PFHMIIPCCS-MM01-EN.01

Introduction

Cybersecurity is intended to help protect your communication network and all equipment connected to it from attacks, that could disrupt operations (availability), modify information (integrity), or give away confidential information (confidentiality). The objective of cybersecurity is to provide increased levels of protection for information and physical assets from theft, corruption, misuse, or accidents while maintaining access for their intended users. There are many aspects to cybersecurity including designing secure systems, restricting access using physical and digital methods, identifying users, as well as implementing security procedures and best practice policies.

This section provides information on how and help to secure your system from a malicious cyber-attack.

For essential cybersecurity best practices, refer to Pro-face's Recommended Cybersecurity Best Practices.
https://www.pro-face.com/trans/en/manual/1087.html

WARNING
POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND CONFIDENTIALITY
  • Change default passwords at first use to help prevent unauthorized access to device settings, controls and information.
  • Disable unused ports/services and default accounts, where possible, to minimize pathways for malicious attacks.
  • Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection).
  • Apply the latest updates and hotfixes to your Operating System and software.
  • Use cybersecurity best practices (for example: least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, interruption of services, or unintended operation.
Failure to follow these instructions can result in death, serious injury, or equipment damage.

Search Results (0)

Close