Posts about:

Cybersecurity

Longevity and reputation builds IIoT security & trust

Trust can be a giant deal-breaker for any relationship. It doesn't matter if it's who should watch your dog when you go on vacation, who you should marry, who babysits your kids, or who you should trust your company data with; it matters big time to you because it impacts you as a person. Broken trust can quickly turn any relationship into something completely unrecognizable in a heartbeat.

A giant part of building trust with anyone is 'seeing' who they really are after you've known them a long time. A very wise person once told me "When someone shows you who they are, believe them."

We totally understand that addressing who you should entrust your data, SaaS and SCADA system to can be a very difficult decision, and one that should not be taken lightly.

READ THE BLOG

Find a secure home for your data

You may be someone who already is aware that your data is best available to your employees on the cloud to continue delivering stronger results. Everyone gets level-appropriate access during the day or at midnight, in the office or in Katmandu.

But with it that available, ‘How secure is it?’ you may want to know.

Instead of just saying, “Trust us,” we’ll share some of the extensive steps we take to make sure your data is very safe, both from intruders and from forces of nature. After all, we hold that data in trust for our customers and we don't take security lightly.

READ THE BLOG

Find the real value of your operations

I'm betting it's safe to say you've had enough of the endless stream of singular reports piling on your desk. With a single report from one end of the operation paper clipped to another report from the middle, you’re constantly sorting everything manually, or hand-entering it into several separate databases. Maybe some of your reports are from yesterday and others are from last week. Maybe the databases are scattered on computers or servers in several locations.

How can you make good (or any) business decisions or locate issues when everything is scattered, missing, in the wrong pile, stapled to the wrong report or accidentally tossed out?

Without a unified report you may not be able to see how a small issue in one area can lead to a big need down the line—until it’s too late. You need a single source for sensor data up and down the line, as it happens?

READ THE BLOG

industrial cybersecurity with two-factor authentication

Unfortunately, data breach notifications are in the news cycle almost every day now and are fiercely impacting every industry. When it’s someone else’s company; you may have a moment of empathy for all they're about to go through as people, a company and financially—but it quickly becomes a major crisis when a security breach impacts your company, or you personally.

READ THE BLOG

2FA for cyber Security

Cyber security is a significant sustainability challenge for every industry today.

Security attacks come in many forms and almost every week we read about another company that has had data become compromised, either from ransomware in a corporation or banking data captured from a retailer. How do you defend against those kinds of attacks while giving your people easy, but secure access to the site or asset data they need in order to efficiently make the best business decisions?

READ THE BLOG

The Value of SCADA and Why You Question It

SCADA and other remote monitoring systems introduced a step change to the industry in the area of operational efficiency by providing a positive impact on run-time, production and reduced operating costs. However, with low commodity prices and lower producing wells, there is still a challenge for business cases to justify putting monitoring on all assets.

READ THE BLOG