Panel Builder System Integrator

Cyber 400December 19, 2018

A scene we see all too often. A busy coffee shop full of patrons sipping their favourite hot beverage, with the glow of laptops and iPads eagerly using up the available free Wi-Fi. Little do they know, this ubiquitous activity can open the door for cyber criminals to steal identities, data and attack any networks they are connected to.

We have become accustomed to the availability of free Wi-Fi at these establishments, so much so that we often click to accept the terms of free internet, without heeding the dangers of using public networks. One such example occurred recently (described in an article by ZDNet – see link below for the full article) when a corporate laptop being used in a coffee shop was enough to allow a sophisticated cybercrime group to compromise an organization's entire infrastructure.

The incident began when an employee of the manufacturer took their laptop to a coffee shop and used it to visit the website of one of the firm's partners. The security researchers said the user visited the site after being directed there by a phishing email -- and that the site had been compromised by FakeUpdates, a malware and social engineering campaign affecting thousands of Joomla and WordPress sites. The malware shows users pop-ups which claim their browser software needs updating. In this instance, the laptop was then infected with the Dridex banking trojan and the PowerShell Empire post-exploit toolset.

The security software being used by the manufacturer (the vender was not named) relied on devices being inside the corporate network to pick up threats. As the laptop was being used outside the network, this incident didn't become apparent until the laptop was back in the office -- by which time it was too late. The infected laptop then served as an entry point for the attackers to compromise the entire corporate network, allowing attackers to access dozens of systems that could be compromised by taking advantage of the user's permissions.

How many of us have simply clicked ‘ok’ when a pop-up tells us an update is available?

The coffee shop example is just one instance of how an innocent act can have big consequences, without the proper precautions and systems in place. How employees use technology is an important factor in ensuring their employer’s cybersecurity.

Critical Issues Affecting Manufacturers

An alarming percentage of small and medium-sized Canadian businesses experienced cyber incidents last year (22% of manufacturers world-wide), averaging 22 to 24 hours in downtime. The average cost of a cyber breach in Canada was $6.11 million during that same period. Overall, 48% of manufacturers have suffered from cyber-attacks, with 24% sustaining financial and other business losses.

Cyber incursions continue to grow in frequency and severity. Cyber threats have been identified as one of the most critical issues in the next 5 years, yet according to our friends at Ernst & Young, 58% of Canadian firms still say information security has little or no influence on their business strategy or plans.

Direct attacks notwithstanding, for many businesses it appears careless or uninformed employees are often the culprit for a cyber incursion.

Perhaps the most startling statistic, is 91% of respondents in the EY survey said discovery of a breach that impacted the organization would be the catalyst for increasing their cybersecurity. Waiting until after-the-fact is a complacency that industry simply cannot afford. Only 16% of Boards have sufficient information security knowledge to fully evaluate, with only 13% saying they are excellent at crisis management.

The industrial cybersecurity market is expected to grow by $10 billion through 2023. Measured by sector, manufacturing and energy are the top two critical industries targeted for cyber intrusions. More than half of manufacturers have suffered from cyber-attacks, with a quarter experiencing significant financial and business losses. It’s not just a big company problem, either. 58% of malware attack victims are categorized as small businesses.

With the acceleration of advanced manufacturing automation and robotics, machine learning/AI, blockchain and IIoT, cybersecurity is an important element to protecting your business during the fourth industrial revolution.EMC 175

Best Practices

During a ‘Cybersecurity for Manufacturers’ webinar hosted by Excellence in Manufacturing Consortium (EMC) earlier this month, Scott Mossbrooks, from EMC’s Cybersecurity Team at N-Dimension recommended the following best practices for our members to check on:

  • Educate Staff
  • Inventory All Assets
  • Implementing Access Controls
  • Have a Bring Your Own Device (BYOD) Policy
  • Know Where Data is Stored
  • Maintain, Validate, Test Back-ups
  • Employing services such as Cybersecurity Monitoring and Vulnerability Assessment Scans


Changing Scene

  • Prev
Intertec Instrumentation is launching a range of tough field enclosures for housing remote I/O and ...
nVent Electric plc recently announced it has signed an agreement to acquire Eldon, a privately held ...
Canada continues to be an excellent performer for HARTING, recording double digit revenue growth on ...
  For the past number of months Proax Technologies Ltd. has been in discussions with ...
  Phoenix Contact Canada is pleased to announce that Roger Hallett has accepted the ...
  Machine designers are required to design safety into more industrial systems than ever. ...
Pilz Canada officially opened their Canadian Facility surrounded by Industry Partners, colleagues ...
Allied Electronics & Automation has announced the addition of the new TM Series of ...
Cybertech Automation is proud to announce the expansion of services into Texas, Pennsylvania and ...
Eclipse Automation recently announced the acquisition of D&D Automation, located in Stratford, ...

