{"id":25751,"date":"2021-02-02T12:15:48","date_gmt":"2021-02-02T04:15:48","guid":{"rendered":"https:\/\/version-2.com\/?p=25751"},"modified":"2022-03-07T12:20:07","modified_gmt":"2022-03-07T04:20:07","slug":"how-you-should-prevent-ransomware-attacks-on-your-industrial-networks","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2021\/02\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\/","title":{"rendered":"How You Should Prevent Ransomware Attacks On Your Industrial Networks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"25751\" class=\"elementor elementor-25751\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"section post-body\"><p><strong>This Week, Ransomware Slams Westrock &amp; Other industrial Organizations<\/strong><\/p><p>Earlier this week, the operations at $17 billion packaging firm <a href=\"https:\/\/www.businesswire.com\/news\/home\/20210126005398\/en\/WestRock-Provides-Update-on-Ransomware-Incident\" target=\"_blank\" rel=\"noopener\">WestRock<\/a> were disrupted by a ransomware attack that impacted both its IT and OT (operational technology) networks. Two days later, a massive $27 billion chain operator <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pan-asian-retail-giant-dairy-farm-suffers-revil-ransomware-attack\/\" target=\"_blank\" rel=\"noopener\">Dairy Farm Group<\/a> was also attacked by ransomware, with the attackers demanding a $30 million ransom. Those are just a sample of successful ransomware attacks from this week alone.<\/p><p>Since the outbreaks of <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/dec\/30\/wannacry-petya-notpetya-ransomware\" target=\"_blank\" rel=\"noopener\">Wannacry &amp; NotPetya<\/a> ransomware attacks in 2017, we&#8217;ve been witnessing daily occurrences of attacks affecting OT networks that originated in the IT side. The U.S. National Security Agency (NSA) also <a href=\"https:\/\/www.verisk.com\/insurance\/visualize\/exploits-behind-wannacry-and-notpetya-attacks-continue-to-linger\/\" target=\"_blank\" rel=\"noopener\">highlighted this issue<\/a> for this very simple reason. It works.<\/p><p><strong>Ransomware Works<\/strong><\/p><p>That\u2019s the simplest way to explain why incidents of ransomware attacks have sharply increased over the last year \u2014 with no end in sight. The number of ransomware attacks has jumped by 350 percent since 2018, the average ransom payment increased by more than 100 percent this year, downtime is up by 200 percent and the average cost per incident is on the rise, according to a <a href=\"https:\/\/purplesec.us\/resources\/cyber-security-statistics\/ransomware\" target=\"_blank\" rel=\"noopener\">recent report<\/a> from PurpleSec.<\/p><p>Threat actor groups with names such as <a href=\"\/en\/ransomware-attack-at-mexicos-pemex-could-have-been-avoided\/\" target=\"_blank\" rel=\"noopener\">Ryuk<\/a>, Egregor, Conti, Ragnar Locker, and many others are ruthless, well-funded and are willing to target anyone; from COVID-19 vaccine manufacturers, <a href=\"https:\/\/techcrunch.com\/2020\/06\/09\/honda-ransomware-snake\/\" target=\"_blank\" rel=\"noopener\">automotive manufacturers<\/a>, critical infrastructure, governments and hospitals to get their payday. In fact, the first <a href=\"https:\/\/www.zdnet.com\/article\/first-death-reported-following-a-ransomware-attack-on-a-german-hospital\/#:~:text=The%20Duesseldorf%20hospital%20was%20unable,caused%20by%20a%20ransomware%20attack.\" target=\"_blank\" rel=\"noopener\">ransomware related death<\/a> happened this past September, when a German hospital was infected with ransomware and couldn&#8217;t treat patients during the Covid-19 outbreak.<\/p><p>As part of SCADAfence\u2019s mission to protect the lives and safety of civilians, we\u2019ve put together this guide to help you prevent ransomware in your industrial organization.<\/p><p><strong>The Ransomware Encryption Process<\/strong><\/p><p>Let\u2019s go back to the beginning, and discuss how these attacks encrypt systems in the first place.<\/p><p>From the previous ransomware attacks we\u2019ve researched, we learned that from the minute the attackers get initial access, they can encrypt the entire network in a matter of hours. In other cases attackers would spend more time in assessing which assets they want to encrypt and they\u2019d make sure they get to key servers such as storage and application servers.