Page 34: of Maritime Reporter Magazine (May 2017)
The Marine Propulsion Edition
Read this page in Pdf, Flash or Html5 edition of May 2017 Maritime Reporter Magazine
Thought Leadership on Cyber Security
Maritime Cybersecurity:
Good, Better & Best
Cybersecurity Tips
When evaluating cybersecurity needs, a company should ask the following questions: • What data would be considered most valuable to a cybercriminal?
• What training and safeguards are in place to minimize employee threats?
• Is there a cybersecurity solution already in place? • If so, is there a formal way to evaluate the effectiveness of the security?
• Is there a disaster recovery plan if things go wrong?
© the_lightwriter / Adobe Stock base-level employees. most valuable to a cybercriminal? bersecurity experts to pinpoint system
By Rolf Berge,
Top leadership needs to set an exam- • What training and safeguards are in vulnerabilities, monitor insider threats,
Director of Energy Products, ple and focus on requiring network safe place to minimize employee threats? proactively defend the network and re-
Speedcast guards while raising awareness of the • Is there a cybersecurity solution al- spond to incidents. importance of keeping systems and data ready in place? SafePass Pro is broken down into s an industry that spends a secure. If management isn’t concerned • If so, is there a formal way to evalu- three different levels to defend, moni- great amount of its resources about it, then employees further down ate the effectiveness of the security? tor and prevent cybercrime within the procuring and sending data in the company will be relaxed about • Is there a disaster recovery plan if client’s system. Altogether, this solution
Ain order to operate, the mari- it as well and unconcerned about how things go wrong? improves network resources, minimizes time industry is an attractive target for they tend to the network. Cybersecurity Answering these question will help a malware and spyware, enables central- cyber criminals. Due to the remote loca- should be on the agenda of the Company company determine next steps, whether ized control across all sites, enforces ac- tions of vessels and limited staff aboard Board. that means implementing new security ceptable use and security policies (AUP) ships and rigs, organizations and their A lack of preparation can lead to dire solutions or simply enhancing those al- and provides an opportunity to assess offshore vessels and platforms are often consequences when the employees in- ready in place. While there are many dif- and eliminate network weaknesses.
ill equipped to ward off cyber threats. stalling and maintaining network de- ferent levels of security a company can With that in mind, let’s look at the
The cost and repercussions of a breach vices are too relaxed or unaware of po- implement to safeguard their data, the good, better and best guidelines and op- can be extensive in terms of both money tential threats to security. Often in these best solutions involve defense, monitor- tions for protecting your system and crew safety. According to a recent situations, network ports of these devic- ing and prevention. Speedcast, the criti-
Level 1 – Defend – Good study, the cost of cybercrime has even es can inadvertently be left open, devices cal communication company, is a great surpassed that of drug crime. While cy- aren’t properly con? gured, or software example of a ? rm providing such capa- This ? rst, basic level, is a ? rewall to berbreaches are on the rise, they can be patches and updates are skipped, putting bility. keep unwanted visitors out. Most can ? l- prevented with the proper preparation. the company at risk. As 42 percent of cy- ter traf? c based on URLs, or classes of
Proactive Solution bersecurity risks are caused by careless URLs, and single applications. insiders, proper training is essential to Speedcast’s SafePass Pro combines the This can often be customized to cus-
Be Prepared
Being prepared is the ? rst step in secur- safeguarding a company’s network. best of content ? ltering and monitoring tomer needs or wants, with enhanced, ing your data against cybercrime. This When evaluating cybersecurity needs, with threat management services, in- granular blocking capacity to go deep includes ensuring all individuals within a company should ask the following cluding vulnerability assessments. With into the types of classes of URLs to a company understand the importance of questions: this combination of solutions, clients can block – down to both geography and security, from top-level management to • What data would be considered bene? t from working with Speedcast cy- type of applications. With this level, the 34 Maritime Reporter & Engineering News • MAY 2017
MR #5 (34-41).indd 34 MR #5 (34-41).indd 34 5/3/2017 8:27:46 PM5/3/2017 8:27:46 PM