blue'Log XM/XC
Breadcrumbs

Cybersecurity at your site

Last modified:

Warning

To enhance the IT security of your plants, follow these recommended practices to minimize potential risks.

Do

https://mc-help-center.atlassian.net/wiki/s/-813001308/6452/17b5d0ae2ede2362fa8d1e732dc89744e3e532f6/_/images/icons/emoticons/check.png Close or deactivate all ports on the router that are not needed.

https://mc-help-center.atlassian.net/wiki/s/-813001308/6452/17b5d0ae2ede2362fa8d1e732dc89744e3e532f6/_/images/icons/emoticons/check.png Use a firewall to block unwanted connections and attacks.

https://mc-help-center.atlassian.net/wiki/s/-813001308/6452/17b5d0ae2ede2362fa8d1e732dc89744e3e532f6/_/images/icons/emoticons/check.png Use only secure VPN connections for remote access to prevent public availability.

https://mc-help-center.atlassian.net/wiki/s/-813001308/6452/17b5d0ae2ede2362fa8d1e732dc89744e3e532f6/_/images/icons/emoticons/check.png Monitor your networks for unusual activities and signs of possible attacks.

https://mc-help-center.atlassian.net/wiki/s/-813001308/6452/17b5d0ae2ede2362fa8d1e732dc89744e3e532f6/_/images/icons/emoticons/check.png Keep all software and operating systems up to date to close security gaps.


Don’t

❌ Use port forwarding for remote access on your router. Otherwise, you will make your data logger accessible to the public.