{"id":14469,"date":"2016-06-08T05:00:14","date_gmt":"2016-06-08T12:00:14","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=14469"},"modified":"2016-06-07T22:11:28","modified_gmt":"2016-06-08T05:11:28","slug":"how-to-prevent-ransomware-in-industrial-control-systems","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2016\/06\/how-to-prevent-ransomware-in-industrial-control-systems\/","title":{"rendered":"How to Prevent Ransomware in Industrial Control Systems"},"content":{"rendered":"<p>Del Rodillas, our solution lead for SCADA &amp; Industrial Control Systems, recently appeared in Electric Light &amp; Power to discuss ransomware as an emerging threat for Operational Technology environments. With ransomware on everyone\u2019s mind these days, Del shares insights from the <a href=\"http:\/\/go.paloaltonetworks.com\/ransomware2016\" target=\"_blank\">recent report published by Unit 42<\/a> and instructs ICS owners and operators on how they can prepare their organizations to defend critical systems against ransomware.<\/p>\n<p>As Del writes, \u201cIt is in every ICS owner\u2019s and operator\u2019s best interest to act now to prepare their organization from this rising threat. Education is the first step...\u201d<\/p>\n<p><!--more--><\/p>\n<p>Read <a href=\"http:\/\/www.elp.com\/Electric-Light-Power-Newsletter\/articles\/2016\/06\/holding-the-hmi-hostage-the-growing-threat-of-ransomware.html\" rel=\"nofollow,noopener\"  target=\"_blank\">Del\u2019s full article<\/a> in Electric Light &amp; Power, and check out an infographic below.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:77.8%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"size-large wp-image-14472 aligncenter lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image-500x389.png\" alt=\"ICS image\" width=\"500\" height=\"389\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image-500x389.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image-230x179.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image-386x300.png 386w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image-51x40.png 51w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2016\/06\/ICS-image.png 657w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Learn more:<\/p>\n<ul>\n<li><a href=\"http:\/\/go.paloaltonetworks.com\/ransomware2016\" target=\"_blank\">Download the Unit 42 Ransomware report<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/industries\/enterprise\/scada-and-industrial-control\" target=\"_blank\">Palo Alto Networks solutions for ICS\/SCADA<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/industries\/enterprise\/electric-utilities\" target=\"_blank\">Palo Alto Networks solutions for Electric Utilities<\/a><\/li>\n<li><a href=\"https:\/\/www.paloaltonetworks.com\/solutions\/industries\/enterprise\/oil-gas\" target=\"_blank\">Palo Alto Networks solutions for Oil &amp; Gas<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Del Rodillas, our solution lead for SCADA &amp; Industrial Control Systems, recently appeared in Electric Light &amp; Power to discuss ransomware as an emerging threat for Operational Technology environments. With ransomware on &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,566],"tags":[1132,662,846,2070,221],"coauthors":[709],"class_list":["post-14469","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-scada-ics","tag-autofocus","tag-cyber-threat-alliance","tag-del-rodillas","tag-electric-light-power","tag-ransomware"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=14469"}],"version-history":[{"count":1,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14469\/revisions"}],"predecessor-version":[{"id":14475,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/14469\/revisions\/14475"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=14469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=14469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=14469"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=14469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}