5 Ways to Reduce Your Company's Risk of Cyber Attacks

As manufacturing technology grows and spreads, cybersecurity is essential to your everyday operations. While IoT infrastructures, digitized machinery, and other systems help make your company more efficient and connected, they also carry a risk, as your equipment and data can become susceptible to outside viruses, malware, and ransomware. This is especially true of outdated equipment, as its lack of support for new software opens doors for unauthorized access of essential data.

Due to high-profile breaches like those of Target and Yahoo!, one popular misconception is that small companies are less susceptible to cyberattacks. However, they are actually more vulnerable due to not having the right software or tools for protection; in fact, the average cost of a data breach for small companies in 2015 was more than $38,000, and it’s estimated more than half of companies that experience a cyberattack go out of business within six months.

There are many solutions to prevent this from happening… but where do you start?

Identify and assess your existing procedures.
Think about how data is currently being accessed. Who can open confidential documents or vital information about your business? Is the data stored on a secure platform? Do you have it backed up elsewhere in case of server failure? Are passwords changed often? While these may seem like common sense at first glance, it’s best to always have answers to these questions as they help determine where you are with your IT and cybersecurity needs.

Determine next steps for protection from hackers.
If you find your preventative measures are lacking, take extra steps to ensure you’re less vulnerable to attacks.

Some of these may include:
– Updating your operating systems, applications, and other systems on a regular basis
– Set up spam filters for your email database
– Secure your internet access by setting a password
– Schedule routine backups of important business data once or twice a week
– Utilize data encryption for confidential business information (finances, patents, etc.)

Install antivirus software.
Hackers who target manufacturers generally get data through malware, which can be isolated and eliminated through the latest antivirus software. Companies like BitDefender and Symantec (Norton) make software you can easily install on various operating systems to protect your employees’ computers. You can also utilize third parties for other options, especially if you have a large number of employees or wish to equip your IoT systems with similar security.

Develop a breach response plan.
Despite your best efforts, there may come a time when you find your systems have been infiltrated by hackers. Creating an appropriate response plan not only staves off panic, but helps you determine what needs to be done to prevent it from happening a second time.

Some measures consist of the following:
– Recording the date/time the breach was discovered and alerting all necessary parties
– Interviewing all employees involved and documenting the process
– Notifying law enforcement
– Determining what caused the breach and how to fix it
– Bringing in an IT/forensics firm for further investigation and assessment of needs

Train your employees on cybersecurity measures.
Hackers often find their way into manufacturing systems as a result of phishing, which can happen if an employee opens a spam email or clicks a tracking link that grants access to outside parties. While your workers are likely smart enough to avoid wiring money to another country, it’s possible for cyber criminals to deceive them by impersonating the CEO or someone from your finance department. Invest time and money in training your workers on how to avoid these scams and protect their systems. This can usually be done with the help of outside consultants or IT firms, which can also help manage your services and software packages.

Need to protect yourself or take the next step in evaluating your cybersecurity needs? Contact Linda Barita at 216.391.7766 or email linda.barita@magnetwork.org to schedule an appointment with one of our Growth Advisors!

Print
Posted by Bob Baxendale in Cybersecurity

Most Recent

Top 10 Sited Safety and Health Violations

December 13, 2017 by Gwido Dlugopolsky

One remarkable thing about the list is that it rarely changes.  The order may change but the top cited standards typically don’t change. Top 10 Sited Safety and Health Violations: 501 - Fall Protection 1200 - Hazard Communication 451 - Scaffolding 134 - Respiratory Protection 147 - Lockout/Tagout 178 - Powered Industrial Trucks 1053 - Ladders 305 - Electrical, Wiring Methods 212 - Machine Guarding 303 - Electrical, General Requirements Three of the 10 sited standards are directed at the construction standard (1926) while other fall within the general industry (1910).  It should be noted however that the general industry standard also has fall protection guidelines. Year after year, inspectors see the same on-the-job hazards, any one of which could result in a fatality or severe injury. More than 4,500 workers are killed on the job every year, and approximately 3 million are injured. By understanding these regulations you can improve your safety program and prevent injuries. Give me a call if you have any compliance doubts, or want to review OHSA regulations. Gwido Dlugopolsky at 216-391-7766 or gwido.dlugopolsky@magnetwork.org

Complete ANY Changeover in 10 Minutes or LESS

December 11, 2017 by Gwido Dlugopolsky

Why does it take a NASCAR pit crew only 15 seconds to change four car tires when it takes people like you and me minutes? The answer is simple SMED. Single Minute Exchange of Dies, or SMED, is a process for reducing the time it takes to do equipment changeovers. Using the principles of SMED you should be able to perform any changeover in your facility in under 10 minutes! The SMED process is simple – convert as many changeover steps as possible to “external”, meaning they are done while your equipment is still RUNNING, while simplifying and streamlining the remaining steps. SMED is broken down into the following 3 Steps: Separate Convert Streamline We found this article to be very helping in explaining the SMED process in more detail: LEAN PRODUCTION - SMED           A good first step to achieve this level of SMED efficiency would be to run a kaizen event at your facility to standardize (5S) your tools and supplies. Doing this alone will help you achieve 40% to 50% greater efficiency. Once the “low hanging fruit” is gone, you can still reduce setup times another 20% by practicing more advanced SMED principles.

Coffee is STILL for Closers: 3 Things Needed to Close Any Sale

December 07, 2017 by Sam Wasylyshyn

The secret to closing any sale is to reduce uncertainty in the buyer and replace it with confidence in YOU, your PRODUCT/SERVICE, and your COMPANY. Step 1 – Confidence in YOU Someone buying from you wants to be able to fundamentally connect with you on a human level and feel confident that you’re an expert in what you’re selling If you’re selling paperclips, be an expert in paperclips If you’re selling design and engineering related services, be an expert in design and engineering related services Focus on addressing the problem, not the solution….MEANING you already know you have the solution, connect with the buyer by being an expert with the problem he/she is facing. Prove that you know the problem and all aspects of the problem like the back of your hand. Step 2- Confidence in the PRODUCT/SERVICE you are selling Someone buying from you needs to trust the product/service you are selling will solve their problem. It’s your responsibility to deliver a solution and the benefits associated with it. Basically you need to “Hit a Homerun” communicating this message. Tip – Use Success Stories: Share with the potential buyer examples of your product/service solving problems and delivering value for