{"id":703,"date":"2025-02-20T10:09:52","date_gmt":"2025-02-20T10:09:52","guid":{"rendered":"https:\/\/demolinks2.com\/cy-yue\/?page_id=703"},"modified":"2025-05-15T20:16:23","modified_gmt":"2025-05-15T20:16:23","slug":"24-7-hardened-network","status":"publish","type":"page","link":"https:\/\/demolinks2.com\/cy-yue\/24-7-hardened-network\/","title":{"rendered":"24\/7 Hardened Network"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;center-center&#8221; css=&#8221;.vc_custom_1740046316742{padding-top: 70px !important;padding-bottom: 180px !important;background-image: url(https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/11062b_5323252299a04f2a9c818aa15a74fe53mv2-1.jpg?id=705) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; woodmart_css_id=&#8221;67b6fefe77aa2&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2ZmVmZTc3YWEyIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;ban-rowx&#8221;][vc_column][vc_row_inner][vc_column_inner width=&#8221;1\/3&#8243;]\t\t<div id=\"wd-67b701b807a40\" class=\"wd-image wd-wpb wd-rs-67b701b807a40 text-left  img-011\">\n\t\t\t\n\t\t\t<img decoding=\"async\" width=\"245\" height=\"148\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_df3da1a1962d4d988c071d3d80fddd3dmv2-2.png\" class=\"attachment-249x148 size-249x148\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_df3da1a1962d4d988c071d3d80fddd3dmv2-2.png 245w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_df3da1a1962d4d988c071d3d80fddd3dmv2-2-150x91.png 150w\" sizes=\"(max-width: 245px) 100vw, 245px\" \/>\n\t\t\t\t\t<\/div>\n\t\t[\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; css=&#8221;.vc_custom_1740032182297{padding-top: 90px !important;padding-bottom: 0px !important;}&#8221; woodmart_css_id=&#8221;67b6c80fa96f9&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2YzgwZmE5NmY5Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;about-row&#8221;][vc_column css=&#8221;.vc_custom_1738681226336{padding-right: 0px !important;}&#8221; woodmart_css_id=&#8221;67a22cae7e07d&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2EyMmNhZTdlMDdkIiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;]\n\t\t<div id=\"wd-67f593fc8a57d\" class=\"title-wrapper wd-wpb set-mb-s reset-last-child  wd-rs-67f593fc8a57d wd-title-color-default wd-title-style-overlined text-center  wd-underline-colored\">\n\t\t\t\n\t\t\t<div class=\"liner-continer\">\n\t\t\t\t<h4 class=\"woodmart-title-container title  wd-font-weight- wd-fontsize-l\" >24\/7 Hardened Network<\/h4>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\n\t\t\t\t<div id=\"wd-67b6ffae47487\" class=\"wd-text-block wd-wpb reset-last-child wd-rs-67b6ffae47487 text-left  ul-10\">\n\t\t\t<ul>\n<li>Device Security<\/li>\n<li>Infrastructure Security<\/li>\n<li>Remote Security Audit<\/li>\n<\/ul>\n\t\t<\/div>\n\t\t\t\t<div id=\"wd-67b6fffbb26bd\" class=\"wd-text-block wd-wpb reset-last-child wd-rs-67b6fffbb26bd text-center wd-width-enabled  ul-10\" style=\"--wd-max-width: 70%;\">\n\t\t\t<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\"><span class=\"color_37 wixui-rich-text__text\">Cyber attack trends toward industrial automation sectors is continuous increasing everyday. Cybersecurity&#8230;&#8230;.<\/span><\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\"><span class=\"color_37 wixui-rich-text__text\"><span class=\"wixGuard wixui-rich-text__text\">\u200b<\/span><\/span><\/span><strong><span class=\"wixui-rich-text__text\">Industrial cybersecurity<\/span><\/strong><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The Global Cybercrime trend is no longer target the finance or banking industries, but rapidly increasing into Industrial Market sectors. Referring to ICS-CERT, the Industrial Control Systems Cyber Emergency Response Team in 2023H1, the top 5 industries were impact the main incident from Manufacturing, Automotive, Power and Energy, to Electronics and Utility. Real-World Consequences, a successful cyberattack on industrial control systems can have devastating consequences. It can disrupt critical infrastructure services, cause physical damage to equipment, and even endanger human lives.<\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\"><span class=\"wixGuard wixui-rich-text__text\">\u200b<\/span><\/span><span class=\"wixui-rich-text__text\">Industrial cybersecurity focuses on protecting industrial control systems (ICS) from cyberattacks. ICS are the computers and networks that monitor and control physical processes in essential infrastructure sectors like:\u00a0Manufacturing (production lines, robots),\u00a0Power and Utilities (electrical grids, power plants),\u00a0Oil and Gas (pipelines, refineries),\u00a0Water and Wastewater (treatment plants, distribution systems),\u00a0Transportation (traffic control systems, railways).<\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixGuard wixui-rich-text__text\">\u200b<\/span>IEC 62443 is an international series of standards developed by the International Electrotechnical Commission (IEC) to address cybersecurity for operational technology (OT) in automation and control systems. It&#8217;s considered the world&#8217;s only consensus-based standard for securing these systems.