.

obrazki wyróżniające - blog (50)

Date:
30.09.2025
Author:
Inventia Team

Blog

Cybersecurity – no catches or hidden costs. What are we implementing today?

In recent years, we have seen a sharp increase in the number of cyberattacks targeting critical infrastructure – from energy networks and water supply systems to transport systems. More and more often, these are not random hacking attempts, but coordinated actions by cybercriminal groups and even state-sponsored attacks. Their goal is not only to steal data, but above all to disrupt the continuity of key services on which the safety and comfort of millions of people depend. Water from the tap, electricity from the socket, or efficient communication – these are elements of our everyday life that can become targets for digital saboteurs.

That is why cybersecurity in the critical infrastructure sector cannot be treated as a costly addition or a “temporary project”. It is a continuous process that requires real, effective and long-term solutions – without any catches or hidden costs.

Security with the future in mind

Government programmes such as “Cyber-secure Waterworks” are an opportunity to strengthen security, but also a challenge. The budget of PLN 300 million attracts both experts and amateurs offering solutions that are often only good on paper. Too many times we have seen projects end up with expensive equipment, mismatched software or a “partner” that disappears after implementation. Although the detailed catalogue of solutions eligible for funding is still awaiting full confirmation, one thing is already clear: security cannot be a temporary investment. Unlike many temporary players on the market, we focus on long-term protection and real value for the customer – not just on meeting formal requirements.

We do not sell promises. We implement real, effective changes.  What is more, we do it free of charge.

In response to growing cybersecurity requirements, both current and future, we are introducing a number of significant improvements as part of the development of our software.  All these changes are made available to our customers at no additional cost as part of system updates. Why are we doing this? Because cybersecurity is not a one-off project, but an ongoing process in which we support our customers at every stage.

 

Learn more about information security in the network in accordance with the NIS2 Directive!
Read the article: How to manage information security in accordance with the NIS2 Directive – Inventia.pl

What are these changes?

AES-128 encryption – three-layer transmission security

In the upcoming version of MT Data Provider 4.0, we are implementing triple encryption of communication with MT series telemetry modules. Each transmission will be protected:

  • a manufacturer’s key,
  • a unique key assigned to the device,
  • a user-defined key.

Each session will be secured with a one-time token, which eliminates the risk of replay or man-in-the-middle attacks.


 

Secure bootloader

New bootloader mechanisms enable software integrity verification and secure module startup — even in the event of tampering attempts.


 

Secure local access

Diagnostic data and settings available locally will only be visible after entering a password defined by the user, which also protects the devices against unauthorised physical access.


 

Closed APN networks and SIM card access control

We support our customers in restricting access to telemetry infrastructure by:

  • closing communication within private APNs,
  • the ability to restrict traffic only to SIM cards assigned to a specific system.

Why do we do this for free?

Because we are a long-term partner, not a temporary supplier. We do not want our customers to discover in two years’ time that they need another subsidy for something that should have been working from the start.

We are also not an “application factory”. We are an engineering company that understands that IT security does not end with the signing of a contract.

Frequently asked questions (Q&A)

Will updates that enhance cybersecurity be subject to a fee?

No. All of the changes described, including AES-128 encryption, secure bootloader, encrypted firmware and local access authentication, are provided free of charge as part of software development and system updates available to our customers.

Do I need to replace my devices to use the new features?

Not in every case. The new features will be available in the upcoming MT Data Provider 4.0 version and are compatible with the currently offered MT series telemetry modules. If you are using newer devices, a software update may be sufficient. We encourage you to contact our technical support department to confirm device compatibility.

What if I already have an audit? Can I just use the update?

Of course. If you have a current audit and know what you need, we will help you implement the appropriate security mechanisms and adapt the software to the guidelines. You can use only selected elements of our offer.

Share this article:

Read more articles:

obrazki wyróżniające - blog (48)
AGREUS®  – effective support for modern agriculture
Support for modern agriculture – monitor crops, control the system and increase efficiency
obrazki wyróżniające - blog (42)
MT-718 – intelligent pressure regulator for water supply networks
Discover the device that controls the outlet pressure from the PRV valve
obrazki wyróżniające - blog (34)
EX-D16 – a compact binary input/output expander ready for any challenge
Find out how the EX-D16 allows you to easily and quickly expand your automation systems – without costly modifications!