5 minute read

MANUFACTURING SHOWCASE

Next Article
BUSINESS 4.0

BUSINESS 4.0

promise. According to one estimate: » The cloud service market (worldwide) is estimated to exceed $623 billion by 2023. » Half of businesses spend more than $1.2 million a year on cloud services. » As of 2019, the manufacturing industry expected to spend more than $5 billion annually on cloud services.

How does cloud computing figure into manufacturing? Extensively, because so many industrial operations are computerized. This affects not only office tasks like payroll and email, but plant functions such as alarms, sign-in systems, data sharing between machines, and sensors that boost efficiency on product lines. Cloud computing is a scalable resource that enhances innovation and competitiveness, according to the Information Technology & Innovation Foundation.

In a 2017 report, the foundation underlined cloud computing's role in operations, supply chain integration, product design and fabrication, and even influencing how consumers use their products. With cloud resources, even small manufacturers can access new production systems including 3D printing, the internet of things (IoT) and industrial robots.

Great Potential, Rich Targets One reason managers welcomed the cloud is that they recalled what their data processing operations used to look like. For many industries, it was a gigantic room, cool and dimly lit, filled from floor to ceiling with shelves of humming servers. When something went wrong with the equipment in that room, people lost their internet, operations skidded to a halt and email went down. Then everyone had to wait until the I/S staff fixed the problem.

Cloud computing providers like Microsoft—a major player in the industry with its Azure business—sold the cloud as a dependable alternative to all that. Local problems like a hardware glitch or severe weather matter much less when operations are backed by multiple off-site servers. Azure proclaims selling points ranging from cost-efficient storage of massive amounts of data, to machine learning and artificial intelligence to aid decision-making.

Cloud computing providers also promise enhanced security. But it's a mistake to regard the cloud as an unassailable citadel protecting all your data 24/7. Cybercriminals, including malicious nation-state actors, use the same types of tactics with cloud systems as with 18 |

other data systems, and for the same reasons: to steal money and secrets, disrupt operations, and glean information they can use or sell. Cloud systems are just another rich target.

In one case, hackers were able to drill into the email of a CEO planning to make a major purchase of robotics equipment. Replicating the seller's credentials, they sent a phony invoice to the CEO and received a payment of $50,000.

In two other cases, mentioned in an NSA report, publicly accessible cloud storage exposed sensitive data and authentication credentials from the National GeospatialIntelligence Agency (NGA), and data meant for the United States Central Command (CENTCOM).

Hackers' tools allow automated efforts to repeatedly probe cloud-based data for passwords and other credentials. Eventually, some of these efforts will pay off. Withholding or freezing data for use in ransomware threats is more difficult with the cloud—but not impossible.

Precautions and the Pandemic Best practices can guide manufacturers in safeguarding their data. These strategies are prudent whether or not a company has vast resources in the cloud: » Schedule updates and take them seriously. Old passwords and outdated usernames have put out the welcome mat for many a hacker who discovers them. » Train employees to be aware of cybercrime threats. During the pandemic, they might even be encountering tactics such as phishing that are disguised as health information or offers of cool face masks. » Limit the number of people who have access to data systems.

That means fewer chances for breaches that could imperil company data or halt operations.

The NIST Cybersecurity Framework is a helpful source of recommendations on cybersecurity best practices, as is the Center for Internet Security. Manufacturers also need to assess their security protocols regularly and stay on top of current threats, whether they have an internal I/S team or are working with an cybersecurity consultant.

A Flexera survey found that companies planned to increase their spending on cloud computing services in 2020 because of significant pressures to support employees working remotely. It may be unavoidable, but that trend brings hazards including connection difficulties, missed system updates, viruses spread from interactions with home devices, and the distractions of working from home.

Numerous tools are available to help cloud service providers bolster security, but that doesn't mean they're all being used effectively. For example, third-party software, which may be sourced from anywhere in the world, could pose backdoor threats to a company's supply chain, the NSA warns.

The NSA report cited above suggests strategies to mitigate possible vulnerabilities in the cloud, including: » Monitoring the provider's responses to threat incidents that have occurred. » Checking that cloud services are configured to minimize threats—limiting shared access between cloud resources. » Enforcing data encryption when necessary for extra protection of sensitive data. A Partnership “The cloud” has always been a lofty metaphor for a very down-toearth set of challenges. Innumerable functions of business and industry have become computerized, and all that technology has to reside somewhere. Cloud computing offers an appealing alternative to maintaining a huge room full of banks of equipment that must be serviced by internal staff.

The cloud is here to stay, but it is not an impenetrable fortress. Companies should view cloud computing as a process—and a partnership. Taking extra steps for cybersecurity can help safeguard data and operations from criminals who can't wait to use the cloud's extensive resources for their own sinister purposes.

ABOUT THE AUTHOR:

Kevin Studley is the president of The Network Pro, Inc. a California-based Managed IT and Security company. The Network Pro is recognized as a growth company on the Inc. 5000 fastest growing companies list, a Great Place to Work by the OCBJ, and has placed on the Top 501 Managed Services Providers list for the last seven years. Kevin Studley is an active and long-standing member of Vistage and actively participates in events that promote the business community.

For more information, visit www.thenetworkpro.net or call (714) 333-9620.

Providing Fabricating & Manufacturing Solutions for Over 27yrs! Superior Bending Technologies

Plate Rolls Section Bending Machines 20 Ga to 6” Capacities, Heavy Duty, 15 Models, 80 Models, CNC Options 1" to 3" Capacities, CNC Options

Visit Us Online or Call: (251) 937-0947 I n n o v a t i o n , Q u a l i t y & P e r f o r m a n c e B a c k e d B y D e c a d e s O f E x p e r i e n c e VBH Series w/Stradivari 3D CNC Angle Rolls 1” to 10” 30 Models Custom Machines CNC Options SAVE on Selected Tooling & Accessories Save on In-Stock Specials while machines last! www.carellcorp.com • www.eaglebendingmachines.com sales@carellcorp.com • sales@eaglebendingmachines.com

This article is from: