Find the real value of your operations

Posted by Amy Thibault on Nov 15, 2022 11:15:00 AM

 

I'm betting it's safe to say you've had enough of the endless stream of singular reports piling on your desk! With a single report from one end of the operation paper clipped to another report from the middle, you’re constantly sorting everything manually, or hand-entering it into several separate databases. Maybe some of your reports are from yesterday and others are from last week. Maybe the databases are scattered on computers or servers in several locations.

How can you make good (or any) business decisions or locate issues when everything is scattered, missing, in the wrong pile, stapled to the wrong report or accidentally tossed out?

Without a unified report you may not be able to see how a small issue in one area can lead to a big need down the line—until it’s too late. You need a single source for sensor data up and down the line, as it happens?

Read More

Increase industrial cybersecurity with two-factor authentication

Posted by Amy Thibault on Nov 8, 2022 11:37:00 AM

 

Unfortunately, data breach notifications are in the news cycle almost everyday now and are fiercely impacting every industry. When it’s someone else’s company; you may have a moment of empathy for all they're about to go through as people, a company and financially—but, it quickly becomes a major crisis when a security breach impacts your company, or you personally.

When that news comes out, the temptation is to think, “Hope that doesn’t happen to us.” Hope is nice, but action is always so much better. But before you act, you’re concerned that upping your security game will create two obstacles. One is that something like two-factor authentication (2FA) will be a pain to install and train on, and second is that it will make access harder for your own people. And a third question is, “Will doing all that actually help?”

Read More

Two-factor authentication for cyber safety

Posted by Amy Thibault on Sep 1, 2022 11:08:36 AM

 

Cyber security is a significant sustainability challenge for every industry today.

Cyber attacks come in many forms and almost every week we read about another company that has had data become compromised, either from ransomware in a corporation or banking data captured from a retailer. How do you defend against those kinds of attacks while giving your people easy, but secure access to the site or asset data they need in order to efficiently make the best business decisions?

Read More

Operational data security lane

Posted by Amy Thibault on May 13, 2021 12:45:00 PM

 

 

Have you ever tried to give someone advice about something that was way outside of your expertise? I have made that error many, many times. When I make the error of an unsolicited suggestion on something (usually to my friends on subjects like fashion, hair styles or anything related), I'm occasionally told to "stay in my lane." It quickly sets things into perspective for me, and I retreat, with a smile, knowing they're totally right; I'm way, way, way out of my lane offering advice about a topic I clearly do not fully understand or have taken the time into learning enough about.

They're totally right, I should stay in my own lane.

When it comes to data security, you're busy, and we completely understand that making sure your operational data is secure may not be always top of mind to you, or your highest priority at all times. After all, the last thing most people have time for is to worry about the security of operational data, because well, they're already very busy making sure a million other operational decisions are made really well, promises kept, employees remain productive, all the while with goals and targets continuously being achieved, or even better; exceeded.

Read More

True cost of in-house SCADA

Posted by Amy Thibault on Aug 7, 2018 11:06:00 AM

 

You’ve been really busy lately; planning to design install and manage your own SCADA system. You've done all your homework, researched, endlessly read on the how to’s, precautions and potential disasters to avoid. You’re ready to invest your hard-earned money, and commit even more of your precious time into the next steps.

Read More

Now you see it: Zedi Video Surveillance adds remote asset security

Posted by Community User on Jul 30, 2018 10:30:00 AM

Seeing is truly believing. Through Emerson's Zedi Access you can “see” so many issues right from your computer or phone via Zedi Go:

Is my unit running?

What’s the line pressure?

Who's actually on-site?

Is the tank filling up?

Techs and pumpers are already logging much less drive time, the equipment is logging lots more “up” time and the accountants are pushing that bottom line lower and lower. And yet—it still would be nice to actuallysee what’s happening out there.

Read More

Four things to consider before self-hosting your SCADA system

Posted by Community Contributor on Jul 18, 2018 11:56:13 AM

 

Awhile back a friend decided to replace a leaky faucet himself and save some money. He thought the faucet was screwed on, so he grabbed a wrench and started twisting away.

After a couple of turns the faucet broke off, spewing water everywhere. It was sweated instead of screwed on, so he had to turn off all the water to the house and then call a plumber to fix his mistake. It would’ve been faster and simpler to have farmed out the work in the first place.

Read More

Blog listing page

Posted by