How to Strengthen Convenience Store Security

High traffic and employee turnover make the more than 150,000 convenience stores (C-stores) in the U.S. attractive targets for cyber-criminals. The nature of the C-store environment makes it difficult to deliver compliance and standardization. So, what can business leaders do to strengthen convenience store security? Why Convenience Store Data Breaches? Some brands in the retail space experience almost no turnover in staff. By comparison, C-stores employ more transient workers. Deploying standards across all the stores proves difficult without having a regional or district manager visit every store on a regular basis. Hence, as studies show, C-stores and gas station chains…

READ MORE

3 Steps to Help Manufacturers Comply with New York SHIELD Law

In July 2019, Governor Andrew Cuomo signed the Stop Hacks and Improve Electronic Data Security act (SHIELD) into law. This law affects any organization that holds private information for New York state residents. A greater understanding of key components of the New York SHIELD law will ease regulatory compliance for manufacturers and other businesses. In summary, SHIELD expands data breach notification requirements and mandates that organizations create or update a data security program. To meet these requirements, manufacturers must address risk, review vendor compliance, and ensure proper notification in the event data becomes compromised. 1. Comply with Expanded Data Breach…

READ MORE

Boost Manufacturing Cyber-Security with IT/OT Convergence Best Practices

Information technology (IT) and operational technology (OT) alignment with IT/OT Convergence Best Practices improves security and reduces downtime. Industry 4.0 continues to transform manufacturing. From collaborative robots to powerful data analytics, connected systems offer a host of exciting possibilities. However, those opportunities come with a cost in terms of security. To combat the rising threat of cyber-attacks, manufacturing companies must turn their focus to IT/OT convergence. Critical Differences Between IT and OT Before Industry 4.0, information technology (IT) and operational technology (OT) typically operated in separate silos with competing priorities. Even now, IT processes focus on data confidentiality and security….

READ MORE

3 Steps to Keep Manufacturing Operations Safe from Phishing Attacks

Verizon reports that phishing attacks remain the number one cause of data breaches, particularly in the manufacturing sector. In just the first half of 2019, more than 4.1 billion records were compromised. Alarmingly, attackers hope to gain trade secrets, compromise personal and financial data or even disrupt manufacturing processes. Manufacturers can, and should, implement high quality firewalls and automatically scan incoming emails for suspicious attachments or links. But technology cannot eliminate the human factor. As cyber criminals increase the sophistication of their attacks, end users must learn how to recognize and counter phishing attacks when they occur. Common Phishing Attacks…

READ MORE

3 Steps to Proactive Manufacturing Cyber Security

Global insurance giant Chubb recently published a cyber risk report listing manufacturing as one of the top two industries targeted by ransomware attacks. With a large attack surface and a high incentive to quickly restore operations, factories make a particularly attractive target. Consequently, the spotlight has turned to increasing manufacturing cyber security. In fact, just last March, the Norwegian aluminum producer Norsk Hydro suffered a ransomware attack. The incident forced the company to temporarily close multiple plants, and losses totaled nearly $52 million. Smaller manufacturers, as well, face significant risk, heightened by historically lax cyber security measures. Industry 4.0 Blends…

READ MORE

How to stay protected before device recycling

used with permission from Tektonika (HP) Donating devices like laptops, phones, and flash drives may seem like a noble thing to do—after all, it’s good for the environment and makes devices available at a lower price point for people who may not otherwise be able to afford them. However, device recycling can pose a serious and often overlooked security risk. Device security is a concern that has to be addressed before donating so you can trust that your personal information will remain protected. In a 2019 report, security operations company Rapid7 revealed the dangers of recycling and discarding devices. Researcher…

READ MORE

Envision the Possibilities with AR in Manufacturing

In 1913, Henry Ford began using the assembly line to mass produce automobiles. This dramatic change reduced the automobile production time from twelve hours to just two and a half. Ford ushered in a century of innovation, dominated by advances in technology beyond anything he could have imagined. While technological advances have allowed factories to produce high quality goods more efficiently and safely, they have also created a skills gap. Baby boomers have begun to retire, taking their expertise with them. At the same time, innovations have created a greater need for highly skilled workers. AR in manufacturing can help…

READ MORE

8 Law Firm Cyber Security Best Practices

In 2015, an anonymous source leaked 11.5 million documents stolen from the Panamanian law firm Mossack Fonseca. The client information included in the leak affected over 200,000 entities in more than forty countries. Incidents like this highlight the need for a focus on law firm cyber Security. The law firm closed because of the scandal, which also resulted in the resignation of various high government officials. Just one year later, news reports broke that hackers had stolen information from as many as 48 major law firms, using that information to gain millions of dollars through insider trading. I could go…

READ MORE

Technology for Nonprofits Helps Groups Expand Charitable Reach

According to the National Council of Nonprofits, the more than 1.2 million nonprofit organizations in the United States work in every community. Charitable organizations advance social missions ranging from saving endangered animals to providing healthcare and job services. Creatively applying technology for nonprofits can empower those missions. Unlike businesses that focus on profit and product, nonprofits bear the burden of winning donors and volunteers with a vision of the good they can support. However, both types of organizations must boost brand recognition while carefully managing budgets and addressing competition. By definition, charitable organizations dedicate all revenue to advancing the declared…

READ MORE

ALE – A Simple Tool to Prevent Catastrophic Business Loss

ALE tips by Carl Mazzanti The February 1, 2019 USA Today headline read: “Devastating fire destroys New Jersey paper plant and leaves 500 without jobs.” According to the company CEO, “Wednesday night’s cold and windy conditions overcame the factory’s fire suppression system.” Fortunately, no one was hurt, but the loss of the factory and 500 jobs is a major tragedy. I bring it up because I want you to know about an incredibly useful tool to help prevent losses like this. It’s called Annualized Loss Expectancy or ALE. ALE is a decision framework to help you decide what type of…

READ MORE