One of Canada’s largest wastewater treatment plants at Annacis Island provides secondary treatment to approximately 175 billion litres of wastewater every year for over 1 million residents in 14 municipalities. After almost 20 years in operation, the variable frequency drives supporting the critical pumping systems for the primary treatment and secondary treatment facilities had to be replaced to ensure that the plant’s high operational availability and reliability will not be compromised in serving the plant, the surrounding municipalities and the environment. Metro Vancouver Regional District chose to deploy Rittal’s enclosure and power distribution solutions with E-plan software to efficiently support vital infrastructure improvements by reducing equipment replacement times and thereby minimizing risk to plant operations.

PB 25 Phoenix ControlCabinet 400

Phoenix Contact will provide you with support as your reliable partner in the optimization of your processes in control cabinet manufacturing.

Phoenix Contact provides you with holistic solutions in a cooperative partnership, based on their products, services, and experience. Digital data is used consistently, processes optimized, and time saved. The PROJECT complete planning and marking software supports your entire control cabinet manufacturing process. The program provides you with an intuitive user interface that enables you to individually plan, automatically check, and order terminal strips.

Thanks to optimized interfaces, you can easily integrate data from common CAE systems. This enables you to save significant amounts of time in the overall engineering process. Read More

 Like many cyclical industries, mining is reviving, driven by steady global economic growth and an increasing demand for materials to support new technologies like electric vehicles, renewable energy and mobile devices. Despite the optimism, the industry still faces major operational challenges including process efficiencies, cost control, worker health and safety, and skills gaps. To address these challenges, Rockwell Automation introduced The Connected Mine, leveraging the latest enabling and digital technologies.

Utilizing advanced analytics, The Connected Mine helps mining companies collect and aggregate data to gain end-to-end visibility into their operations and make informed business decisions to improve mining operations.

Read More

PB 25 Rittal MarineWaves 400For almost a half a century Canal Marine & Industrial of St Catharines, Ontario has provided electrical design, engineering and services around the clock to the merchant marine, naval and coastguard fleets in Canada and the rest of the World. In recent years, Canal has become a leader in the design and supply of marine hybrid power and propulsion systems. These systems utilize alternative methods for supporting propulsion and the vessel’s electrical power plant, so that fuel consumption and emissions are reduced.

Great Lakes Towing of Cleveland, Ohio (popularly called “The Towing Company”) operates the largest and most experienced U.S.-flag tugboat fleet. The Towing Company is a significant marine operations link in North America’s U.S. Great Lakes-Saint Lawrence Seaway marine transportation network, the fourth seacoast of the United States, an operating area that extends over 8,300 miles of shoreline, encompassing a water surface area of roughly 100,000 square miles. Read More

HARTING Electronics: Circular Connectors – A Round Thing

Circular Connectors 400

Jonas Diekmann, Technical Editor at HARTING Electronics

The metric system of units was introduced for the first time in 1793 during the French Revolution and is used even today in almost all countries worldwide. The metric round plug connectors are also based on this system of units and are a known standard in raw industrial applications. In various diameters and codes, they are a reliable connection for the three lifelines of industrial applications. Data, signals and performance are essential for drive, control and communication. The typical round appearance with the thread for screwing in is a success story up to the present. But classics often also still reveal unexpected potential. With its new PushPull Locking and Com-Lock HARTING is making two round guild models ready for the future.

Metric round plug connectors are some of the most widespread interfaces worldwide, when it comes to cabling for machines, industrial plant and devices under demanding conditions of use.

Read More

Rockwell SleemanTen years ago, tourists looking for a taste of the local life in Southern Canada may have asked for one of the region’s best wines. Today, it’s all about craft beer.

From entrepreneurial newcomers to large-scale producers, brewers in Canada are cashing in on the thirst for craft beer. The number of microbreweries – ­producing less than 25,000 cases of 24 – has more than doubled in the last seven years.

The explosion in craft beer popularity had one company – Sleeman Breweries – bursting at its production seams. The third-largest brewer in Canada, Sleeman brews and distributes popular beers from lagers to pale ales.

 Read More


Product News

  • Prev
With Balluff’s new online Machine Vision configurator tool, users can confidently and ...
Endress+Hauser’s new ITHERM TrustSens thermometer features the world’s first RTD sensor ...
Endress+Hauser’s new ITHERM TrustSens thermometer features the world’s first RTD sensor ...
One of the core requirements of flexible production is the ability to quickly install machines and ...
For human beings and robots to be able to work harmoniously in communal machining areas without any ...
Power Machine Tray Cable is available in sizes from 18 AWG to 8 AWG with 3 to 25 unshielded ...
When it comes to transporting heavy or fragile goods and applications that involve manual ...
Due to the non-expandable switching function, the PSR-MC31 safety relay module is suitable for all ...
Balluff’s newest  inductive coupler systems transmit high-level electrical power (up to ...
Benefit from all the options offered by IO-Link: the point-to-point connection enables you to ...
Kerrwil Publications

538 Elizabeth Street, Midland,Ontario, Canada L4R2A3 +1 705 527 7666
©2019 All rights reserved

Use of this Site constitutes acceptance of our Privacy Policy (effective 1.1.2016)
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Kerrwil