{"id":10801,"date":"2019-05-16T11:09:05","date_gmt":"2019-05-16T14:09:05","guid":{"rendered":"https:\/\/industriall.ai\/blog\/?p=10801"},"modified":"2022-01-04T13:23:17","modified_gmt":"2022-01-04T16:23:17","slug":"cybersecurity-how-to-use-it-wisely","status":"publish","type":"post","link":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely","title":{"rendered":"Cybersecurity: how to use it wisely"},"content":{"rendered":"\n<p>Have you\never thought about the amount of information a single system holds? Nowadays\nwith industry 4.0 and its pillars of big data, internet of things and <a href=\"https:\/\/blog.aevo.com.br\/saiba-como-manter-os-arquivos-da-nuvem-seguros\/\">cloud computing<\/a>, the management of it is a real\nchallenge. More than that, despite the amount of data, it\u2019s crucial for people\nand industries to protect it.<\/p>\n\n\n\n<p>This\nprotection is called cybersecurity: the protection of systems, networks and\nprograms from digital attacks. Cyberattacks usually have the purpose of\ndestroying or changing important information, or even to stop processes and\ndamage entire systems.<\/p>\n\n\n\n<p>In this\narticle you will understand better the types of cyberattacks and how to protect\nyourself and your workplace from them, how can cybersecurity be used and how is\nthis related to compliance. <\/p>\n\n\n\n<h2><strong>What is\nCybersecurity?<\/strong><\/h2>\n\n\n\n<p>Cybersecurity\nis what make possible to protect computers, servers, mobile devices, systems\nand networks from attacks. This term is applied to everything which is related\nto computer security and data protection.<\/p>\n\n\n\n<p>Data is\nconsidered by industries and governments as an asset, and as well as they do to\ntheir properties, information is now part of the business and must be\nprotected.<\/p>\n\n\n\n<h2><strong>Types of\nCybersecurity<\/strong><\/h2>\n\n\n\n<p>The threats\ncybersecurity fights are usually:<\/p>\n\n\n\n<ul><li>Virtual Crime: individuals or groups of criminals who attack systems to have money;<\/li><li>Cyber war: usually is related to the collection of information and is motivated by politics issues;<\/li><li>Virtual Terror: has as its goal the contamination of systems to cause panic or fear.<\/li><\/ul>\n\n\n\n<p>You have probably already experienced an attempt of invasion in your personal devices or even during your work. The most common methods used to do it are virus, worms, spywares and trojans.<\/p>\n\n\n\n<p>While virus and worms are used to multiply inside a system and modify and damage it, the spywares and trojans are used to collect data without being noticed. <\/p>\n\n\n\n<p>In an\nindustrial environment that keeps many data stored using big data and cloud\ncomputing solutions, with the purpose of using them for strategic decisions,\nthe need for keeping these information safe increases a lot.<\/p>\n\n\n\n<h2><strong>How can\ndevices and systems be protected?<\/strong><\/h2>\n\n\n\n<p>There are\nsome ways to protect devices and systems, which are widely used by individuals\nand industries as well.<\/p>\n\n\n\n<ol><li>To have a security plan;<\/li><li>Wireless network protection;<\/li><li>Purchase an antivirus solution.<\/li><\/ol>\n\n\n\n<p>Considering\nan industry, besides these basic cybersecurity systems and strategies, it is\nessential that people, processes and technology are a complement to one another\nand together create effective defense behaviors and routines to prevent cyber\nattacks.<\/p>\n\n\n\n<p>Some\ninteresting network security examples are:<\/p>\n\n\n\n<ul><li>Extra\nlogins;<\/li><li>New\npasswords;<\/li><li>Antivirus\nprograms;<\/li><li>Encryption\nof important data;<\/li><li>Firewalls.<\/li><\/ul>\n\n\n\n<h2><strong>Cybersecurity\nand Industry 4.0<\/strong><\/h2>\n\n\n\n<p>Because\nindustry 4.0, as mentioned before, deals with so much data at once, this is\nclosely related to cybersecurity. <\/p>\n\n\n\n<p>For\nindustries that are making use of industry 4.0 solutions such as the Internet\nof Things (IoT), Big Data and Cloud Computing to integrate all systems, any\ncyberattack could impact a lot the business and should be prevented.<\/p>\n\n\n\n<p>There are\nsome examples of problems that may happen if cybersecurity is not used:<\/p>\n\n\n\n<ul><li>Compromising physical security;<\/li><li>Production downtimes;<\/li><li>Products with low quality;<\/li><li>Damaged equipment;<\/li><li>Financial and reputational losses.