IOT Manufacturing Industry 4.0 Cyber Security

Building Your Cyber Security Strategy in Industry 4.0

Building Your Cyber Security Strategy in Industry 4.0 In the booming age of Industry 4.0 (the fourth and current industrial revolution), manufacturers are replacing legacy shop-floor equipment with “smart” ways and means – enabling safer, more efficient factories with greater Overall Equipment Effectiveness (OEE.) Enterprising new Industrial Internet of Things (IIoT) technologies like construction robotics and smart assembly lines are …

Why 91% of IT and security pros fear insider threat

Why 91% of IT and security pros fear insider threats Insider threats are a larger concern for most organizations than cybercriminals or hacktivists, according to a BetterCloud report. The biggest security threat to your business likely isn’t a cybercriminal or hacktivist, but someone already in your organization, according to a Wednesday report from BetterCloud. The vast majority (91%) of the …

Making sense of cyber security in OT environments

Do you have an Operational Technology Environment? Are you using the SICS framework? What would life be like without traffic lights, mass-produced food, energy at the touch of a button, or easily available motor fuel? Operational Technology (OT) makes all these things happen and pervades our lives in both obvious and hidden ways, automatically monitoring and controlling processes and equipment …

Have your details been compromised?

Just how certain are you that your username and passwords are secure? Lets put them to the test then?   Think of a card, any card. Now, keep that card in mind and think of another. Repeat until you’ve picked twelve cards—but make sure your selection includes all four suits, at least one ace and one face card, and no …

Hackers account for 90% of login attempts at online retailers

Hackers account for 90% of login attempts at online retailers From credit card details to premium cheese, hackers are after you!   Selling stolen personal data is a big business for hackers: Somewhere on the dark web, your e-mail address and a few passwords are probably for sale (hopefully, old ones). Cyber criminals buy troves of this information to try …

Microsoft Vulnerabilities Report – Download

Microsoft Vulnerabilities Report 2017 Download the Microsoft Vulnerabilities Report 2017 The 2017 Microsoft Vulnerabilities Report reviews the latest trends and reveals that the number of published vulnerabilities has risen by 111% over five years. The ever-popular report makes the compelling case for least privilege, finding that of the 235 Critical vulnerabilities reported in 2017, 80% would be mitigated by removing local admin rights from …

SyTech IT Develops New Cyber Security Audit tailored to Industry.

SyTech IT Develops New Cyber Security Audit SyTech IT designs Cyber Security Audit tailored to manufacturers and multi-channel distribution businesses.   Having now been categorised as a ‘major threat’, cyber-crime shows no signs of slowing down and it is now more important than ever to ensure businesses have the correct measures in place to prevent any devastating consequences of cyber-crime. …

BAE Launches New Cyber Security Intelligence Network

BAE launches cyber security intelligence network BAE Systems has launched a new industry forum and lobbying group called The Intelligence Network to address increases in cyber attacks.   In April, the UK’s National Cyber Security Centre and NCA warned that criminals were launching more online attacks against British businesses than ever before. Attempts to tackle this by the biggest companies have included …