18 Sep

New Control Room Evolution

New Control Room Evolution

Recently, Synergy completed a complete control room remodel for a client.  Along with the updated look and increased storage space, the new control room provides:

  • Modern boiler control Human Machine Interface
  • Improved workflow
  • Improved reaction time
  • Improved screens and display, allowing for faster dissemination of information
  • Low-voltage lighting, reducing fatigue and eye strain of operators

Click here to see a slideshow of all the work that went into this incredible transformation.

Control Room Evolution
June 6: Demolition begins and control console is moved to a temp location.

Evolution of Control Room
June 22: The remodel, rough in.

Control room on July 9th and nearly finished.
July 17th: Major components are in place.

Completion: July 17th.
Completion: July 17th.
08 May

Can You See Your Control Panel in This Image? We Can Help

Unit 1 Control Room Panel

Imagine how many different tasks, measurements and alarms are on this control panel our vice-president saw on a recent trip to Chile. All this can be consolidated into one screen. More than simply saving space, the redundant safety measures and accurate real-time measurements of today’s latest technologies save a plant precious time and money.



20 Mar

Industry Recognition of CSIA Grows

An ever increasing number of industry clients are requesting CSIA certification from the businesses they hire for industrial automation projects, according to Manufacturing Business Technology.

CSIA stands for Control Systems Integrators Association. They audit their members based on 79 criteria. When they meet or exceed these criteria, they receive a certification acknowledging their accomplishment. To further maintain the certification status, CSIA members must face additional audits every three years. CSIA certainly keeps their members on their toes – which is fantastic for businesses who aspire to be at the forefront of industrial technology and efficiency.

The 79 criteria are spread throughout nine chapters that describe everything from client projects to business organization. Chapters like Financial Management and System Development Lifecycle challenge businesses to make sure they not only provide for their clients, but provide for their business a healthy and successful structure. In this way, CSIA chapters act as redundant controls, ensuring that their members achieve only the highest quality of service.

This month, Synergy has been paying special attention to business continuity, going over our plans for various hazards that may arise and how we can deal with them in a way that has little to no effect on our projects and clients. This includes plans for our own business practices as well as plans for common and uncommon natural hazards.

You may have heard radio commercials talking about ready.illinois.gov. FEMA has their own national version at ready.gov, which provides a specific section for businesses. The forms and worksheets they provide have provided us greater insight into our own continuity plans.

Whether you are looking into CSIA or want to improve your own business continuity, we highly recommend using FEMA’s resources. Many hazards happen without warning, but having procedures in place to address them will protect clients and businesses from facing the full force of negative effects.

06 Mar

Prepare for Cyber Security in 2013

Prepare for Cyber Security in 2013

According to a recent newsletter from Invensys, responses to cyber-attacks on America’s critical infrastructure by the Industrial Control Systems – Cyber Emergency Response Team (ICS-CERT), a department of Homeland Security, rose by 52 percent in 2012. The biggest target was energy firms, accounting for 40 percent of attacks. Also on the list of industry sectors that fell victim to cyber-attacks in 2012 are the water sector, oil and natural gas sectors, nuclear sectors and chemical organizations. The frequency of these attacks is expected to increase, making the cyber security of America’s infrastructure firms paramount.

Using the internet can often be a necessary evil. One the one hand, it allows people to communicate instantly across countries any time of day. In our world, where entire businesses can be created and maintained online, these same businesses can be taken over by hackers with malicious intent.

Control systems devices that are directly connected or controlled through the internet are of particular concern to ICS-CERT, as malicious control over these systems could have catastrophic consequences. Consider a simple boiler, with control systems that enable a delicate combustion process to safely produce steam. If something happened to the formula, or if the burner or fan cannot be turned off when they need to, serious injury can result to the boiler and to plant employees.

This issue is so serious, the United States has an entire division, the National Cyber Security Division, to protect the U.S. from and fight against cyber-attacks. Cyber security is a national security issue, with recent news reports claiming The New York Times was hacked by Chinese hackers. In 2012, Iran is allegedly responsible for a large number of cyber-attacks against major U.S. banks. Cyber security is now more than simply guarding files or even guarding a business. Increasingly, cyber security is essential for protection against terrorist, be they local or abroad.

The looming question, then, is what to do at your business. The first step is to have solid policies and procedures in place that every employee is trained in. About 25 percent of malware attacks came from USB drives. In addition, no matter how much money you throw at cyber security, none of it matters if you don’t have employee compliance. Making sure procedures are in place and are followed can be greater security than any program you pay for.

Securing your control systems is also crucial. This can be done through remote support systems, such as our diagnostic support we provide, code named SORA. In this way, the internet connection used by the control systems is no longer your responsibility. It is the responsibility of the remote support provider. With such a system in place, even if malicious software makes it onto your business computers, it won’t be able to access your control systems and a certain amount of safety can be maintained.

Another great cyber security tip is what the Invensys newsletter calls “defense in-depth” security. This type of security involves have multiple security programs working on one system, where one programs vulnerability is made up for by having an additional program that does not have that vulnerability.

Lastly, secure passwords are a must. Someone with malicious intent has no need to use viruses or hacking software if they know the password they need to gain access to the system. Some sites, like Facebook and Google, are catching on. Facebook provides the option to have a text sent to the profile owner’s cellphone whenever an unauthorized computer accesses the account, allowing people to act quickly if they are not the ones accessing the profile. Google has an optional two step security measure on their email. After typing in the correct password, Google sends a secret code to the account holder’s cell phone. The number must be entered to access the account.

Even Apple can no longer claim its devices are spared from viruses and hackers. In the coming weeks, Synergy will be exploring the most popular free and paid security programs for computers and smartphones.

What type of security do you have at your home or business? Do you have any concerns going into 2013?