<\/p><p>Most of the recent ransomware attacks you\u2019re reading about in the news try to terminate antivirus processes to make sure that their encryption process will go uninterrupted. Recent ransomware variants such as <a href=\"\/en\/snake-\/-ekans-ransomware-nation-state-attackers-deploy-ot-oriented-malware\/\" target=\"_blank\" rel=\"noopener\">SNAKE<\/a>, DoppelPaymer and <a href=\"https:\/\/www.scadafence.com\/resource\/norsk-hydros-lockergoga-ransomware-propagation-detection-mitigation\/\" target=\"_blank\" rel=\"noopener\">LockerGoga<\/a> even went further by terminating OT related processes like Siemens SIMATIC WinCC, Beckhoff TwinCAT, Kepware KEPServerEX, and the OPC communications protocol. This made sure the industrial process was interrupted, and this increased the chances that the victims paid the ransom. These types of ransomware attacks were seen in the recent attacks of <a href=\"https:\/\/www.securityweek.com\/seven-ransomware-families-target-industrial-software\" target=\"_blank\" rel=\"noopener\">Honda and ExecuPharm<\/a>.<\/p><p><span style=\"text-decoration: underline;\"><img fetchpriority=\"high\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP\" alt=\"OT Security Challenges with Ransomware\" width=\"624\" height=\"351\" \/><\/span><\/p><p style=\"text-align: center;\"><strong>Diagram #1 &#8211; An OT Security Challenge: Industrial Components Exposed to Encryption<\/strong><\/p><p>From what we\u2019ve seen, ransomware generally encrypts Windows and Linux machines. We still haven\u2019t seen any PLCs being encrypted. However, many industrial services are run on Windows \/ Linux machines &#8211; such as Historians, HMIs, Storage, Application Servers, Management Portals and OPC Client\/Servers.<\/p><p>In many cases, ransomware operations would not stop in the IT network, and will also attack OT segments. More encrypted devices means a higher monetary ransom demand from the attackers.<\/p><p>Organizations must be able to monitor &amp; detect threats across the IT\/OT boundary in order to effectively identify risks before reaching process-critical end-points.<\/p><p><img decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/lh4.googleusercontent.com\/yDwi8qMUkLyKjHPHAs-la6RdET6lsMe24bby4FLsbaOeLTE7W7MS6VrtHuwIaAtZk7wYUI8C-TMAbMix7RHZAp6QavpD4_nVDQn4vVDmJf_t-G3bpVxwlHaLp1ZuNzrwNtmIZD9u\" alt=\"Ransomware Prevention in Industrial Networks\" width=\"624\" height=\"351\" \/><\/p><p style=\"text-align: center;\"><strong>Diagram #2 &#8211; Ransomware Prevention: How You Can Prevent Ransomware Attacks On Your Industrial Networks\u00a0<\/strong><\/p><p>Some of the tools and techniques that ransomware operators are using are on the same level that nation-state threat actors are using on targeted espionage campaigns.<\/p><div><div class=\"vidyard-player-container\" style=\"margin: auto; width: 100%; height: auto; overflow: hidden; display: block; max-width: 1728px; max-height: 1080px;\"><div class=\"vidyard-div-tRohkyP7aqwAzqrQ6S352C\" style=\"position: relative; padding-bottom: 62.5%; height: 0px; overflow: hidden; max-width: 100%; background-color: transparent;\" role=\"application\" aria-label=\"Vidyard media player\"><div class=\"vidyard-inner-container-tRohkyP7aqwAzqrQ6S352C\" style=\"position: absolute; height: 100%; width: 100%; max-width: 1728px; max-height: 1080px;\" data-pl=\"false\"><iframe class=\"vidyard-iframe-tRohkyP7aqwAzqrQ6S352C\" style=\"opacity: 1; background-color: transparent; position: absolute; top: 0px; left: 0px;\" title=\"Vidyard video player\" src=\"https:\/\/play.vidyard.com\/tRohkyP7aqwAzqrQ6S352C?disable_popouts=1&amp;v=4.2.27&amp;viral_sharing=0&amp;embed_button=0&amp;hide_playlist=1&amp;color=FFFFFF&amp;playlist_color=FFFFFF&amp;play_button_color=2A2A2A&amp;gdpr_enabled=1&amp;type=inline&amp;autoplay=0&amp;loop=0&amp;muted=0&amp;hidden_controls=0&amp;vydata%5Butk%5D=e930d10325127ad2971ceb387bb50144&amp;vydata%5Bportal_id%5D=6931155&amp;vydata%5Bcontent_type%5D=blog-post&amp;vydata%5Bcanonical_url%5D=https%3A%2F%2Fblog.scadafence.com%2Fhow-you-should-prevent-ransomware-attacks-on-your-industrial-networks&amp;vydata%5Bpage_id%5D=41083836162&amp;vydata%5Bcontent_page_id%5D=41083836162&amp;vydata%5Blegacy_page_id%5D=41083836162&amp;vydata%5Bcontent_folder_id%5D=null&amp;vydata%5Bcontent_group_id%5D=26199554173&amp;vydata%5Bab_test_id%5D=null&amp;vydata%5Blanguage_code%5D=null\" width=\"100%\" height=\"100%\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" aria-label=\"Vidyard video player\"><\/iframe><img decoding=\"async\" class=\"vidyard-player-embed inserted\" style=\"display: none; max-width: 100%; margin: 0px auto; width: 1728px; height: auto;\" src=\"https:\/\/play.vidyard.com\/tRohkyP7aqwAzqrQ6S352C.jpg\" alt=\"TTPs Ransomware