Cyber Security: From Boardroom to Factory Floor


Reading time ( words)

We are living in a digital world. The digital world is characterized by big data, social media, mobile-gaming, Internet communication, cloud computing, and ultra-connectivity. As a result, we benefit immensely from various new tools and vast information flow, which were not available as recent as just 25 years ago. Regardless of which industry we serve and which capacity we hold, we are now working in the cyberspace. Cyberspace is changing the way we do business and every aspect of our lives. Living in this global network of computers also comes with new demands and challenges.

As data has become a new asset of the digital world, various incidents of cyber attacks and extortion attempting to take data as hostage have occurred. For example, when a company’s computer system is broken into, its access codes and passwords are then changed and its customers are locked out of its own system, and a ransom is demanded. This could be triggered by an insider (employee) or an outsider (hacker in any locale). Futher, a cyber thief could just simply steal the corporate secrets or confidential and proprietary information, and then demand a ransom.

Cyber attacks are and will continue to be a huge concern to U.S. corporations in the foreseeable future. It's a matter of when, not if. It is not industry-specific and every company will have to deal with this challenge. The earlier preparation is made, the better a company is positioned to fend off the attack. The most insidious nature of cyber attack is that it could happen with ease anywhere, anytime, without physical boundaries and across national borders.

Read the full column here.


Editor's Note: This column originally appeared in the July 2013 issue of SMT Magazine.

Share

Print


Suggested Items

Upgrading to a Digital Line

01/15/2020 | Nolan Johnson, I-Connect007
Ridhi Kantelal of Arch Systems breaks down what fabricators considering bringing in digitalization and upgrading their lines should know, and why they may see the most benefit from focusing on the data engineering aspect rather than the actual retrofitting of their systems.

Mirtec's Approach to Raw Data: The 'Sushi Principle'

12/09/2019 | Real Time with...productronica
Editor Pete Starkey and Brian D’Amico discuss the company’s new Alpha system, designed for the automotive market. D’Amico explains why Mirtec is focusing on providing customers with raw data instead of “cooked” data, what he terms the “sushi principle.” He says that the system is able to pick up tiny defects that would otherwise be filtered away if the system were not using raw data. D’Amico also discusses their use of artificial intelligence, and some of the possible benefits from using AI going forward.

Explaining the QSFP-DD Data Center Interconnect Standard

11/05/2019 | Scott Sommers, Molex
According to Cisco’s report, most IP traffic either originates or terminates in data centers. Yet as massive as the flows between centers are becoming, the data managed within those same facilities is going even higher. All of this activity means that “hyperscale” is the word of the future. Roughly one-quarter of all servers installed in 2016 went to hyperscale facilities, but that number will grow to almost one-half by next year.



Copyright © 2020 I-Connect007. All rights reserved.