<\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixGuard wixui-rich-text__text\">\u200b<\/span>2RL Communications provides all communications and networking solution products embraced all security profile features under IEC-62443 Standards, and will assist our Clients, Engineers to walk thru how those security features will achieve Security Hardened their Industrial Control Systems network from &#8220;Devices Security&#8221; level, to &#8220;Network Infrastructure&#8221; level and &#8220;Remote Security Audit&#8221; level.<\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixGuard wixui-rich-text__text\">\u200b<\/span><span class=\"wixui-rich-text__text\">***\u00a0Another important point is,\u00a0Industrial cybersecurity is an ongoing process. Organizations need to continuously monitor their systems, identify new threats, and update their security measures accordingly.<\/span><\/p>\n\t\t<\/div>\n\t\t[\/vc_column][\/vc_row][vc_row woodmart_css_id=&#8221;67e1ec6e94b0f&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2UxZWM2ZTk0YjBmIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;info-four-0005&#8243; el_class=&#8221;info_fourxsd&#8221;][vc_column width=&#8221;1\/2&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b70170dd0d3\" class=\" wd-rs-67b70170dd0d3 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"143\" height=\"145\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/45.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Best Practice of Industrial Cybersecurity<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The best practice for implementing industrial cybersecurity starts from\u00a0<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Risk Assessment<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Identifying vulnerabilities and potential threats to ICS components.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Network Segmentation<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Isolating critical control systems from non-essential networks to limit the attack surface.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Access Controls<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Implementing strong access control measures to restrict unauthorized access to all industrial control systems devices.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Patch Management<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">\u200bKeeping software on all industrial control system devices updated with the latest security patches.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Intrusion Detection and Prevention Systems (IDS\/IPS)<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Monitoring network traffic for suspicious activity and preventing cyberattacks.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Cybersecurity Awareness Training<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">\u200bEducating personnel about cyber threats and best practices for secure operation of ICS<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b701a2b7c1b\" class=\" wd-rs-67b701a2b7c1b wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"134\" height=\"150\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/56.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">ICS network Security Hardened<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">2RL industry expert team will deliver industrial cybersecurity ready products from Industrial Embedded Computers, to Industrial Networking Equipment and Software which embraced with IEC62443 standards profile features, and will assist Engineers to implementing their Industrial Control Systems Network with Security Hardened as below three different levels:<\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><strong><span class=\"wixui-rich-text__text\">Device Security<\/span><\/strong><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Hardened devices security with embedded security functions under IEC62443 profile, such as,\u00a0<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Auto Logout enabling<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Login Warning Message setup<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Non-encrypted TCP\/UDP Ports<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Account Login Failure Lockout<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Trusted Access<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Password Complexity Strength Check<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Configuration File Encryption<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Broadcast Storm Protection<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">SNMP Trap\/Inform or Syslog Server<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Change Default Password \/ SNMP \/\u00a0<\/span><span class=\"wixui-rich-text__text\">Community String<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"font_8 wixui-rich-text__text\"><strong><span class=\"wixui-rich-text__text\">Network Infrastructure Security<\/span><\/strong><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Hardened the security communication from ICS network to prevent any unauthorized access<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Maximize security protection with additional Industrial Secure Routers, embraced