Panel Builder System Integrator

June 22, 2020

We all know that we’re supposed to back up our data and secure our devices against attack. But too often we put it off until it’s too late. We’re busy, and we’ll get to it another day. And then, one day, we turn on our device, look for a file, and realize something is wrong. We’ve been hacked.

The thought of losing our files, pictures, and data is scary. Scale that up to an entire company and the consequences can be severe. Think about the amount of critical and sensitive information the typical manufacturing facility has access to. Sensitive customer records, design and engineering data, intellectual property, and industrial control systems for high risk manufacturing processes – there’s a lot to lose. As new technologies and connected devices continue to be installed in production environments, the need for a proactive, comprehensive approach to cybersecurity grows as well.

How Industry 4.0 is driving new security requirements

Industry 4.0 is a common term for the technological revolution that is happening across the entire manufacturing sector. New technologies, sensors, data and analytics, and advanced robotics have the potential to significantly enhance productivity, lower costs, improve product quality, and increase operational efficiencies.

This requires a complex mix of networks, back-office software and applications, Industrial Internet of Things (IIoT) devices, generations of control systems, and a variety of other systems and equipment. Each device or system that connects to the Internet represents a potential vulnerability that hackers can use to access the internal network, and unsecured IIoT devices, sensors, or machines can become an easy target.

Malicious actors are constantly evolving and changing their approach. Infected USB sticks are among the most common ways for attackers to breach a facility, while phishing and other behavioural attacks trick employees into clicking on links or files that introduce malware or other software. Once in, attackers can remain undetected for weeks or months. IBM found that, on average, it takes companies 241 days to identify and contain a breach. During this time, attackers can steal data, disrupt critical infrastructure, monitor systems, and even take control of and physically damage equipment.

The cost of a breach is massive

In 2019, IBM found that the average global cost of a data breach was $3.9 million. In Canada, this average rises to $4.4 million, and for industrial companies, it rises further to $6.9 million.

The cost of a breach takes years to fully realize. The IBM report showed that the loss of customer trust following a breach was the largest contributor to the total cost. Compromised industrial companies can expect to see abnormal customer turnover of 3.3 percent after a successful attack as customers take their business elsewhere.

While the average cost is high, individual costs can vary greatly. A 2017 virus destroyed the information systems it infected, leading one large logistics company to lose $300 million. What’s more, they were not even the original target of the attack. Instead, they were collateral damage as the infection spread through the supply chain and shared systems of the company that was originally hit.

Taking a proactive approach to cybersecurity

When it comes to security, it is impossible to be reactive. Once an attack has taken place the damage is already done. Instead, manufacturers need to be proactive and consider how they are securing their entire facility. From the devices used by employees on the shop floor to the sensors monitoring equipment to the software used by management, security needs to be at the forefront of the conversation every step of the way.

Unfortunately, a recent report found that only 16 percent of industrial companies had fully deployed a security automation system, while 57 percent hadn’t deployed any security automation system at all. Globally, industrial companies ranked last among all industries.

It is critical that manufacturers bring in the right people with expertise in cybersecurity, either by building a team internally or partnering with a cybersecurity firm. These experts can ensure that companies follow industry best practices, stay on top of security trends and technologies, and identify and address the specific needs of their organization. Depending on the market segment, they may also help manufactures meet regulatory and compliance requirements for data and other sensitive information.

The time for security is now

As technology, data, and connectivity play a greater role in manufacturing, the risk of attack is constantly increasing. A large-scale data breach that disrupts operations and results in the loss of sensitive data or critical information can be a devastating blow that can take years to recover from. Manufacturers of all sizes must think about how they are securing their facilities against attack and ensure that they are prepared in case the unexpected happens.

Source

Changing Scene

  • Prev
Attend this webinar to solve your automation challenges and become more productive.   ...
Safety, efficiency, and smart design are essential when designing panels and systems.   ...
Eclipse Automation had the pleasure to host Premiere Doug Ford, Minister Victor Fedeli, and caucus ...
The HARTING Technology Group continues to briskly advance the pace of digital transformation. “The ...
Spartan Controls and AltaML are pleased to announce they have entered into a formal partnership and ...
Omron Automation, a leading provider of industrial automation solutions, congratulates Taylor Fluid ...
On July 15, EPLAN Canada will host an Added Value Webinar focused on routing, wiring and production ...
Eramosa, a North American provider of SCADA, network, cybersecurity, operational technology, and ...

