Read Also: Bone Up on Safety Online
With all this information in the websphere, we don't really know how safe our private lives are anymore. We check in to places and make this information public, leaving our homes and personal property vulnerable to intruders. We use "highly secure" passwords, such as "password123," to protect our finances. We believe that the security settings we put in place on social media spaces are secure enough, but then once in a while we read reports that say X online institution was hacked and now our personal information is floating in cyberspace. Yikes!
Collaborate in New Dimensions
Learn how 3-D technology at a pulp and paper plant enables operators and managers alike to visualize data.
How to Plan & Design a Control Room
Today's control workstations are smaller, more functional and more appealing than earlier generations.
Read Also: Are your security practices up to IT standards?
And reassurance is hard to find. This month our online exclusive is a report by Ralph Langner and Perry Pederson published by the Brookings Institution about risk management as a cyber defense tool called "Bound to Fail: Why Cybersecurity Risk Cannot Simply Be Managed Away."
Cybersecurity in Your Safety DNA
Conversation, Collaboration Crucial to Cybersecurity
Our editor in chief Walt Boyes also chimed in. He said that automation professionals have an idea of the risks involved in the process industries, but little is known about how to efficiently secure our processes. "We have to worry about cyber accidents, but also malicious activity on the part of hackers from wherever they hail, in addition to simple accidents on the plant floor."
Read the Brookings Institution report along with our experts' commentary at www.controlglobal.com/cybersecurity-fail. Don't forget to let us know what you think of the report and if you agree with our experts' opinions.