-
- News
- Books
Featured Books
- smt007 Magazine
Latest Issues
Current IssueCertifications
Certifications have historically been seen as a cost of doing business, but how do we turn them into a positive ROI and a value to both customer and vendor?
The Butterfly Effect
The basis of chaos theory is a key concept known as the “butterfly effect.” It’s the idea that a small event in one place creates a cascading set of events elsewhere. So, how is the EMS landscape changing? We’re tracking the concerns and dynamics of this landscape, and there’s a lot to learn.
Coming to Terms With AI
In this issue, we examine the profound effect artificial intelligence and machine learning are having on manufacturing and business processes. We follow technology, innovation, and money as automation becomes the new key indicator of growth in our industry.
- Articles
- Columns
Search Console
- Links
- Events
||| MENU - smt007 Magazine
Estimated reading time: 1 minute
![](https://iconnect007.com/application/files/5416/3116/1053/Jenny_Hwang300.jpg)
Cyber Security: From Boardroom to Factory Floor
We are living in a digital world. The digital world is characterized by big data, social media, mobile-gaming, Internet communication, cloud computing, and ultra-connectivity. As a result, we benefit immensely from various new tools and vast information flow, which were not available as recent as just 25 years ago. Regardless of which industry we serve and which capacity we hold, we are now working in the cyberspace. Cyberspace is changing the way we do business and every aspect of our lives. Living in this global network of computers also comes with new demands and challenges.
As data has become a new asset of the digital world, various incidents of cyber attacks and extortion attempting to take data as hostage have occurred. For example, when a company’s computer system is broken into, its access codes and passwords are then changed and its customers are locked out of its own system, and a ransom is demanded. This could be triggered by an insider (employee) or an outsider (hacker in any locale). Futher, a cyber thief could just simply steal the corporate secrets or confidential and proprietary information, and then demand a ransom.
Cyber attacks are and will continue to be a huge concern to U.S. corporations in the foreseeable future. It's a matter of when, not if. It is not industry-specific and every company will have to deal with this challenge. The earlier preparation is made, the better a company is positioned to fend off the attack. The most insidious nature of cyber attack is that it could happen with ease anywhere, anytime, without physical boundaries and across national borders.
Read the full column here.
Editor's Note: This column originally appeared in the July 2013 issue of SMT Magazine.
More Columns from SMT Perspectives and Prospects
SMT Perspectives and Prospects: A Dose of WisdomSMT Prospects and Perspectives: AI Opportunities, Challenges, and Possibilities, Part 1
SMT Perspectives and Prospects: Critical Materials—A Compelling Case, Part 3
SMT Prospects and Perspectives: AI—A Prelude to Opportunities, Challenges and Possibilities
SMT Perspectives and Prospects: Pearls of Wisdom
SMT Perspectives and Prospects: The Role of Bismuth (Bi) in Electronics, Part 7: A Case Study in Fillet-Lifting
SMT Perspectives & Prospects: Creating a Better World Through Engineering
SMT Perspectives and Prospects: Cybersecurity Requires an Active Approach