In recent years, we have seen a sharp increase in the number of cyberattacks targeting critical infrastructure – from energy networks and water supply systems to transport systems. More and more often, these are not random hacking attempts, but coordinated actions by cybercriminal groups and even state-sponsored attacks. Their goal is not only to steal data, but above all to disrupt the continuity of key services on which the safety and comfort of millions of people depend. Water from the tap, electricity from the socket, or efficient communication – these are elements of our everyday life that can become targets for digital saboteurs.
That is why cybersecurity in the critical infrastructure sector cannot be treated as a costly addition or a “temporary project”. It is a continuous process that requires real, effective and long-term solutions – without any catches or hidden costs.
Government programmes such as “Cyber-secure Waterworks” are an opportunity to strengthen security, but also a challenge. The budget of PLN 300 million attracts both experts and amateurs offering solutions that are often only good on paper. Too many times we have seen projects end up with expensive equipment, mismatched software or a “partner” that disappears after implementation. Although the detailed catalogue of solutions eligible for funding is still awaiting full confirmation, one thing is already clear: security cannot be a temporary investment. Unlike many temporary players on the market, we focus on long-term protection and real value for the customer – not just on meeting formal requirements.
We do not sell promises. We implement real, effective changes. What is more, we do it free of charge.
In response to growing cybersecurity requirements, both current and future, we are introducing a number of significant improvements as part of the development of our software. All these changes are made available to our customers at no additional cost as part of system updates. Why are we doing this? Because cybersecurity is not a one-off project, but an ongoing process in which we support our customers at every stage.
Learn more about information security in the network in accordance with the NIS2 Directive!
Read the article: How to manage information security in accordance with the NIS2 Directive – Inventia.pl

AES-128 encryption – three-layer transmission security
In the upcoming version of MT Data Provider 4.0, we are implementing triple encryption of communication with MT series telemetry modules. Each transmission will be protected:
Each session will be secured with a one-time token, which eliminates the risk of replay or man-in-the-middle attacks.
Secure bootloader
New bootloader mechanisms enable software integrity verification and secure module startup — even in the event of tampering attempts.
Secure local access
Diagnostic data and settings available locally will only be visible after entering a password defined by the user, which also protects the devices against unauthorised physical access.
Closed APN networks and SIM card access control
We support our customers in restricting access to telemetry infrastructure by:

Because we are a long-term partner, not a temporary supplier. We do not want our customers to discover in two years’ time that they need another subsidy for something that should have been working from the start.
We are also not an “application factory”. We are an engineering company that understands that IT security does not end with the signing of a contract.
No. All of the changes described, including AES-128 encryption, secure bootloader, encrypted firmware and local access authentication, are provided free of charge as part of software development and system updates available to our customers.
Not in every case. The new features will be available in the upcoming MT Data Provider 4.0 version and are compatible with the currently offered MT series telemetry modules. If you are using newer devices, a software update may be sufficient. We encourage you to contact our technical support department to confirm device compatibility.
Of course. If you have a current audit and know what you need, we will help you implement the appropriate security mechanisms and adapt the software to the guidelines. You can use only selected elements of our offer.


