on technology, cybersecurity, and integration initiatives. Nick has over 20 years of experience in information technology and has led or been a key contributor to several successfully executed projects that are differentiating us from the competition. His advanced software team has built outstanding custom tools for our client that are now critical to their operations. His internal development team has been on a roll recently, upgrading several companywide tools.  Not to mention all of the cybersecurity work his team does to protect E Tech Group. Congratulations once again to Nick Hasselbeck!  Thank you for your dedication, and enthusiasm to your work and E Tech Group.  

Read More