Impact Dakota Blog is a blog dedicated to supporting North Dakota’s manufacturing community improve People, Purpose, Processes and Performance. Entries provide information on opportunities, new ideas, quick tips, celebrations of success, and well, frankly, anything to help you become a better manufacturer.
If you run a smaller manufacturing facility, you may not consider yourself a target for hackers and cyber criminals. The truth is, your operational systems could already be under attack, with no obvious signs of an ongoing information security breach. Learn how to detect cyber attacks that may have already compromised your information systems in the third installment of the five-part MEP National Network “Cybersecurity for Manufacturers” series published in IndustryWeek.
"Do you have a plan of action if your manufacturing infrastructure is attacked by a malicious hacker? Even one cyber attack can be devastating to your bottom line if you don’t act quickly to contain the fallout. Don’t wait to plan your strategy. Learn the essentials of a successful response plan in the fourth installment of the MEP National Network’s five-part series on “Cybersecurity for Manufacturers” published in IndustryWeek."
Recovering from a cybersecurity incident can be a daunting undertaking, especially if you’ve lost information that’s critical to running your manufacturing facility. But you can limit the damage to your company and your reputation by developing a solid recovery plan in advance.
This article is the second installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) Cybersecurity Framework.
This article is the first installment in a five-part series outlining best practices when it comes to "Cybersecurity for Manufacturers." These recommendations follow the National Institute of Standards and Technology (NIST) cybersecurity framework, which has become the standard for the U.S. manufacturing sector.
The best way to fight back against these five threats and others is to implement a formal cybersecurity practice at your company.
This year’s MFG Day is on October 4, 2019, with over 2,000 events already registered on the MFG Day website (www.mfgday.com). While every MFG Day event will be unique in some fashion, there are a few things that every host can do to make the most of this celebration of manufacturing.
Manufacturers at all levels in the Department of Defense (DoD) supply chain must properly handle Covered Defense Information (CDI). If you don’t, you could lose your DoD contracts. To help you determine if your company comes into contact with CDI, here’s a concise definition of the sensitive information and suggestions for how you can approach providing the “adequate security” the DoD mandates.
Recent advances are making robotics implementation accessible to even the smallest manufacturers. Promising improvements to productivity and safety, robotics are not just an option, but could be an essential aspect of any manufacturing company’s future. Determine if robots are the right fit for your business by following these steps to identify your needs, assess your resources, and build a solid business case.
There is a lot of buzz these days in the manufacturing sector about robots — and how they can help manufacturers address some of the challenges they face in today’s market, such as increased productivity and the scarcity of skilled workers.