Cybersecurity Best Practices

By Gabriel Bailey
CIP Cyber and Physical Security Analyst

On April 7, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) published a cybersecurity advisory regarding cyber actors exploiting programmable logic controllers (PLCs) across various critical infrastructure environments. Below are some of the ways that registered entities can further harden their environments against advanced persistent threat (APT) actors with a focus on achievable mitigation efforts.

  • Network Monitoring Tools

Carefully monitor access to and from your operational technology (OT) and Supervisory Control and Data Acquisition (SCADA) systems. By utilizing products like a security information and event management (SIEM) tool, you can better understand what typical traffic for your environment is and identify any abnormal network behaviors across your systems.

  • Implement Network Security Rules

Implementing network security rules that prevent repeated and sustained login attempts can reduce the effectiveness of brute force attacks.

  • Implement multifactor authentication (MFA) for remote access

Enabling MFA can reduce attackers’ ability to escalate privilege and stop lateral movement.

Texas RE encourages registered entities to review the CISA advisory for more information and additional resources.