<\/li><\/ul>\n\n\n\n<h2><strong>Cloud\ncomputing<\/strong><\/h2>\n\n\n\n<p>When\nindustries are considering using cloud computing to keep data out of physical\nservers there is the myth of it being less secure because when you store data\nphysically you feel you can protect it better.<\/p>\n\n\n\n<p>However,\nthe truth is that cloud security is a tool in constant evolution and much safer\nthan physical storage of data.<\/p>\n\n\n\n<p>The same\napplies to the Internet of Things, which refers to a wide number of critical\nand non-critical cyber physical systems such as sensors, wifi routers, security\ncameras and movement detectors that communicate to one another.<\/p>\n\n\n\n<p>These are\nimportant systems that must be protected, and cybersecurity solutions are\navailable to make it happen.<\/p>\n\n\n\n<h2><strong>Case studies<\/strong><\/h2>\n\n\n\n<ul><li>AGC\nGlass Germany GmbH is a supplier to the automotive industry, and the company\nhas been using the Kaspersky Industrial CyberSecurity solution in order to\nguarantee their process continuity. The industry processes automotive glass\npanels produced elsewhere in the group to make them meet customers\u2019 needs. <\/li><li>Pavlodar\nOil Chemical Refinery (POCR LLP) is an oil industry in the Republic of\nKazakhstan. POCR manufactures a wide range of petroleum products, including\nmotor gasolines of various octane ratings, diesel, fuel oil, hydrocarbon gas\nliquids, vacuum gas oil, commercial sulfur, various grades of bitumen\n(construction, paving, roofing) and petroleum coke. The company has many\nprojects and investing in a cybersecurity solution is key for their business.<\/li><\/ul>\n\n\n\n<h2><strong>Current\nreality of cybersecurity<\/strong><\/h2>\n\n\n\n<p>A study\nmade by Honeywell in partnership with LNS Research called \u201cPutting Industrial\nCyber Security at the Top of the CEO Agenda\u201d included the answers of 130\nstrategic decision makers in North America, Europe and other parts of the\nworld.<\/p>\n\n\n\n<p>The results\nshow that 45% of the participants feel there is lack of a reliable leadership\nwhen the subject is cybersecurity.<\/p>\n\n\n\n<p>Besides\nthat, the problem is that 20% of those companies said they don\u2019t have risk\nevaluation processes, and 25% never tested their own security barriers with\ntest invasions.<\/p>\n\n\n\n<p>Although\nthis is the reality today, industries must not feel comfortable and simply wait\nfor invaders to act against them. Cybersecurity is a prevention solution, to\nmost of all, avoid damages and important losses.<\/p>\n\n\n\n<p>Related to\nit, Matthew Littlefield, president of LNS Research, said that an operation\nmodel that allows digital transformation consists of excellence in people,\nprocesses and technological capacities, and as a consequence, creates\ncybersecurity in this model.<\/p>\n\n\n\n<h2><strong>The\nrelationship between cybersecurity and compliance<\/strong><\/h2>\n\n\n\n<p>The first\ntask here is to understand the concept of <a href=\"https:\/\/blog.aevo.com.br\/compliance-na-gesto-de-projetos\/\">compliance<\/a>. To comply with something is to act\naccording the rules, follow the guidelines. It helps the whole system assure\nthat the organization is following all regulations related to its business\ntype.<\/p>\n\n\n\n<p>In order to\nhave compliance in all processes and people, guidance and frameworks must be\noffered and implemented, and having the culture of transparency and security of\ndata is very important. When an industry can guarantee these two aspects,\nsuppliers and consumers can trust this company and know that their information\nis safe with them to be used for the correct purposes.<\/p>\n\n\n\n<p>A report\nfrom IBM and Ponemon Institute regarding costs of data breaches in 2017 show\nthat more than 50% of breaches in that year were caused by people inside the\ncompanies or system glitches.<\/p>\n\n\n\n<p>Another\nimportant number is that 40% of indirect costs of this kind of incident result\nin loss of customer loyalty and consequently, loss in business.<\/p>\n\n\n\n<p>Therefore,\nhaving good cybersecurity solutions and really guarantee they are working is\npretty important in order to keep the compliance of an industry.<\/p>\n\n\n\n<h2><strong>Conclusion<\/strong><\/h2>\n\n\n\n<p>As it was\npossible to realize during this article, cybersecurity is important and must be\ntaken into account in any industry\u2019s security strategy.