ILMA Compoundings - Jul/Aug 2021 - 22
sharing your intellectual property with them, " Aquitania said.
" You need to make sure you're selecting the right partner. "
THE RANSOMWARE SOLUTION
Over the past several years, ransomware attacks have risen,
causing alarm and temporarily crippling a wide range of
companies and organizations.
In a ransomware attack, data is held hostage by a remote
third party, which typically demands a payment in cryptocurrency
before returning control of the data to its owners.
Refuse to pay, and the attacker threatens to erase all of the
data on the server. This spring, Wired.com reported that
a number of schools, hospitals, the city of Atlanta, GPS
company Garmin and even the Washington, D.C., police
department have been among those whose data has been targeted
recently. " At this point, no one is safe from the scourge
of ransomware, " wrote reporter Lily Hay Newman. " Over the
past few years, skyrocketing ransom demands and indiscriminate
targeting have escalated, with no relief in sight. "
Such attacks typically gain entry to your server when
someone on your system receives an external email or text
message with a hidden ransomware virus attached.
" If the recipient opens it, it hits the company server, and
suddenly no one can get to their data unless the company pays
WHAT ABOUT BLOCKCHAIN?
" Talk about cybersecurity, and it's
not unusual for the word 'blockchain'
to come up, " said Sean W. O'Donnell,
chairman of Datacor Inc. " Software
created with blockchain technology
is built so that any change to a
record is recorded in multiple places
[across the internet]. Data cannot
be altered without all of those other
multiple places agreeing that it can
be altered. "
Because this approach secures
data against unauthorized manipulation,
blockchain applications have
been growing within the financial
world, where real money is at risk.
To date, they have been less popular
within manufacturing, where data
loss has been more of a concern
a ransom, " O'Donnell explained. " The hacker doesn't want the
data. They just want you to pay to get your data back. "
He pointed out that companies can help to avoid such
situations by better educating employees. " So much of this
comes down to human error, " he said. " Employees need to
be diligent and mindful when it comes to computer use.
Make them aware that if they click on the wrong email, it
could take down your whole business. "
" It's important to have firewalls and filters set up, " Pierre
acknowledged, " but people should also only open emails and
texts from people they know that have legitimate-sounding
subject lines and preview text, if that's available. If you see an
email from a person or company you don't know, treat it carefully.
If you have an IT department, contact them if you have
doubts about a particular email or text. And turn to them for
help in training your employees and distributing information
about new threats and different types of phishing schemes
that could be affecting your employees. "
While some companies believe the only recourse is to pay
the data kidnappers what they demand - a practice that
than data manipulation. However,
Aries Aquitania, vice president of
sales for Olyslager North America,
believes a shift is coming.
" Blockchain technology is becoming
more relevant, especially as more
advancements are coming to the fore, "
he said. " Personally, I think we are on
the cusp of something revolutionary.
The sooner companies look into
this technology - the sooner they
embrace these changes - the more
they can benefit. Blockchain technology
is very promising. There are
companies out there that are working
toward making supply chain more
transparent, more secure and more
efficient. " Blockchain technology, he
believes, will play a significant role.
The revolution won't happen
overnight, though. Blockchain is not
something that can be cobbled onto
existing systems or simply added to
provide another layer of protection;
applications must be coded from the
ground up using blockchain technology.
That takes time and a financial
investment from developers, which
may be slow to come without a
definable market base willing to
embrace - and pay for - the
resulting applications.
Aquitania believes manufacturers
will get on board with this next
phase of data security. " I see a
very exciting future for blockchain
technology, " he said.
22
JULY/AUGUST 2021 | COMPOUNDINGS | ILMA.ORG
http://www.Wired.com
http://www.ILMA.ORG
ILMA Compoundings - Jul/Aug 2021
Table of Contents for the Digital Edition of ILMA Compoundings - Jul/Aug 2021
ILMA Compoundings - Jul/Aug 2021 - Cover1
ILMA Compoundings - Jul/Aug 2021 - Cover2
ILMA Compoundings - Jul/Aug 2021 - 1
ILMA Compoundings - Jul/Aug 2021 - 2
ILMA Compoundings - Jul/Aug 2021 - 3
ILMA Compoundings - Jul/Aug 2021 - 4
ILMA Compoundings - Jul/Aug 2021 - 5
ILMA Compoundings - Jul/Aug 2021 - 6
ILMA Compoundings - Jul/Aug 2021 - 7
ILMA Compoundings - Jul/Aug 2021 - 8
ILMA Compoundings - Jul/Aug 2021 - 9
ILMA Compoundings - Jul/Aug 2021 - 10
ILMA Compoundings - Jul/Aug 2021 - 11
ILMA Compoundings - Jul/Aug 2021 - 12
ILMA Compoundings - Jul/Aug 2021 - 13
ILMA Compoundings - Jul/Aug 2021 - 14
ILMA Compoundings - Jul/Aug 2021 - 15
ILMA Compoundings - Jul/Aug 2021 - 16
ILMA Compoundings - Jul/Aug 2021 - 17
ILMA Compoundings - Jul/Aug 2021 - 18
ILMA Compoundings - Jul/Aug 2021 - 19
ILMA Compoundings - Jul/Aug 2021 - 20
ILMA Compoundings - Jul/Aug 2021 - 21
ILMA Compoundings - Jul/Aug 2021 - 22
ILMA Compoundings - Jul/Aug 2021 - 23
ILMA Compoundings - Jul/Aug 2021 - 24
ILMA Compoundings - Jul/Aug 2021 - 25
ILMA Compoundings - Jul/Aug 2021 - 26
ILMA Compoundings - Jul/Aug 2021 - 27
ILMA Compoundings - Jul/Aug 2021 - 28
ILMA Compoundings - Jul/Aug 2021 - 29
ILMA Compoundings - Jul/Aug 2021 - 30
ILMA Compoundings - Jul/Aug 2021 - 31
ILMA Compoundings - Jul/Aug 2021 - 32
ILMA Compoundings - Jul/Aug 2021 - 33
ILMA Compoundings - Jul/Aug 2021 - 34
ILMA Compoundings - Jul/Aug 2021 - 35
ILMA Compoundings - Jul/Aug 2021 - 36
ILMA Compoundings - Jul/Aug 2021 - 37
ILMA Compoundings - Jul/Aug 2021 - 38
ILMA Compoundings - Jul/Aug 2021 - 39
ILMA Compoundings - Jul/Aug 2021 - 40
ILMA Compoundings - Jul/Aug 2021 - Cover3
ILMA Compoundings - Jul/Aug 2021 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com