Cyber criminals are typically able to move faster than companies. This means you need to know where your vulnerabilities are and where the likely threats will come from. Eduardo Di Monte, cybersecurity portfolio strategic growth leader at Rockwell Automation, delved into this topic and what it means in the industrial manufacturing context in a recent blog post.
“Given the current nature of the cyber threat landscape, no organisation is immune from becoming the target of cybercriminals,” he states. “Over the past year alone, we’ve seen companies of all types and sizes, irrespective of industry or sector, fall victim to a cyberattack. While previously, digital sectors such as eCommerce companies were the first on the radar of criminals, this has now shifted towards industrial targets.”
He says the reason for this change is because often companies in these industries have not updated or enhanced their cybersecurity processes for a significant period of time. For instance, it is common for legacy systems to still be using the same security protocols they had when first issued, meaning attacks can quickly and easily interfere with operations. There is also a misconception that cyberattacks are increasing in their sophistication or level of complexity, yet in reality criminals are using well-established tactics and seeking the easiest, most available opportunities.
Click here to download the full blog post in Microsoft Word format.
Transforming pulp and paper with automation and digitalisation ABB South Africa
IT in Manufacturing
The pulp and paper industry in South Africa is undergoing a significant transformation from traditional manual processes to embracing automation technologies. Automation in pulp and paper mills aims to improve various production stages, from raw material preparation to final product creation.
Read more...Control system for deep antenna Rockwell Automation
Motion Control & Drives
When a major university in South Korea set out to build a 21-metre deep space antenna, the researchers needed a control system that could track celestial objects with pinpoint accuracy, a level of precision they thought was out of reach. By partnering with Rockwell Automation, they discovered that the right technology and support could turn their vision into reality.
Read more...Protecting industrial networks with resilient defence RJ Connect
IT in Manufacturing
Network security is no longer just about preventing hacking or data breaches. For operational technology networks, resilient defence and consistent uptime are crucial. They are the core tenets that underpin Moxa’s guarded uptime and resilient defence (GUARD).
Read more...The metaverse is now: are you ready to reimagine your business?
IT in Manufacturing
The convergence of the digital and physical worlds, driven by spatial computing and the metaverse, is rapidly reshaping business landscapes. This transformation extends beyond the mere novelty of virtual reality headsets and augmented reality filters, signalling a fundamental shift in how organisations operate, collaborate and innovate.
Read more...AI and cyber security: South Africa’s next battleground
IT in Manufacturing
Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.Artificial intelligence is rapidly becoming a double-edged sword in the world of cybersecurity. In South Africa, where cybercrime is on the rise, AI presents both an opportunity and a threat.
Read more...Addressing the cooling needs of the modern data centre Schneider Electric South Africa
IT in Manufacturing
The rise in hardware density in data centres is gaining speed and is largely driven by the demands of artificial intelligence and machine learning, requiring more powerful servers and specialised hardware.
Read more...South Africa’s next cyber security frontier
IT in Manufacturing
AI-powered agents are rapidly transforming how South African businesses operate, from chatbots managing customer inquiries to automated systems processing financial transactions. While these AI-driven assistants increase efficiency and reduce operational costs, they also present a new, and often underestimated, cybersecurity challenge: identity management.