<\/p>\n\n\n\n<p>In the\ncurrent world where even cars and kitchen appliances are connected to the\ninternet, there are countless opportunities for cyberattacks and as a\nconsequence big problems regarding these systems and all data related to them.<\/p>\n\n\n\n<p>Similarly,\nin companies there is high chance a cybercrime happens and affects the whole\nbusiness, the people and customers.<\/p>\n\n\n\n<p>If you are already working with cybersecurity or facing any challenges related to it, share with us in the comments section below!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever thought about the amount of information a single system holds? Nowadays with industry 4.0 and its pillars of big data, internet of things and cloud computing, the management of it is a real challenge. More than that, despite the amount of data, it\u2019s crucial for people and industries to protect it. This [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":10886,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false},"categories":[101,82],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity and How to Use it Wisely<\/title>\n<meta name=\"description\" content=\"Cybersecurity is to protect your systems and networks from cyberattacks, which are common now. To avoid their damages is having a successful business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and How to Use it Wisely\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is to protect your systems and networks from cyberattacks, which are common now. To avoid their damages is having a successful business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\" \/>\n<meta property=\"og:site_name\" content=\"Blog IndustriALL\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-16T14:09:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-04T16:23:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/industriall.ai\/blog\/wp-content\/uploads\/2019\/05\/150-1024x559.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"559\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Industriall Corp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Industriall Corp\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely#article\",\"isPartOf\":{\"@id\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\"},\"author\":{\"name\":\"Industriall Corp\",\"@id\":\"https:\/\/industriall.ai\/blog\/#\/schema\/person\/511b78cef51a42c1878c9012d1214879\"},\"headline\":\"Cybersecurity: how to use it wisely\",\"datePublished\":\"2019-05-16T14:09:05+00:00\",\"dateModified\":\"2022-01-04T16:23:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\"},\"wordCount\":1196,\"publisher\":{\"@id\":\"https:\/\/industriall.ai\/blog\/#organization\"},\"articleSection\":[\"Article\",\"Artigo\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\",\"url\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\",\"name\":\"Cybersecurity and How to Use it Wisely\",\"isPartOf\":{\"@id\":\"https:\/\/industriall.ai\/blog\/#website\"},\"datePublished\":\"2019-05-16T14:09:05+00:00\",\"dateModified\":\"2022-01-04T16:23:17+00:00\",\"description\":\"Cybersecurity is to protect your systems and networks from cyberattacks, which are common now. To avoid their damages is having a successful business.\",\"breadcrumb\":{\"@id\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/industriall.ai\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: how to use it wisely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/industriall.ai\/blog\/#website\",\"url\":\"https:\/\/industriall.ai\/blog\/\",\"name\":\"Blog IndustriALL\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/industriall.ai\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/industriall.ai\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/industriall.ai\/blog\/#organization\",\"name\":\"IndustriALL\",\"url\":\"https:\/\/industriall.ai\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/industriall.ai\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/industriall.ai\/blog\/wp-content\/uploads\/2020\/08\/INDUSTRIALL-FUNDO-CLARO.png\",\"contentUrl\":\"https:\/\/industriall.ai\/blog\/wp-content\/uploads\/2020\/08\/INDUSTRIALL-FUNDO-CLARO.png\",\"width\":1001,\"height\":102,\"caption\":\"IndustriALL\"},\"image\":{\"@id\":\"https:\/\/industriall.ai\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/industriall.ai\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/industriall.ai\/blog\/#\/schema\/person\/511b78cef51a42c1878c9012d1214879\",\"name\":\"Industriall