{"id":13299,"date":"2018-09-20T16:41:26","date_gmt":"2018-09-20T16:41:26","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/"},"modified":"2018-09-20T16:41:26","modified_gmt":"2018-09-20T16:41:26","slug":"securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/","title":{"rendered":"Securing industrial IoT passwords: For Pete&#8217;s sake, engineers, don&#8217;t all jump in at once"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/09\/20\/shutterstock_industrial_iot.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Cybersecurity has become an increasing priority in operations technology thanks to the growing appetite for the industrial internet of things.<\/p>\n<blockquote class=\"pullquote\" readability=\"6\">\n<p>The trouble comes from managers who make decisions about what to connect to the internet who don&#8217;t understand or have not bothered to consider the risks&#8230;<\/p>\n<\/blockquote>\n<p>Operations technology (OT) is the term given to all those environments in industry, transport, automotive, city and utilities that \u2013 before industrial IoT \u2013 had been largely isolated from the outside world and, thus, protected from intruders.<\/p>\n<p>Brexit or no Brexit, the UK is implementing an EU policy on the security of such systems via the <a target=\"_blank\" href=\"https:\/\/www.ncsc.gov.uk\/guidance\/introduction-nis-directive\">Networks and Information Systems Directive<\/a>, so securing OT is a necessity.<\/p>\n<p>With that in mind, a technology and services pact has been signed between two UK outfits seeking to stop the &#8220;worst&#8221; from happening to elements considered part of the national critical infrastructure systems.<\/p>\n<p>Privileged access management provider Osirium has partnered with aviation, rail and car cyber-security specialist Razor Secure to build and deliver a range of systems targeting industrial IoT applications including unattended operations, power and water plants, weather stations, manned and unmanned vehicles and other systems that could themselves be used as a gateway for &#8220;bad stuff&#8221; to hop onto a network.<\/p>\n<p>The target market for this partnership is systems \u201cdesigned well before deployment\u201d and \u201crequired to operate for 10 years or more.\u201d<\/p>\n<p>The pair said Razor Secure\u2019s machine learning algorithm would be used to hunt for process anomalies in endpoint security together with Osirium\u2019s system administrator Privileged Access Management (PAM) for secure passwords, workflow and robotic process task automation.<\/p>\n<h3 class=\"crosshead\"><span>What\u2019s the password?<\/span><\/h3>\n<p>When it comes to people and processes, much is made of the vulnerabilities in IoT, but one issue that has to be addressed is password management. There is no need to operate complex attacks based on protocol weaknesses when a simple password will open the door.<\/p>\n<p>This a people problem &#8211; many people need access to many things and changing passwords is inconvenient.<\/p>\n<p>According to Osirium chief technology officer Andy Harris, things have been going wrong from the outset when architects have designed systems where all critical plants are on their own network. The failures come where it is assumed that a firewall is good enough. This is a problem because firewall rules are source- and destination-based and if the attacker or meddler is coming from an allowed source and bouncing off destination systems, then the firewall is useless.<\/p>\n<p>Harris likes the idea of a proxy-based technology that accepts an identity and connects to the IoT devices with a defined role. If that proxy also checks with the change ticket, so much the better, as you\u2019re basically creating a digital equivalent of the physical locks.<\/p>\n<p>Osirium\u2019s approach is to separate people from passwords, cycle the passwords so they are highly complex and regularly changed, and control the tools that can be used for access.<\/p>\n<p>\u201cIn the real world we have a \u2018my lock\u2019 \u2018your lock\u2019 situation. If I go to work on a pump I put my lock on the breaker, if you work on the motor you put your lock on the breaker. If I finish before you I can\u2019t accidentally run a test because your lock is on the system,\u201d Harris said.<\/p>\n<p>\u201cTesting gets more complex, but there are still locks. I have to issue a \u2018sanction for test\u2019 and then get a \u2018permit to test\u2019 then go to the pump (where I might find your lock). System design is crucial.<\/p>\n<p>\u201cEach system should be designed on the principle of local control\/safety and global intelligence\/control. If a control system tells an airbridge to move, but there is a local lockout \u2013 the local lockout takes precedence. \u201c<\/p>\n<p>The closest thing to \u201cmy lock your lock\u201d in the software world is change tickets. These are procedures. They don\u2019t stop mistakes but they could. If an engineer is only allowed access to a system when there is a change ticket there would be a degree of control. However, people then need the discipline to ensure the change ticket is accurate.<\/p>\n<p>The trouble comes from managers who make decisions about what to connect to the internet who don&#8217;t understand or have not bothered to consider the risks.<\/p>\n<p>\u201cWhat really worries me is when I hear phrases like: \u2018That will add cost to the system&#8217;, or: \u2018We haven\u2019t got time to do that many checks\u2019 and: &#8216;No one ever writes up a ticket properly\u2019.\u201d<\/p>\n<p>His advice when it comes to building industrial IoT? \u201cIn software, design for worst intent.\u201d \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1787\/-6625\/following-bottomlines-journey-to-the-hybrid-cloud?td=wptl1787\">Following Bottomline\u2019s journey to the Hybrid Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/09\/20\/securing_industrial_iot_passwords\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If the networked kit needs to work for 10 years, you need to think policy Cybersecurity has become an increasing priority in operations technology thanks to the growing appetite for the industrial internet of things.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":13300,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-13299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Securing industrial IoT passwords: For Pete&#039;s sake, engineers, don&#039;t all jump in at once 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing industrial IoT passwords: For Pete&#039;s sake, engineers, don&#039;t all jump in at once 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-20T16:41:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Securing industrial IoT passwords: For Pete&#8217;s sake, engineers, don&#8217;t all jump in at once\",\"datePublished\":\"2018-09-20T16:41:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/\"},\"wordCount\":789,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/\",\"name\":\"Securing industrial IoT passwords: For Pete's sake, engineers, don't all jump in at once 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg\",\"datePublished\":\"2018-09-20T16:41:26+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/09\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing industrial IoT passwords: For Pete&#8217;s sake, engineers, don&#8217;t all jump in at once\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing industrial IoT passwords: For Pete's sake, engineers, don't all jump in at once 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/","og_locale":"en_US","og_type":"article","og_title":"Securing industrial IoT passwords: For Pete's sake, engineers, don't all jump in at once 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-09-20T16:41:26+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Securing industrial IoT passwords: For Pete&#8217;s sake, engineers, don&#8217;t all jump in at once","datePublished":"2018-09-20T16:41:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/"},"wordCount":789,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/","url":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/","name":"Securing industrial IoT passwords: For Pete's sake, engineers, don't all jump in at once 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg","datePublished":"2018-09-20T16:41:26+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/09\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/securing-industrial-iot-passwords-for-petes-sake-engineers-dont-all-jump-in-at-once\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Securing industrial IoT passwords: For Pete&#8217;s sake, engineers, don&#8217;t all jump in at once"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=13299"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/13299\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/13300"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=13299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=13299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=13299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}