IEC62443 standards security functions, such as<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Firewall\u200b<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">VPN (Virtual Private Network Tunnel)<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">NAT (Network Address Translation)<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Routing\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"font_8 wixui-rich-text__text\"><strong><span class=\"wixui-rich-text__text\">Remote Security Audit\u00a0<\/span><\/strong><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Maximize Network Management Software tool to assist Engineers to improve visualization\u00a0<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Visualize and manage any ICS network equipment security levels<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Enhance remote monitoring and security audit<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/2&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b70195406d8\" class=\" wd-rs-67b70195406d8 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"219\" height=\"82\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/55.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/55.png 219w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/55-150x56.png 150w\" sizes=\"(max-width: 219px) 100vw, 219px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Global Cybersecurity Standard IEC62443<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">IEC 62443 is an international series of standards developed by the International Electrotechnical Commission (IEC) to address cybersecurity for operational technology (OT) in automation and control systems.<\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">IEC 62443 &#8211; Defense in Depth<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Focus on OT Security<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">It is unlike traditional IT security standards.<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">It is specifically designed for the unique requirements of operational technology (OT) environments.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Comprehensive Framework<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Risk assessment<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Identifying vulnerabilities and threats to OT systems<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Security policies and procedures<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Establishing guidelines for secure system operation.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Network and system segmentation<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Isolating critical systems from non-essential networks to limit attack surfaces.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Access control<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Restricting unauthorized access to OT devices.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Incident response<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Having a plan to identify, contain, and recover from cyberattacks.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Patch management\u00a0<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Keeping software updated with the latest security patches.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Security testing and assessment<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Regularly evaluating the security posture of OT systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Stakeholder Focus<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\">\u200b<span class=\"wixui-rich-text__text\">Operators<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The personnel responsible for day-to-day operation of the systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Service providers<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Companies that provide maintenance or integration services for OT systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Component\/system manufacturers<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The manufacturers of the devices and software used in OT systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b700fbd6a09\" class=\" wd-rs-67b700fbd6a09 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"208\" height=\"158\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/23.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/23.png 208w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/23-150x114.png 150w\" sizes=\"(max-width: 208px) 100vw, 208px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Benefits<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">2RL Communications Industry Expert Team will assist Clients to discuss what and how Cybersecurity ready networking equipment and software tool to achieve<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Hardened the control system network<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">from Device level, to ICS Network Infrastructure\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Security Audit<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Assist Clients to enable the security protection levels under IEC62443 security profile to the entire ICS network<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Utilize the network management software tool to perform remote security audit<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; woodmart_css_id=&#8221;67e1ec624980f&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2UxZWM2MjQ5ODBmIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;info-four-0005&#8243;][vc_column]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b70170dd0d3\" class=\" wd-rs-67b70170dd0d3 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"143\" height=\"145\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/45.