by Norman Halls, contributor
A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.
Cyberattacks may include the following consequences:
- Identity theft, fraud, extortion
- Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
- Stolen hardware, such as laptops or mobile devices
- Password sniffing
- Website defacement
- Private and public Web browser exploits
- Instant messaging abuse
- Intellectual property (IP) theft or unauthorized access
The Institute for Security Technology Studies at Dartmouth University researches and investigates cyberattack issues facing law enforcement investigations and focuses on the continuous development of IP tracing, data analysis, real-time interception and national data sharing.
“Manufacturing is the second most-attacked industry behind healthcare. While some manufacturers are starting to fortify their networks and corporate systems, industrial control systems pose serious challenges. As more and more industrial control systems (ICS) become connected to smart devices, enterprise IT systems and the Internet, manufacturing operations are increasingly exposed to cyberattacks. These attacks can cause manufacturing disruptions, leading to defective products, production downtime, physical damage and even threaten lives.” Wrote Barak Perelman, CEO Indegy
- Newman recently wrote in Fast Company, “Smart homes and other connected products won’t just be aimed at home life. They’ll also have a major impact on business. And just like any company that blissfully ignored the Internet at the turn of the century, the ones that dismiss the Internet of Things risk getting left behind.”
Technology has evolved and empowered manufacturers in a variety of ways, and companies have become increasingly reliant on computer systems and IT. Because of this, cybersecurity has emerged as a critical topic in the industry. Strong cybersecurity practices are crucial to:
- Defending your company’s vital data and information.
- Preventing theft or damage to your infrastructure, equipment and systems.
- Avoiding major disruptions to operations and the delivery of products.
- Protecting your employee’s personal information.
- Shielding your organization from negative publicity.
Manufacturers are unfortunately a frequent target of hackers and attackers. According to a report from the U.S. Department for Homeland Security, manufacturing is the second highest industry with the most reported cyber-attacks, only subsequent to the energy sector. Foxconn, an international manufacturer of electronics, was attacked in 2012 and all of its employee’s login information was released publicly. A Honda breach in 2010 resulted in the disclosure of personal vehicle identification numbers.
A Kaspersky Lab Survey of IT managers published in Virus News also found that “21 percent of manufacturers suffered a loss of intellectual property (IP) within the past year.” The most commonly cited reason was malware (computer viruses, spyware, etc.), although a host of related issues including software susceptibilities and misplaced or stolen mobile devices were listed as causes as well.
On September 20, 2018 the Westfield Chamber of Commerce and Norhals Group, LLC is presenting a seminar on “Cybersecurity for Cloud Based Solutions” at Tekoa Country Club, Westfield, MA. Contact the Chamber at 413-568-1618 to register.