A key recruiting challenge for the prospective Millennial may be an outdated image of manufacturing careers from popular culture and possibly even their parents. Manufacturing today is increasingly digital and innovative. Companies looking to recruit these younger workers must actively strive to prove that they value high technology and creativity as much as Millennials do.
Data breaches are among the most challenging, frustrating and anxiety-ridden situations, especially for contractors. Once you discover someone has access to data and/or systems, the process of containing the situation, assessing the damage and responding to your client and other impacted stakeholders is a long, arduous, embarrassing and costly process.
With so many ways out there to access and exploit vulnerable systems, we need to make sure we’re able to recognize a malware infection in order to prevent and defend our systems. You need to know how to tell if you have malware!
Robots have long been romanticized in art and popular culture. From HALL 9000 and the Terminator series where they are seen as a menace to humanity, through to Star Wars or WALL-E where they are benevolent and even heroic, robots can be portrayed both positively and negatively.
The ever-growing threat of ransomware over the past few years has IT professionals adding additional security controls. The only protection from a ransomware attack is to prevent it. This is why ransomware resiliency is so important to all organizations.
The University of Utah Manufacturing Extension Partnership (MEP) Center is the MEP Center for the state of Utah. Our mission is to provide Utah manufacturing companies with services and consulting to increase their global competitiveness. We do this through growing and retaining jobs, cost savings, and increasing sales and investment.
How to best understand the Cybersecurity guidance and volumes of information is an ominous challenge? The foundational cybersecurity work produced by NIST (National Institute for Standards and Technology) is a comprehensive cybersecurity review. Rather than diving too deep in to NIST and the regulatory nature of the definition of classified vs unclassified information and its protection, we will touch on the value of measuring a commercial organizations cybersecurity posture.
Imagine that you have been given the responsibility of managing a client’s $5 million software-maintenance project. As you start going to on-site meetings, you see that the client lead is speaking without any particular agenda or business objective in mind. Furthermore, nobody is taking notes, so action items aren’t being created, progress is not being tracked, and no meaningful follow-up reports are being shared with team members.
For small to mid-sized manufacturers, any gain in productivity can have a huge impact. Automation offers significant advantages, but many small and mid-sized businesses (SMBs) believe that robotics is out of their reach. These organizations can’t afford large, complex robots that don’t fit within their limited floor space, that require specialized personnel to program and maintain them, and that are simply too expensive, with a payback period that is too long to justify the investment.
Malware has crippled banks, railway systems and power companies, but the Associated Press (AP) reported last week that manufacturers increasingly are the victims of cyberattacks too.