{"id":9949,"date":"2015-08-14T06:00:03","date_gmt":"2015-08-14T13:00:03","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=9949"},"modified":"2015-08-13T20:58:21","modified_gmt":"2015-08-14T03:58:21","slug":"staying-secure-when-ics-patching-is-not-an-option","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2015\/08\/staying-secure-when-ics-patching-is-not-an-option\/","title":{"rendered":"Staying Secure When ICS Patching Is Not An Option"},"content":{"rendered":"<p>In a recent article for Utility Week, Del Rodillas describes a common challenge in securing\u00a0industrial control systems (ICS) -- that they're highly susceptible to cyberattacks because their software patching and anti-malware update cycles are too infrequent, if they're happening at all.\u00a0<!--more--><\/p>\n<p>\"In my experience, it's not that ICS professionals don't understand that patching is necessary and that systems are at risk of being compromised,\" Del writes. \"Rather, it's how the cumbersome process of ICS patching affects their main priority, which is high uptime.\"<\/p>\n<p>Read the full article at Utility Week <a href=\"http:\/\/utilityweek.co.uk\/news\/malware-threats-to-industrial-control-systems\/1156842#.Vb9leCShOfR\" rel=\"nofollow,noopener\"  target=\"_blank\">here<\/a> [registration required]. And for more on patch management, hear Del and ICS experts discuss these challenges in an <a href=\"https:\/\/www.paloaltonetworks.com\/content\/paloaltonetworks-com\/global\/en_US\/index\/resources\/webcasts\/isa-patch-management.html\" target=\"_blank\">on-demand webinar<\/a> that's part of our ongoing series on ICS cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a recent article for Utility Week, Del Rodillas describes a common challenge in securing\u00a0industrial control systems (ICS) -- that they're highly susceptible to cyberattacks because their software patching and anti-malware update &hellip;<\/p>\n","protected":false},"author":36,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,566],"tags":[815,846,726,1216,1370],"coauthors":[709],"class_list":["post-9949","post","type-post","status-publish","format-standard","hentry","category-malware-2","category-scada-ics","tag-cyberattacks","tag-del-rodillas","tag-industrial-control-systems","tag-patch-management","tag-utility-week"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=9949"}],"version-history":[{"count":3,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9949\/revisions"}],"predecessor-version":[{"id":9952,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/9949\/revisions\/9952"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=9949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=9949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=9949"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=9949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}