RS Components Launches New Season of the DesignSpark Podcast Tackling Technology With a Comedy Twist

RS Components DesignSpark PodcastRS Components (RS), a global multi-channel provider of industrial and electronic products and solutions, has released a new series of its popular ‘DesignSpark Podcast’ which explores some of the hottest topics in technology through a mix of fun facts, exuberant stand-up, outlandish sketches and foot-tapping songs. The podcast offers educational information on each technology topic, with an entertaining comedy angle.

The new weekly podcast is co-hosted by technology expert Professor Lucy Rogers PhD – former judge on BBC’s Robot Wars and a DesignSpark blogger – alongside award-winning comedians Bec Hill and Harriet Braine.

Read More

 

Module_Divider.png

JMP Solutions and Control Station Announce Exclusive Collaboration Focused on Optimizing Manufacturing Output and Efficiency

JMP SolutionsJMP Solutions and Control Station are joining forces to provide process and control loop audit services for manufacturing environments in order to identify and optimize problematic and underperforming control loops. The partnership leverages the complementary skillsets of JMP’s expert process engineering and project management competency combined with Control Station’s proprietary process analytics platform which, will work in synergy to identify and correct PID loop related sources of inefficiency and sub-optimal performance.

Read More

 

Module_Divider.png


Proax Is Now a Distributor of HIWIN

PB-34-Proax-HIWINLogo-400.jpgProax are pleased to announce that they are now a distributor of the HIWIN product line, a leader in motion control and system technology. Their product offer includes linear guideways, ballscrews, actuators, linear motors, torque motors & rotary tables, crossed roller bearings and more. This addition comes in line with the enhanced mechanical team and product offering announced last year by Proax. This newly added line will be available to all Proax's clients throughout Canada since this is going to be implemented on a national level.

Read More

Cybersecurity and Manufacturing – Keeping Critical Information Safe From Attackers

JAE AutomationWe all know that we’re supposed to back up our data and secure our devices against attack. But too often we put it off until it’s too late. We’re busy, and we’ll get to it another day. And then, one day, we turn on our device, look for a file, and realize something is wrong. We’ve been hacked.

The thought of losing our files, pictures, and data is scary. Scale that up to an entire company and the consequences can be severe. Think about the amount of critical and sensitive information the typical manufacturing facility has access to. Sensitive customer records, design and engineering data, intellectual property, and industrial control systems for high risk manufacturing processes – there’s a lot to lose. 

Read More

 

Module_Divider.png

Phoenix Contact Control Cabinet Classroom Ep. 6: How to Determine Supplementary vs. Branch Circuit Breakers

Phoenix Contact Control CabinetSometimes it can be difficult to distinguish between types of circuit breakers, especially since in appearance they look so similar. In this episode, the focus will be on the differences between two types of circuit breakers: Branch and Supplementary.

In the Control Cabinet Classroom video series, Phoenix Contact Product Specialists Zach and Karen break down some of the basics of control cabinet design, terminology and technology to be able to better understand and utilize this powerful solution.

 

 

Read More

Product News

  • Prev
The NaviTEK IE is a tester for commissioning, preventative maintenance, and ...
R. STAHL is authorized to certify customer-specific systems for installation in hazardous ...
Maplesoft™ announced the release of MapleSim™ Insight, a new software product from Maplesoft that ...
Yokogawa Electric Corporation announces the release of new pressure and temperature sensors for the ...
Branson™ GL-300 platform increases production capability and enables faster production start-up. ...
Omron Automation Americas launches the heavy-duty HD-1500 mobile robot with an exceptionally large ...
The superior safety of Eaton’s Arrow Hart ultra grip locking devices has been enhanced with colour ...
IDEAL Safe-T-Grip® Fuse Pullers are made of molded, tough, high-impact nylon for greater strength ...
As summer heats up Rittal will be announcing two new updated LCP product lines.     ...
As of April 1, Rittal has changed the portfolio of signal pillars to the latest LED technology. ...
Kerrwil Publications Great Place to Work. Certified December 2019 - December 2020

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2020 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil