Artwork

Innehåll tillhandahållet av Reliability Matters and Mike Konrad. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Reliability Matters and Mike Konrad eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Episode 129: Network Reliability - Avoiding Cyber-Security Threats

1:16:00
 
Dela
 

Manage episode 379342578 series 2522856
Innehåll tillhandahållet av Reliability Matters and Mike Konrad. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Reliability Matters and Mike Konrad eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
We talk almost exclusively about reliability on this show. Specifically, reliability of circuit assemblies. We discuss production best practices, design for manufacturing and reliability. Failure analysis, and more. We’ve reviewed the latest trends in industry 4.0, the connectivity of machine to machine and machine to management. We discussed big data and how to make all of our newly acquired data relevant and actionable. For all this to occur, our computers must function properly. They must perform the assigned tasks and communicate large sums of data. What happens to our production line if the computers stop functioning? What would happen if our network ceases to operate?
We’ve all witnessed the airline industry grind to a halt recently due to computer failures and connectivity issues. The fact is, very few industries can function properly or even at all if the computer systems fail.
I’m not referring to quality issues within the computer or network’s internal circuit assemblies. I’m referring to malware, ransomware, and other nefarious actions brought on hackers with the intent to disrupt companies, industries, and governments, frequently with the goal of returning (or promising to return) your own data in exchange for an exorbitant payment.
Our industry, like many others is completely dependent on computers and connectivity. Without ether, most production lines will simply sit idle.
How can we avoid this terrifying scenario? How do hackers gain access to our computers and networks? How can we add reliability to our computer and network policies and procedures? To answer these and other related questions, I invited a network security expert on the show. Adrian Francoz, co-founder and CEO of Zeta Sky, a managed IT support and cyber security services company lives in the world of cyber security. He and his company protect their customer’s networks through the implementation of security best practices and constant training, both for his customers, and for his own staff. After all, as I speak, hackers and other bad actors are hard at work searching for the next scam, vulnerability, and the opportunity to score a huge payday, all at our expense.
In the Southern California area? Consider attending the inland Empire cyber security summit on Thursday, October 26 at the Chaffey College InTech Center, 9400 Cherry Ave, Bldg A Fontana, CA 92335.
Register here:
https://www.zetasky.com/inland-empire-cyber-security-summit-2023
Adrian's Contact Information:
info@zetasky.com
https://www.zetasky.com
  continue reading

150 episoder

Artwork
iconDela
 
Manage episode 379342578 series 2522856
Innehåll tillhandahållet av Reliability Matters and Mike Konrad. Allt poddinnehåll inklusive avsnitt, grafik och podcastbeskrivningar laddas upp och tillhandahålls direkt av Reliability Matters and Mike Konrad eller deras podcastplattformspartner. Om du tror att någon använder ditt upphovsrättsskyddade verk utan din tillåtelse kan du följa processen som beskrivs här https://sv.player.fm/legal.
We talk almost exclusively about reliability on this show. Specifically, reliability of circuit assemblies. We discuss production best practices, design for manufacturing and reliability. Failure analysis, and more. We’ve reviewed the latest trends in industry 4.0, the connectivity of machine to machine and machine to management. We discussed big data and how to make all of our newly acquired data relevant and actionable. For all this to occur, our computers must function properly. They must perform the assigned tasks and communicate large sums of data. What happens to our production line if the computers stop functioning? What would happen if our network ceases to operate?
We’ve all witnessed the airline industry grind to a halt recently due to computer failures and connectivity issues. The fact is, very few industries can function properly or even at all if the computer systems fail.
I’m not referring to quality issues within the computer or network’s internal circuit assemblies. I’m referring to malware, ransomware, and other nefarious actions brought on hackers with the intent to disrupt companies, industries, and governments, frequently with the goal of returning (or promising to return) your own data in exchange for an exorbitant payment.
Our industry, like many others is completely dependent on computers and connectivity. Without ether, most production lines will simply sit idle.
How can we avoid this terrifying scenario? How do hackers gain access to our computers and networks? How can we add reliability to our computer and network policies and procedures? To answer these and other related questions, I invited a network security expert on the show. Adrian Francoz, co-founder and CEO of Zeta Sky, a managed IT support and cyber security services company lives in the world of cyber security. He and his company protect their customer’s networks through the implementation of security best practices and constant training, both for his customers, and for his own staff. After all, as I speak, hackers and other bad actors are hard at work searching for the next scam, vulnerability, and the opportunity to score a huge payday, all at our expense.
In the Southern California area? Consider attending the inland Empire cyber security summit on Thursday, October 26 at the Chaffey College InTech Center, 9400 Cherry Ave, Bldg A Fontana, CA 92335.
Register here:
https://www.zetasky.com/inland-empire-cyber-security-summit-2023
Adrian's Contact Information:
info@zetasky.com
https://www.zetasky.com
  continue reading

150 episoder

Alle Folgen

×
 
Loading …

Välkommen till Player FM

Player FM scannar webben för högkvalitativa podcasts för dig att njuta av nu direkt. Den är den bästa podcast-appen och den fungerar med Android, Iphone och webben. Bli medlem för att synka prenumerationer mellan enheter.

 

Snabbguide