Discover your next big idea at PACK EXPO Las Vegas this September
Experience a breakthrough in packaging & processing and transform your business with solutions from 2,300 suppliers spanning all industries.
REGISTER NOW & SAVE

The First Step to Increasing Cybersecurity

There are a number of straightforward and understandable steps companies can take to protect their operations from cyberattacks. The first is to analyze operational vulnerabilities.

The First Step to Increasing Cybersecurity is to Analyze Operational Vulnerabilities.
The First Step to Increasing Cybersecurity is to Analyze Operational Vulnerabilities.

In 2020, Cisco found that 50% of large enterprises (with over 10,000 employees) are spending $1 million or more annually on security, with 43% spending $250,000 to $999,999, and just 7% spending under $250,000.

According to “2021 Cybersecurity: Assess Your Risk,” a new report from PMMI Business Intelligence, the dangers of a cyberattack are very real for these manufacturers, and it can be daunting to keep up with rapid developments in cybersecurity. While it is easy for manufacturers to feel like they are helpless in the face of sophisticated technological attacks, there are well-defined steps to protecting operational security, with the first being a comprehensive, detailed analysis of operational vulnerabilities.

Once manufacturers understand what these operational vulnerabilities are and where they are located, they can begin to secure networks and establish and enforce cybersecurity best practices at their locations. Said one cyber partner Managing Director, “A risk assessment is key to establishing a baseline of where your vulnerabilities are today, what critical data is being collected, and how that data is being protected.”

A Comprehensive Assessment Includes:

• Manufacturers must first have a thorough understanding of what their own operational vulnerabilities are and where they exist in their organization.

• Manufacturers should conduct a thorough assessment of their systems, devices, equipment, networks, and all other connection points both inside and outside their operations.

• Manufacturers will need to understand the layout of their internal networks: how individual components (including employee devices such as phones) of networks are connected, how individual networks are connected to one another, how/if remote access is allowed, and where any external connection capability (i.e., internet connectivity) resides.

Given the increase in frequency of OT-based attacks, it is especially important for organizations to have a detailed understanding of their ICS architecture. A comprehensive view into the flow of data should also be obtained: how data is collected, where it is stored, and who has access to it – this includes all edge computing and cloud computing capabilities as well.


Read article   Read about two key areas of vulnerability in manufacturing.
Conveying Innovations Report
Editors report on distinguishing characteristics that define each new product and collected video demonstrating the equipment or materials as displayed at the show. This topical report, winnowed from nearly 300 PACK EXPO collective booth visits, represents a categorized, organized account of individual items that were selected based on whether they were deemed to be both new, and truly innovative, based on decades of combined editorial experience in experiencing and evaluating PACK EXPO products.
Take me there
Conveying Innovations Report
Coding, Marking, and Labeling Innovations Report
Explore our editor-curated report featuring cutting-edge coding, labeling, and RFID innovations from PACK EXPO 2024. Discover high-speed digital printing, sustainable label materials, automated labeling systems, and advanced traceability solutions that are transforming packaging operations across industries.
Access Report
Coding, Marking, and Labeling Innovations Report