Manufacturing Industry Yesterday, Today, and Tomorrow
Redefining Supply Chain Management
The Industrial IoT Attack Surface
Be Change Ready in an Evolving Manufacturing Vertical
IT in the Consumer Durables Manufacturing Space
Art Sebastiano, CIO, SharkNinja Operating LLC
Technology Transforming Manufacturing
Matt Meier, VP and CIO – North America, Whirlpool Corporation
Machine Learning in Manufacturing: Moving to Network- Wide Approach
Paul Boris, CIO - Advanced Manufacturing, GE
Internet of Things
Tom Basiliere, CIO, Provant
Thank you for Subscribing to CIO Applications Weekly Brief
Through stealing their intellectual property and technologies, hackers are more likely to target the trade secrets of manufacturers than they are to seek their banking details.
FREMONT, CA: When reviewing the threats facing their manufacturing customers, cyberattacks may not be at the top of an agent's list. Instead, agents can gravitate towards traditional threats, such as breakdowns of equipment, recalls of products and employee injuries. However, it is more important than ever to advise manufacturing customers to consider insurance options that could protect them and their businesses against cyberattacks as the manufacturing industry becomes increasingly technology-dependent.
Lately, the US The automotive sector was ranked second highest by the Department of Homeland Security with the most reported cases of cyber attacks. Here's why: Digital development has become more advanced, producing a revolution called Industry 4.0.0. In doing this, by connecting digital systems together, manufacturers have sought to remove business network separation, gradually filling the "air gaps" that had previously separated industry production networks from digital business networks and the internet. The systems themselves may be old, but the links between systems are modern, making businesses vulnerable to cyberattacks.
Check Out: Contract Manufacturing Organization Companies
What Do Hackers Check?
Through stealing their intellectual property and technologies, hackers are more likely to target the trade secrets of manufacturers than they are to seek their banking details.
Manufacturers are exposed to such threats that could shut down their entire operations, impacting their supply chains and those of business partners and suppliers, including malware and ransomware.
This menace stretches well beyond just the factory floor. The electronic control modules and essential operating systems of a small number of famous consumer vehicles have recently been accessed by hackers. The subsequent recall of more than 1.4 million cars underscored the value of wider insurance coverage as the full effect of a hack can be difficult to foresee.
I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info
Featured Vendors
-
Jason Vogel, Senior Director of Product Strategy & Development, Silver Wealth Technologies
James Brown, CEO, Smart Communications
Deepak Dube, Founder and CEO, Datanomers
Tory Hazard, CEO, Institutional Cash Distributors
Jean Jacques Borno, CFP®, Founder & CEO, 1787fp
-
Andrew Rudd, CEO, Advisor Software
Douglas Jones, Vice President Operations, NETSOL Technologies
Matt McCormick, CEO, AddOn Networks
Jeff Peters, President, and Co-Founder, Focalized Networks
Tom Jordan, VP, Financial Software Solutions, Digital Check Corp
Tracey Dunlap, Chief Experience Officer, Zenmonics