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Best Practice of Industrial Cybersecurity<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The best practice for implementing industrial cybersecurity starts from\u00a0<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Risk Assessment<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Identifying vulnerabilities and potential threats to ICS components.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Network Segmentation<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Isolating critical control systems from non-essential networks to limit the attack surface.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Access Controls<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Implementing strong access control measures to restrict unauthorized access to all industrial control systems devices.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Patch Management<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">\u200bKeeping software on all industrial control system devices updated with the latest security patches.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Intrusion Detection and Prevention Systems (IDS\/IPS)<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Monitoring network traffic for suspicious activity and preventing cyberattacks.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Cybersecurity Awareness Training<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">\u200bEducating personnel about cyber threats and best practices for secure operation of ICS<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b70195406d8\" class=\" wd-rs-67b70195406d8 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"219\" height=\"82\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/55.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/55.png 219w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/55-150x56.png 150w\" sizes=\"(max-width: 219px) 100vw, 219px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Global Cybersecurity Standard IEC62443<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">IEC 62443 is an international series of standards developed by the International Electrotechnical Commission (IEC) to address cybersecurity for operational technology (OT) in automation and control systems.<\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">IEC 62443 &#8211; Defense in Depth<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Focus on OT Security<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">It is unlike traditional IT security standards.<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">It is specifically designed for the unique requirements of operational technology (OT) environments.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Comprehensive Framework<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Risk assessment<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Identifying vulnerabilities and threats to OT systems<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Security policies and procedures<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Establishing guidelines for secure system operation.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Network and system segmentation<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Isolating critical systems from non-essential networks to limit attack surfaces.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Access control<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Restricting unauthorized access to OT devices.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Incident response<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Having a plan to identify, contain, and recover from cyberattacks.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Patch management\u00a0<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Keeping software updated with the latest security patches.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Security testing and assessment<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Regularly evaluating the security posture of OT systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Stakeholder Focus<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\">\u200b<span class=\"wixui-rich-text__text\">Operators<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The personnel responsible for day-to-day operation of the systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Service providers<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Companies that provide maintenance or integration services for OT systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Component\/system manufacturers<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">The manufacturers of the devices and software used in OT systems.