Animated\" width=\"1728\" height=\"1080\" data-uuid=\"tRohkyP7aqwAzqrQ6S352C\" data-v=\"4\" data-width=\"1728\" data-height=\"1080\" data-viral_sharing=\"0\" data-embed_button=\"0\" data-hide_playlist=\"1\" data-color=\"FFFFFF\" data-playlist_color=\"FFFFFF\" data-play_button_color=\"2A2A2A\" data-gdpr_enabled=\"1\" data-type=\"inline\" data-autoplay=\"0\" data-loop=\"0\" data-muted=\"0\" data-hidden_controls=\"0\" data-vydata=\"%7B%22utk%22%3A%22e930d10325127ad2971ceb387bb50144%22%2C%22portal_id%22%3A6931155%2C%22content_type%22%3A%22blog-post%22%2C%22canonical_url%22%3A%22https%3A%2F%2Fblog.scadafence.com%2Fhow-you-should-prevent-ransomware-attacks-on-your-industrial-networks%22%2C%22page_id%22%3A41083836162%2C%22content_page_id%22%3A41083836162%2C%22legacy_page_id%22%3A%2241083836162%22%2C%22content_folder_id%22%3Anull%2C%22content_group_id%22%3A26199554173%2C%22ab_test_id%22%3Anull%2C%22language_code%22%3Anull%7D\" data-rendered=\"true\" \/><\/div><\/div><\/div><\/div><p style=\"text-align: center;\"><strong><br \/><\/strong><strong>Diagram #3 &#8211; Tactics, Techniques &amp; Procedures most commonly used in Ransomware Attacks<\/strong><\/p><p>We recommend that organizations practice these common security procedures to minimize their risk of ransomware infection on each step of the kill chain:<\/p><p><strong>Initial Access:<\/strong><\/p><ol><li aria-level=\"1\"><span style=\"text-decoration: underline;\">RDP<\/span><ol><li aria-level=\"2\">If possible, replace RDP with a <a href=\"https:\/\/www.scadafence.com\/scadafence-remote-access-security\/\" target=\"_blank\" rel=\"noopener\">remote access solution<\/a> that requires two-factor authentication, many VPNs now support that. This will require attackers to be verified by, for example, a code sent via SMS.<\/li><li aria-level=\"2\">If you choose to still use RDP, make sure its Windows Update is enabled and is working.<\/li><\/ol><\/li><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Email Phishing<\/span><ol><li aria-level=\"2\">Educate the organization\u2019s employees about phishing attacks. Employees should be suspicious of emails that don\u2019t seem right and not click on suspicious links.<\/li><li aria-level=\"2\">Install an Anti-Phishing solution.<\/li><\/ol><\/li><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Software vulnerabilities of internet-facing servers<\/span><ol><li aria-level=\"2\">Scan your organization\u2019s IP range from outside the network. Verify that all exposed IP\/ports are what you expect them to be.<\/li><li aria-level=\"2\">Make sure that automatic security updates are enabled for your exposed services. If one of your services (such as web servers, for example) does not have that feature, consider changing it to a similar one that has this feature.<\/li><\/ol><\/li><\/ol><p><strong>Lateral Movement:<\/strong><\/p><ol><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Firewalls &amp; Windows Update<\/span> &#8211; Enable firewalls on all of your workstations and servers.<br \/>Make sure that Windows Update is enabled. This will ensure that your machines will be patched for the latest vulnerabilities and will also be less prone to lateral movement techniques. Microsoft constantly updates their security policies and their firewall rules.<br \/>One good example is that they disabled the remote creation of processes using the Task Scheduler <em>\u2018at\u2019<\/em> command.<\/li><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Endpoint Protection<\/span><\/li><\/ol><p style=\"padding-left: 40px;\">Endpoint protection works. Beyond blocking classic hackers\u2019 techniques, some also have defenses against ransomware and will protect your assets from encryption.<\/p><ol><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Network Segmentation<\/span><br \/>Ideally, you would want to minimize the risk of your industrial network being impacted when suffering a ransomware attack.<ol><li aria-level=\"2\">To the possible extent, separate the IT network from the OT network segment. Monitor and limit the access between the segments.<\/li><li aria-level=\"2\">Use different management servers to the OT and IT networks (Windows Domains, etc). By doing so, compromising the IT domain will not compromise the OT domain.<\/li><\/ol><\/li><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Constant Network Monitoring<\/span><br \/>A constant network monitoring platform (<a href=\"https:\/\/youtu.be\/p6QZWYIfvLw\" target=\"_blank\" rel=\"noopener\">we happen to know a really good one<\/a>), will help you identify threats while analyzing network traffic and will help you see the bigger picture of what\u2019s happening in your network.<\/li><li aria-level=\"1\"><span style=\"text-decoration: underline;\">Data Exfiltration<\/span><br \/>Monitor your network for unusual outbound traffic. Everyday user activity should not generate uplink activity higher than about 200MB\/daily per user.