Manufacture Smarter Blog

|<  <   1 2    >  >|
Page of 2
Showing 1 - 10 of 17

How to Maintain Cybersecurity with Industry 4.0 Implementations

10/8/2021 - THE CENTER
As companies look to implement Industry 4.0 technologies in their facilities, information security must be a main consideration to ensure their business stays protected. When planning technology investments, this checklist will help mitigate as much of this risk to information security as possible.


Industry 4.0 Foundations: Cybersecurity

3/24/2021 - THE CENTER
Through our weekly Industry 4.0 Foundations blog series, we’ve explored how the many Industry 4.0 technologies can assist manufacturers in all types of improvement initiatives. In this final installment of the series, we’ll discuss how establishing Cybersecurity can ensure these technologies, and the critical information they carry, stay secure and protected.


ISO 9001 – A Key to Cybersecurity? (Part 2)

11/6/2020 - BY: ANDY NICHOLS
A few weeks ago, we posted a blog dissecting the various requirements of ISO 9001:2015 related to the “control of documented information” and addressed how cyberattacks can affect customers, management, employees and even regulatory compliance. Now that the value of information security has been established, we’ll discuss how to incorporate safe cybersecurity practices to further support your organization’s controls of documented information.


ISO 9001 – A Key to Cybersecurity? (Part 1)

10/9/2020 - BY: ANDY NICHOLS
Between 40 and 60% of small businesses fail within a year of any type of disaster – including cyberattacks – unless some type of resiliency plan is put in place. So, what is needed to protect small and medium-sized businesses from such an attack? How can an organization become “cyber-resilient”?  ​While many might not realize it, if an organization already has an ISO 9001:2015-compliant QMS, that can be used as a platform on which to base an effective cybersecurity program.


9 Reasons Cybersecurity Should Be a Priority in Your Business Right Now

8/14/2020 - BY: JEFF WILLIAMS
With countless workers now using personal laptops and home internet connections, rather than dedicated servers and equipment with stronger cybersecurity, hackers are provided an easy access point into confidential company data. Due to this heightened and evolving risk, it is now more critical than ever for companies to focus on establishing robust cybersecurity practices if they hope to keep their businesses safe in this new threat landscape.


A Closer Look: Current State of Cybersecurity in the Defense Industry

12/13/2019 - BY: JEFF WILLIAMS
Over the past decade, cyber threats have grown exponentially more sophisticated and frequent, with trillions of dollars lost each year due to cyber-attacks. This threat is especially prevalent for those in the defense industry, as suppliers at all levels are being targeted.


DoD Announces New Cyber Certification Program for Contractors - Is Your Company Prepared for Audits?

6/7/2019 - BY: JEFF WILLIAMS
In an ongoing effort to maintain information security throughout the defense supply chain, the Department of Defense (DoD) plans to implement a new program called the Cybersecurity Maturity Model Certification (CMMC), which will mandate cybersecurity audits and certifications for DoD contractors.


Cybersecurity: Heightened Risk Calls for Heightened Risk Management

5/10/2019 - BY: JEFF WILLIAMS
With the Fourth Industrial Revolution upon us, integrating systems into business operations has never been easier. At the same time, introduction of these technologies into our businesses means the risks we face have never been higher. While creating and maintaining a completely secure environment for information is a virtual impossibility, one thing all organizations can do to protect themselves is implement a Risk Management System.


Defense Contractors: Is Your Information Protected?

1/11/2019 - BY: ELLIOT FORSYTH
Every 39 seconds, a cyber-attack occurs somewhere in the world. Yet, most small manufacturers still believe they are safe from cyber threats, assuming hackers only target large, multi-billion dollar companies. Unfortunately, that cannot be further from the truth.


5 Steps to Cyber Safety: IT Perspective

10/19/2018 - BY: JEFF WILLIAMS
We recently posted a blog detailing how business leaders could safeguard their companies from cyber-attacks. This week, we will focus on IT-related steps to help ensure your business is protected from cyber-attacks.


|<  <   1 2    >  >|
Page of 2
Showing 1 - 10 of 17