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b701a2b7c1b\" class=\" wd-rs-67b701a2b7c1b wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"134\" height=\"150\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/56.png\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">ICS network Security Hardened<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">2RL industry expert team will deliver industrial cybersecurity ready products from Industrial Embedded Computers, to Industrial Networking Equipment and Software which embraced with IEC62443 standards profile features, and will assist Engineers to implementing their Industrial Control Systems Network with Security Hardened as below three different levels:<\/span><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><strong><span class=\"wixui-rich-text__text\">Device Security<\/span><\/strong><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Hardened devices security with embedded security functions under IEC62443 profile, such as,\u00a0<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Auto Logout enabling<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Login Warning Message setup<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Non-encrypted TCP\/UDP Ports<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Account Login Failure Lockout<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Trusted Access<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Password Complexity Strength Check<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Configuration File Encryption<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Broadcast Storm Protection<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">SNMP Trap\/Inform or Syslog Server<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Change Default Password \/ SNMP \/\u00a0<\/span><span class=\"wixui-rich-text__text\">Community String<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"font_8 wixui-rich-text__text\"><strong><span class=\"wixui-rich-text__text\">Network Infrastructure Security<\/span><\/strong><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Hardened the security communication from ICS network to prevent any unauthorized access<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Maximize security protection with additional Industrial Secure Routers, embraced IEC62443 standards security functions, such as<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Firewall\u200b<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">VPN (Virtual Private Network Tunnel)<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">NAT (Network Address Translation)<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Routing\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p class=\"font_8 wixui-rich-text__text\"><strong><span class=\"wixui-rich-text__text\">Remote Security Audit\u00a0<\/span><\/strong><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Maximize Network Management Software tool to assist Engineers to improve visualization\u00a0<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Visualize and manage any ICS network equipment security levels<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Enhance remote monitoring and security audit<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b700fbd6a09\" class=\" wd-rs-67b700fbd6a09 wd-info-box wd-wpb text-left box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"208\" height=\"158\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/23.png\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/23.png 208w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/23-150x114.png 150w\" sizes=\"(max-width: 208px) 100vw, 208px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<h4 class=\"info-box-title title box-title-style-default wd-fontsize-m\">Benefits<\/h4>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/p>\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">2RL Communications Industry Expert Team will assist Clients to discuss what and how Cybersecurity ready networking equipment and software tool to achieve<\/span><\/p>\n<ul class=\"font_8 wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Hardened the control system network<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">from Device level, to ICS Network Infrastructure\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Security Audit<\/span><\/p>\n<ul class=\"wixui-rich-text__text\">\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Assist Clients to enable the security protection levels under IEC62443 security profile to the entire ICS network<\/span><\/p>\n<\/li>\n<li class=\"wixui-rich-text__text\">\n<p class=\"font_8 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">Utilize the network management software tool to perform remote security audit<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; disable_element=&#8221;yes&#8221; css=&#8221;.vc_custom_1746494652702{padding-top: 90px !important;padding-bottom: 0px !important;}&#8221; woodmart_css_id=&#8221;6819642f794be&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2ODE5NjQyZjc5NGJlIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;about-row&#8221;][vc_column css=&#8221;.vc_custom_1738681226336{padding-right: 0px !important;}&#8221; woodmart_css_id=&#8221;67a22cae7e07d&#8221; parallax_scroll=&#8221;no&#8221; woodmart_sticky_column=&#8221;false&#8221; wd_collapsible_content_switcher=&#8221;no&#8221; wd_column_role_offcanvas_desktop=&#8221;no&#8221; wd_column_role_offcanvas_tablet=&#8221;no&#8221; wd_column_role_offcanvas_mobile=&#8221;no&#8221; wd_column_role_content_desktop=&#8221;no&#8221; wd_column_role_content_tablet=&#8221;no&#8221; wd_column_role_content_mobile=&#8221;no&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_box_shadow=&#8221;no&#8221; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2EyMmNhZTdlMDdkIiwic2hvcnRjb2RlIjoidmNfY29sdW1uIiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_reset_margin=&#8221;no&#8221; tablet_reset_margin=&#8221;no&#8221; wd_z_index=&#8221;no&#8221;]\n\t\t<div id=\"wd-67b6eee0b48cb\" class=\"title-wrapper wd-wpb set-mb-s reset-last-child  wd-rs-67b6eee0b48cb wd-title-color-default wd-title-style-overlined text-center  wd-underline-colored\">\n\t\t\t\n\t\t\t<div class=\"liner-continer\">\n\t\t\t\t<h4 class=\"woodmart-title-container title  wd-font-weight- wd-fontsize-l\" >Recommended Products<\/h4>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\n\t\t[\/vc_column][\/vc_row][vc_row disable_element=&#8221;yes&#8221; woodmart_stretch_content=&#8221;section-stretch-content&#8221; woodmart_css_id=&#8221;6819642aa90b0&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2ODE5NjQyYWE5MGIwIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243; el_id=&#8221;proxo-row&#8221;][vc_column width=&#8221;1\/5&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b66286840b5\" class=\" wd-rs-67b66286840b5 wd-info-box wd-wpb text-center box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"60\" height=\"175\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-sds-3008-series-image-1_edited.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<div class=\"info-box-subtitle wd-fontsize-xs subtitle-style-background wd-font-weight-700\">SDS-3008 series<\/div><p class=\"info-box-title title box-title-style-default wd-fontsize-s\">Industrial Layer 2<br \/>\nLite Managed Switches<\/p>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style>#wd-67b66286840b5 .info-box-subtitle{}<\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/5&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b662e1807cb\" class=\" wd-rs-67b662e1807cb wd-info-box wd-wpb text-center box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"177\" height=\"42\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-mgate-mb3660-series-image-1-1_edited.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-mgate-mb3660-series-image-1-1_edited.jpg 177w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-mgate-mb3660-series-image-1-1_edited-150x36.jpg 150w\" sizes=\"(max-width: 177px) 100vw, 177px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<div class=\"info-box-subtitle wd-fontsize-xs subtitle-style-background wd-font-weight-700\">MGate MB3600 series<\/div><p class=\"info-box-title title box-title-style-default wd-fontsize-s\">Industrial Modbus Gateways<\/p>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style>#wd-67b662e1807cb .info-box-subtitle{}<\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/5&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b6637e9aa08\" class=\" wd-rs-67b6637e9aa08 wd-info-box wd-wpb text-center box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"122\" height=\"193\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/IEC61850.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<div class=\"info-box-subtitle wd-fontsize-xs subtitle-style-background wd-font-weight-700\">EDS-G4012 series<\/div><p class=\"info-box-title title box-title-style-default wd-fontsize-s\">Industrial Edge Layer 2 Managed Switches<\/p>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style>#wd-67b6637e9aa08 .info-box-subtitle{}<\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/5&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b6639b2d8f0\" class=\" wd-rs-67b6639b2d8f0 wd-info-box wd-wpb text-center box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"187\" height=\"62\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-nport-6400-6600-series-image-1_edited.