Corp\",\"sameAs\":[\"http:\/\/industriallcorp.com\"],\"url\":\"https:\/\/industriall.ai\/blog\/author\/industriall-corp\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and How to Use it Wisely","description":"Cybersecurity is to protect your systems and networks from cyberattacks, which are common now. To avoid their damages is having a successful business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely","og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity and How to Use it Wisely","og_description":"Cybersecurity is to protect your systems and networks from cyberattacks, which are common now. To avoid their damages is having a successful business.","og_url":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely","og_site_name":"Blog IndustriALL","article_published_time":"2019-05-16T14:09:05+00:00","article_modified_time":"2022-01-04T16:23:17+00:00","og_image":[{"width":1024,"height":559,"url":"https:\/\/industriall.ai\/blog\/wp-content\/uploads\/2019\/05\/150-1024x559.jpg","type":"image\/jpeg"}],"author":"Industriall Corp","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Industriall Corp","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely#article","isPartOf":{"@id":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely"},"author":{"name":"Industriall Corp","@id":"https:\/\/industriall.ai\/blog\/#\/schema\/person\/511b78cef51a42c1878c9012d1214879"},"headline":"Cybersecurity: how to use it wisely","datePublished":"2019-05-16T14:09:05+00:00","dateModified":"2022-01-04T16:23:17+00:00","mainEntityOfPage":{"@id":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely"},"wordCount":1196,"publisher":{"@id":"https:\/\/industriall.ai\/blog\/#organization"},"articleSection":["Article","Artigo"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely","url":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely","name":"Cybersecurity and How to Use it Wisely","isPartOf":{"@id":"https:\/\/industriall.ai\/blog\/#website"},"datePublished":"2019-05-16T14:09:05+00:00","dateModified":"2022-01-04T16:23:17+00:00","description":"Cybersecurity is to protect your systems and networks from cyberattacks, which are common now. To avoid their damages is having a successful business.","breadcrumb":{"@id":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/industriall.ai\/blog\/cybersecurity-how-to-use-it-wisely#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/industriall.ai\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: how to use it wisely"}]},{"@type":"WebSite","@id":"https:\/\/industriall.ai\/blog\/#website","url":"https:\/\/industriall.ai\/blog\/","name":"Blog IndustriALL","description":"","publisher":{"@id":"https:\/\/industriall.ai\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/industriall.ai\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/industriall.ai\/blog\/#organization","name":"IndustriALL","url":"https:\/\/industriall.ai\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/industriall.ai\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/industriall.ai\/blog\/wp-content\/uploads\/2020\/08\/INDUSTRIALL-FUNDO-CLARO.png","contentUrl":"https:\/\/industriall.ai\/blog\/wp-content\/uploads\/2020\/08\/INDUSTRIALL-FUNDO-CLARO.png","width":1001,"height":102,"caption":"IndustriALL"},"image":{"@id":"https:\/\/industriall.ai\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/industriall.ai\/"]},{"@type":"Person","@id":"https:\/\/industriall.ai\/blog\/#\/schema\/person\/511b78cef51a42c1878c9012d1214879","name":"Industriall Corp","sameAs":["http:\/\/industriallcorp.com"],"url":"https:\/\/industriall.ai\/blog\/author\/industriall-corp"}]}},"_links":{"self":[{"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/posts\/10801"}],"collection":[{"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/comments?post=10801"}],"version-history":[{"count":0,"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/posts\/10801\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/media\/10886"}],"wp:attachment":[{"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/media?parent=10801"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/categories?post=10801"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/industriall.ai\/blog\/wp-json\/wp\/v2\/tags?post=10801"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}