<\/li><\/ol><p><strong>How SCADAfence Helps You<\/strong><\/p><p>We provide a comprehensive solution &#8211; <a href=\"https:\/\/www.scadafence.com\/platform\/\" target=\"_blank\" rel=\"noopener\">The SCADAfence\u2019s platform<\/a> which was built to protect industrial organizations like yours from industrial cyber attacks (including ransomware). It also helps you implement better security practices amongst its built in features. Some of these include:<\/p><ul><li aria-level=\"1\">Asset Management<\/li><li aria-level=\"1\">Network Maps<\/li><li aria-level=\"1\">Traffic Analyzers<\/li><\/ul><p>These tools will help your organization to implement better network segmentation, to make sure that your firewalls are functioning properly, and that every device in the OT network is communicating only with the ones that they should be communicating with. You will also be able to spot assets that are not where they&#8217;re supposed to be, for example, forgotten assets in the DMZ.<\/p><p>The platform, <a href=\"https:\/\/www.gartner.com\/reviews\/market\/operational-technology-security\/vendor\/scadafence\/product\/scadafence-platform\" target=\"_blank\" rel=\"noopener\">which is also the highest rated OT &amp; IoT security platform<\/a>, also monitors the network traffic for any threats, including ones that are found in typical ransomware attacks; such as:<\/p><ul><li aria-level=\"1\">Security exploits being sent across the network.<\/li><li aria-level=\"1\">Lateral movements attempts using latest techniques.<\/li><li aria-level=\"1\">Network scanning and network reconnaissance.<\/li><\/ul><p>In an event of a security breach, SCADAfence\u2019s detailed alerts will help you to contain these threats as quickly as possible. Ultimately, we built this tool to help industrial organizations to understand their attack surface, to implement effective segmentation and constant network monitoring for any malicious or anomalous activity.<\/p><p><strong>Video: The Anatomy of a Targeted Ransomware Attack:<\/strong><\/p><p>We\u2019d like to share with you a true story of a recent incident response to an industrial ransomware cyberattack. SCADAfence\u2019s incident response team assists companies in cyber security emergencies. In this video, we will review a recent incident response activity in which we took part. This research has been published with the goal of assisting organizations to plan for such events and reduce the impact of targeted industrial ransomware in their networks.<\/p><div class=\"hs-embed-wrapper\" style=\"position: relative; overflow: hidden; width: 100%; height: auto; padding: 0; max-width: 560px; max-height: 315px; min-width: 256px; display: block; margin: auto;\" data-service=\"youtube\" data-responsive=\"true\"><div class=\"hs-embed-content-wrapper\"><div style=\"position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0px;\"><iframe style=\"position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;\" src=\"https:\/\/www.youtube.com\/embed\/I8ZoyTPSfHE\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/div><\/div><\/div><p>For more detailed information on this story, we prepared a full whitepaper here: <a href=\"https:\/\/www.scadafence.com\/resource\/anatomy-of-a-targeted-ransomware-attack\/\">https:\/\/www.scadafence.com\/resource\/anatomy-of-a-targeted-ransomware-attack\/<\/a><\/p><p style=\"font-size: 12px;\">Additional credits: Yossi Reuven and Michael Yehoshua have also contributed to this comprehensive guide.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c0b97cb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c0b97cb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;5889835&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e337d0f\" data-id=\"e337d0f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5987d9c elementor-widget elementor-widget-shortcode\" data-id=\"5987d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18130\" class=\"elementor elementor-18130\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ff2a228 elementor-widget elementor-widget-text-editor\" data-id=\"ff2a228\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><strong>About SCADAfence<\/strong><br \/>SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT\/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world\u2019s most complex OT networks, including Europe\u2019s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-db8720a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"db8720a\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;5889835&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-080fb20\" data-id=\"080fb20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>This Week, Ransomware Slams Westrock &amp; Other indust [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[417,461,61],"tags":[418,462],"class_list":["post-25751","post","type-post","status-publish","format-standard","hentry","category-scadafence","category-year2021","category-press-release","tag-scadafence","tag-462"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How