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-nport-6400-6600-series-image-1_edited.jpg 187w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-nport-6400-6600-series-image-1_edited-150x50.jpg 150w\" sizes=\"(max-width: 187px) 100vw, 187px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<div class=\"info-box-subtitle wd-fontsize-xs subtitle-style-background wd-font-weight-700\">NPort 6400\/6600 series<\/div><p class=\"info-box-title title box-title-style-default wd-fontsize-s\">Industrial<br \/>\nSerial-to-Ethernet<br \/>\nDevice Server<\/p>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style>#wd-67b6639b2d8f0 .info-box-subtitle{}<\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][vc_column width=&#8221;1\/5&#8243;]\t\t\t<div class=\"info-box-wrapper\">\n\t\t\t\t<div id=\"wd-67b663aec06db\" class=\" wd-rs-67b663aec06db wd-info-box wd-wpb text-center box-icon-align-top box-style- color-scheme- wd-bg-none \">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-icon-wrapper  box-with-icon box-icon-simple\">\n\t\t\t\t\t\t\t<div class=\"info-box-icon\">\n\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"79\" height=\"203\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/moxa-iologik-e1200-series-image-1-1_edited-1.jpg\" class=\"attachment-full size-full\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<div class=\"info-box-content\">\n\t\t\t\t\t\t<div class=\"info-box-subtitle wd-fontsize-xs subtitle-style-background wd-font-weight-700\">ioLogik E1200 series<\/div><p class=\"info-box-title title box-title-style-default wd-fontsize-s\">Industrial Ethernet<br \/>\nRemote I\/O Gateway<\/p>\t\t\t\t\t\t<div class=\"info-box-inner set-cont-mb-s reset-last-child\"><\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\n\t\t\t\t\t<style>#wd-67b663aec06db .info-box-subtitle{}<\/style>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t[\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1744846432104{margin-top: 50px !important;margin-bottom: 50px !important;}&#8221; woodmart_css_id=&#8221;68003dd7cf1e6&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2ODAwM2RkN2NmMWU2Iiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221; woodmart_parallax=&#8221;0&#8243; woodmart_gradient_switch=&#8221;no&#8221; woodmart_box_shadow=&#8221;no&#8221; wd_z_index=&#8221;no&#8221; woodmart_disable_overflow=&#8221;0&#8243; row_reverse_mobile=&#8221;0&#8243; row_reverse_tablet=&#8221;0&#8243;][vc_column]\t\t<div id=\"wd-67e1e73a29777\" class=\"wd-text-block wd-wpb reset-last-child wd-rs-67e1e73a29777 text-left  texc\">\n\t\t\t<h2 class=\"font_2 wixui-rich-text__text\"><span class=\"wixui-rich-text__text\">. Recommended Products<\/span><\/h2>\n\t\t<\/div>\n\t\t[vc_separator color=&#8221;custom&#8221; border_width=&#8221;2&#8243; css=&#8221;&#8221; accent_color=&#8221;#0057dd&#8221; wd_hide_on_desktop=&#8221;no&#8221; wd_hide_on_tablet=&#8221;no&#8221; wd_hide_on_mobile=&#8221;no&#8221;]\t\t\t\t<div class=\"wd-cats-element wd-wpb wd-rs-68264b57284a2\">\n\t\t\t\t\t<div class=\"products woocommerce  wd-grid-g wd-cats columns-5\" style=\"--wd-col-lg:5;--wd-col-md:4;--wd-col-sm:2;--wd-gap-lg:20px;--wd-gap-sm:10px;\">\n\t\t\t\t\t\n<div class=\"wd-col category-grid-item cat-design-default categories-with-shadow product-category product first\" data-loop=\"1\">\n\t<div class=\"wrapp-category\">\n\t\t<div class=\"category-image-wrapp\">\n\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/network-management-software\/\" class=\"category-image\">\n\t\t\t\t\n\t\t\t\t<img decoding=\"async\" width=\"199\" height=\"199\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_d60441dd678d4390abbc6da3ee9b0ed3mv2.jpg\" class=\"attachment-woocommerce_thumbnail size-woocommerce_thumbnail\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_d60441dd678d4390abbc6da3ee9b0ed3mv2.jpg 199w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_d60441dd678d4390abbc6da3ee9b0ed3mv2-150x150.jpg 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"hover-mask\">\n\t\t\t<h3 class=\"wd-entities-title\">\n\t\t\t\tNetwork Management Software <mark class=\"count\">(1)<\/mark>\t\t\t<\/h3>\n\n\t\t\t\t\t\t\t<div class=\"more-products\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/network-management-software\/\">1 product<\/a><\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/network-management-software\/\" class=\"category-link wd-fill\" aria-label=\"Product category network-management-software\"><\/a>\n\t\t\t<\/div>\n<\/div>\n\n<div class=\"wd-col category-grid-item cat-design-default categories-with-shadow product-category product\" data-loop=\"2\">\n\t<div class=\"wrapp-category\">\n\t\t<div class=\"category-image-wrapp\">\n\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-devices-connectivity\/industrial-serial-device-servers\/\" class=\"category-image\">\n\t\t\t\t\n\t\t\t\t<img decoding=\"async\" width=\"199\" height=\"199\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/Industrial-Serial-Device-Servers.jpg\" class=\"attachment-woocommerce_thumbnail size-woocommerce_thumbnail\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/Industrial-Serial-Device-Servers.jpg 199w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/Industrial-Serial-Device-Servers-150x150.jpg 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"hover-mask\">\n\t\t\t<h3 class=\"wd-entities-title\">\n\t\t\t\tIndustrial Serial Device Servers <mark class=\"count\">(19)<\/mark>\t\t\t<\/h3>\n\n\t\t\t\t\t\t\t<div class=\"more-products\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-devices-connectivity\/industrial-serial-device-servers\/\">19 products<\/a><\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-devices-connectivity\/industrial-serial-device-servers\/\" class=\"category-link wd-fill\" aria-label=\"Product category industrial-serial-device-servers\"><\/a>\n\t\t\t<\/div>\n<\/div>\n\n<div class=\"wd-col category-grid-item cat-design-default categories-with-shadow product-category product\" data-loop=\"3\">\n\t<div class=\"wrapp-category\">\n\t\t<div