3 Steps to Help Manufacturers Comply with New York SHIELD Law

In July 2019, Governor Andrew Cuomo signed the Stop Hacks and Improve Electronic Data Security act (SHIELD) into law. This law affects any organization that holds private information for New York state residents. A greater understanding of key components of the New York SHIELD law will ease regulatory compliance for manufacturers and other businesses. In summary, SHIELD expands data breach notification requirements and mandates that organizations create or update a data security program. To meet these requirements, manufacturers must address risk, review vendor compliance, and ensure proper notification in the event data becomes compromised. 1. Comply with Expanded Data Breach…

READ MORE

Boost Manufacturing Cyber-Security with IT/OT Convergence Best Practices

Information technology (IT) and operational technology (OT) alignment with IT/OT Convergence Best Practices improves security and reduces downtime. Industry 4.0 continues to transform manufacturing. From collaborative robots to powerful data analytics, connected systems offer a host of exciting possibilities. However, those opportunities come with a cost in terms of security. To combat the rising threat of cyber-attacks, manufacturing companies must turn their focus to IT/OT convergence. Critical Differences Between IT and OT Before Industry 4.0, information technology (IT) and operational technology (OT) typically operated in separate silos with competing priorities. Even now, IT processes focus on data confidentiality and security….

READ MORE

3 Steps to Keep Manufacturing Operations Safe from Phishing Attacks

Verizon reports that phishing attacks remain the number one cause of data breaches, particularly in the manufacturing sector. In just the first half of 2019, more than 4.1 billion records were compromised. Alarmingly, attackers hope to gain trade secrets, compromise personal and financial data or even disrupt manufacturing processes. Manufacturers can, and should, implement high quality firewalls and automatically scan incoming emails for suspicious attachments or links. But technology cannot eliminate the human factor. As cyber criminals increase the sophistication of their attacks, end users must learn how to recognize and counter phishing attacks when they occur. Common Phishing Attacks…

READ MORE

3 Steps to Proactive Manufacturing Cyber Security

Global insurance giant Chubb recently published a cyber risk report listing manufacturing as one of the top two industries targeted by ransomware attacks. With a large attack surface and a high incentive to quickly restore operations, factories make a particularly attractive target. Consequently, the spotlight has turned to increasing manufacturing cyber security. In fact, just last March, the Norwegian aluminum producer Norsk Hydro suffered a ransomware attack. The incident forced the company to temporarily close multiple plants, and losses totaled nearly $52 million. Smaller manufacturers, as well, face significant risk, heightened by historically lax cyber security measures. Industry 4.0 Blends…

READ MORE

3 Steps to Effective Local Government Cyber Security

Four years ago, the city of Atlanta launched a smart city initiative, hoping to improve municipal operations with integrated technology. The future looked bright. And then, in 2018, a ransomware attack crippled city infrastructure. One year and $17 million dollars later, Atlanta serves as a reluctant poster child for the necessity for robust local government cyber security. Anatomy of a Cyber Attack In 2019 alone, local governments and hospitals in the United States have reported 140 cyber-attacks. In fact, cyber-attacks have more than doubled since last year. These assaults have destroyed public records, disrupted healthcare and law enforcement and frozen…

READ MORE

Proactive 5G Cyber Security to Maximize Opportunity and Minimize Risk

You have seen the headlines, “The 5G Revolution,” and, “5G Will Change the World.” For years, the tech world has anticipated the approach of the fifth generation of wireless technology with the excitement of a five-year old nearing Christmas. Whether or not you buy into the hype, 5G will impact your business. Understanding and preparing for that impact, particularly in the area of 5G cyber security, can prove critical. Consider the evolution of cellular technology over the past 20 years. 3G brought us the mobile internet just after the turn of the century. In the late 2000s, 4G introduced internet…

READ MORE

3 Steps to Effective Cloud Security for Business

According to a recent report from Symantec Corporation, business organizations have transferred over half of their workload to the cloud. With huge benefits in terms of scalability and collaboration, the move makes good business sense. But those benefits come with risks. Business leaders must take a proactive approach to achieve effective cloud security that protects critical business assets. Effective Cloud Security: Complex Environment Creates Unique Challenges While the vast majority of organizations operate in the cloud to some degree, the nature of that cloud usage varies widely. Some businesses access specific software applications in the cloud while storing data on-premises….

READ MORE

Ecommerce Cyber Security 101 to Protect Your Small Business

Think like a thief. Picture a store left poorly secured, valuable merchandise easily accessible using minimal tools under cover of darkness. Now, imagine a digital storefront with weak security controls and thousands of financial records ripe for the picking. Hackers love small businesses, but you can stop them in their tracks with robust ecommerce cyber security. According to cyber security firm Kaspersky, 48 percent of small to medium businesses have experienced data breaches this year. That means the exposure of financial and personal data for thousands of customers. And it means a payday for hackers who sell that information on…

READ MORE

Master IoT Cyber Security Challenges with Comprehensive, Multi-layer Security

From the smart lock on your front door to the printer down the hall, you interact with the Internet of Things (IoT) dozens of times a day. In fact, in 2019, the number of connected devices jumped to more than three times the world population. In addition to convenience, that growth has also brought significant IoT cyber security challenges. Unfortunately, in their rush to meet consumer demand, manufacturers have paid more attention to features than to security. At the same time, global standards have failed to keep pace with innovation. With an ever-widening attack surface and valuable data ready for…

READ MORE

10 PCI Compliance Best Practices to Protect Your Business and Customers

In 2014, Home Depot suffered a data breach of historic proportions. Hackers gained access to the retailer’s payment systems, compromising credit card information for 56 million customers. That breach cost Home Depot $179 million. While no organization can claim immunity from cyber-attacks, following PCI compliance best practices can mitigate the extent of the damage. All organizations that process credit cards must adhere to the Payment Card Industry Data Security Standard (PCI DSS) or face stiff fines. More importantly, PCI compliance represents a starting point for effective cyber security. Following best practices not only keeps you compliant but protects both your…

READ MORE