You Should Prevent Ransomware Attacks On Your Industrial Networks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How You Should Prevent Ransomware Attacks On Your Industrial Networks - Version 2\" \/>\n<meta property=\"og:description\" content=\"This Week, Ransomware Slams Westrock &amp; Other indust [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-02T04:15:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-07T04:20:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/02\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"How You Should Prevent Ransomware Attacks On Your Industrial Networks\",\"datePublished\":\"2021-02-02T04:15:48+00:00\",\"dateModified\":\"2022-03-07T04:20:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/02\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\\\/\"},\"wordCount\":1364,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP\",\"keywords\":[\"SCADAfence\",\"2021\"],\"articleSection\":[\"SCADAfence\",\"2021\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/2021\\\/02\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\\\/\",\"url\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\",\"name\":\"How You Should Prevent Ransomware Attacks On Your Industrial Networks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP\",\"datePublished\":\"2021-02-02T04:15:48+00:00\",\"dateModified\":\"2022-03-07T04:20:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage\",\"url\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP\",\"contentUrl\":\"https:\\\/\\\/lh3.googleusercontent.com\\\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.scadafence.com\\\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How You Should Prevent Ransomware Attacks On Your Industrial Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How You Should Prevent Ransomware Attacks On Your Industrial Networks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks","og_locale":"en_US","og_type":"article","og_title":"How You Should Prevent Ransomware Attacks On Your Industrial Networks - Version 2","og_description":"This Week, Ransomware Slams Westrock &amp; Other indust [&hellip;]","og_url":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks","og_site_name":"Version 2","article_published_time":"2021-02-02T04:15:48+00:00","article_modified_time":"2022-03-07T04:20:07+00:00","og_image":[{"url":"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#article","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/2021\/02\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"How You Should Prevent Ransomware Attacks On Your Industrial Networks","datePublished":"2021-02-02T04:15:48+00:00","dateModified":"2022-03-07T04:20:07+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/zh\/2021\/02\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\/"},"wordCount":1364,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage"},"thumbnailUrl":"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP","keywords":["SCADAfence","2021"],"articleSection":["SCADAfence","2021","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/zh\/2021\/02\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks\/","url":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks","name":"How You Should Prevent Ransomware Attacks On Your Industrial Networks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage"},"image":{"@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage"},"thumbnailUrl":"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP","datePublished":"2021-02-02T04:15:48+00:00","dateModified":"2022-03-07T04:20:07+00:00","breadcrumb":{"@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#primaryimage","url":"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP","contentUrl":"https:\/\/lh3.googleusercontent.com\/CLDaiPqG1aNeay8PSQV9W_5YNYukZf_X29leFZ0maD_MeI0kYko4kIgCsh77IrpKYHAB-HG6OrUT_kwZZAbjeAnKF8816TE0j5HveNtqjJr2MMF_j5fBgs0kSgoTZfmYICP-jhiP"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.scadafence.com\/how-you-should-prevent-ransomware-attacks-on-your-industrial-networks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"How You Should Prevent Ransomware Attacks On Your Industrial Networks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-6Hl","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/25751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=25751"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/25751\/revisions"}],"predecessor-version":[{"id":44162,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/25751\/revisions\/44162"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=25751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=25751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=25751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}