class=\"category-image-wrapp\">\n\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/industrial-secure-routers\/\" class=\"category-image\">\n\t\t\t\t\n\t\t\t\t<img decoding=\"async\" width=\"199\" height=\"199\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_f988ce52e5a842e79ae95f602dc4c0f3mv2.jpg\" class=\"attachment-woocommerce_thumbnail size-woocommerce_thumbnail\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_f988ce52e5a842e79ae95f602dc4c0f3mv2.jpg 199w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_f988ce52e5a842e79ae95f602dc4c0f3mv2-150x150.jpg 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"hover-mask\">\n\t\t\t<h3 class=\"wd-entities-title\">\n\t\t\t\tIndustrial Secure Routers <mark class=\"count\">(6)<\/mark>\t\t\t<\/h3>\n\n\t\t\t\t\t\t\t<div class=\"more-products\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/industrial-secure-routers\/\">6 products<\/a><\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/industrial-secure-routers\/\" class=\"category-link wd-fill\" aria-label=\"Product category industrial-secure-routers\"><\/a>\n\t\t\t<\/div>\n<\/div>\n\n<div class=\"wd-col category-grid-item cat-design-default categories-with-shadow product-category product last\" data-loop=\"4\">\n\t<div class=\"wrapp-category\">\n\t\t<div class=\"category-image-wrapp\">\n\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-devices-connectivity\/industrial-fieldbus-gateways\/\" class=\"category-image\">\n\t\t\t\t\n\t\t\t\t<img decoding=\"async\" width=\"199\" height=\"199\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/Industrial-Fieldbus-Gateways.jpg\" class=\"attachment-woocommerce_thumbnail size-woocommerce_thumbnail\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/Industrial-Fieldbus-Gateways.jpg 199w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/Industrial-Fieldbus-Gateways-150x150.jpg 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"hover-mask\">\n\t\t\t<h3 class=\"wd-entities-title\">\n\t\t\t\tIndustrial Fieldbus Gateways <mark class=\"count\">(7)<\/mark>\t\t\t<\/h3>\n\n\t\t\t\t\t\t\t<div class=\"more-products\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-devices-connectivity\/industrial-fieldbus-gateways\/\">7 products<\/a><\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-devices-connectivity\/industrial-fieldbus-gateways\/\" class=\"category-link wd-fill\" aria-label=\"Product category industrial-fieldbus-gateways\"><\/a>\n\t\t\t<\/div>\n<\/div>\n\n<div class=\"wd-col category-grid-item cat-design-default categories-with-shadow product-category product first\" data-loop=\"5\">\n\t<div class=\"wrapp-category\">\n\t\t<div class=\"category-image-wrapp\">\n\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/iec61850-ethernet-switches\/\" class=\"category-image\">\n\t\t\t\t\n\t\t\t\t<img decoding=\"async\" width=\"199\" height=\"199\" src=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_ae41f317f7e4450683cf9d338dfd7731mv2.jpg\" class=\"attachment-woocommerce_thumbnail size-woocommerce_thumbnail\" alt=\"\" srcset=\"https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_ae41f317f7e4450683cf9d338dfd7731mv2.jpg 199w, https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/d0ad98_ae41f317f7e4450683cf9d338dfd7731mv2-150x150.jpg 150w\" sizes=\"(max-width: 199px) 100vw, 199px\" \/>\t\t\t<\/a>\n\t\t<\/div>\n\t\t<div class=\"hover-mask\">\n\t\t\t<h3 class=\"wd-entities-title\">\n\t\t\t\tIEC61850 Ethernet Switches <mark class=\"count\">(4)<\/mark>\t\t\t<\/h3>\n\n\t\t\t\t\t\t\t<div class=\"more-products\"><a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/iec61850-ethernet-switches\/\">4 products<\/a><\/div>\n\t\t\t\n\t\t\t\t\t<\/div>\n\n\t\t\t\t<a href=\"https:\/\/demolinks2.com\/cy-yue\/product-category\/industrial-ethernet-infrastructure\/iec61850-ethernet-switches\/\" class=\"category-link wd-fill\" aria-label=\"Product category iec61850-ethernet-switches\"><\/a>\n\t\t\t<\/div>\n<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row woodmart_stretch_content=&#8221;section-stretch&#8221; woodmart_bg_position=&#8221;center-center&#8221; css=&#8221;.vc_custom_1740046316742{padding-top: 70px !important;padding-bottom: 180px !important;background-image: url(https:\/\/demolinks2.com\/cy-yue\/wp-content\/uploads\/2025\/02\/11062b_5323252299a04f2a9c818aa15a74fe53mv2-1.jpg?id=705) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; woodmart_css_id=&#8221;67b6fefe77aa2&#8243; responsive_spacing=&#8221;eyJwYXJhbV90eXBlIjoid29vZG1hcnRfcmVzcG9uc2l2ZV9zcGFjaW5nIiwic2VsZWN0b3JfaWQiOiI2N2I2ZmVmZTc3YWEyIiwic2hvcnRjb2RlIjoidmNfcm93IiwiZGF0YSI6eyJ0YWJsZXQiOnt9LCJtb2JpbGUiOnt9fX0=&#8221; mobile_bg_img_hidden=&#8221;no&#8221; tablet_bg_img_hidden=&#8221;no&#8221;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-703","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages\/703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/comments?post=703"}],"version-history":[{"count":11,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages\/703\/revisions"}],"predecessor-version":[{"id":1570,"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/pages\/703\/revisions\/1570"}],"wp:attachment":[{"href":"https:\/\/demolinks2.com\/cy-yue\/wp-json\/wp\/v2\/media?parent=703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}