ILMA Compoundings - Jul/Aug 2021 - 21

People might be the weakest link for your cybersecurity,
but they are also your first line of defense. It is vital to have
the right people working for you. " You need to know your
team to the extent that you trust their ability to safeguard
the information under their control, " Pierre said. " Have
the right policies in place that both ensure you're hiring the
right people and establish guidelines for confidentiality and
data security. "
Those same guidelines also should apply when working
with outside partners. " If you share your blend for manufacturing
purposes - say, to expand your capacity - it's
important to be extremely diligent in how you select those
partners, to make sure they also will protect the information
you share with them, " he added.
THE BEST DEFENSE
After employee training in data security, protect the data itself
with appropriate security systems, antivirus and anti-malware
software, and secure processes, Aquitania advised. Perhaps the
most important step of all, though, is to establish procedures
for regularly and frequently backing up your data.
" People get into trouble when they're not diligent about their
He added, " Companies need to make sure that access to
certain platforms or subscriptions are disabled when people
leave companies or organizations, to make sure colleagues
can no longer access sensitive info after they leave. "
O'Donnell pointed out that data protection also includes
establishing processes that make it difficult for, say, your
salespeople to go to a competitor, access your customer
list, print it out and hand it over. " Today, with our current
customer-relationship management (CRM) systems and the
ability to download data onto your own computer, that's a
real risk, " he said. " The CRM is going to include customers,
pricing, transaction history - everything that makes it
possible to service that customer well. "
Taking basic security even further, he said, " Train people
to sign out if they need to walk away from their terminals.
If sensitive information is left up on the screen, it can be
seen - and stolen - by plant visitors, delivery people and
anyone else just walking by. Little, practical things like that
are part of the whole cybersecurity plan. "
backup processes, " O'Donnell observed. " Maybe people think
they're being backed up, but they don't pay attention to it -
especially in smaller companies, where the IT person could be
the office manager, the general manager or somebody else who's
wearing a bunch of other hats. It's a background process, so
they assume it's happening in the background. And then there's
a problem - and it turns out the backups are three months
old. It's really important that companies pay attention to what
their processes are and that they have the right things in place
to protect themselves. A diligent backup can save you a lot of
headaches and a lot of money. "
It has been said by some computer industry insiders that
if your data does not exist in three different places, it doesn't
exist at all. In other words, a single backup is insufficient to
ensure data integrity. O'Donnell believes that kind of " belt
and suspenders " approach may be overkill for manufacturers,
who must balance the value of data protection with the
associated costs of multiple backup streams and the time,
knowledge and infrastructure required.
Because of this, some companies contract with a serverhosting
service. " Third-party server-hosting services, like Amazon's
AWS, for instance, include a lot of monitoring services
and may have a whole security team making sure that only the
right people are coming into their servers, " O'Donnell said.
" But you pay for that kind of service and protection. "
In addition, manufacturers still need to be diligent in
how they vet and work with such a service. " If they're hosting
your data, your website and so on, you are potentially
21

ILMA Compoundings - Jul/Aug 2021

Table of Contents for the Digital Edition of ILMA Compoundings - Jul/Aug 2021

ILMA Compoundings - Jul/Aug 2021 - Cover1
ILMA Compoundings - Jul/Aug 2021 - Cover2
ILMA Compoundings - Jul/Aug 2021 - 1
ILMA Compoundings - Jul/Aug 2021 - 2
ILMA Compoundings - Jul/Aug 2021 - 3
ILMA Compoundings - Jul/Aug 2021 - 4
ILMA Compoundings - Jul/Aug 2021 - 5
ILMA Compoundings - Jul/Aug 2021 - 6
ILMA Compoundings - Jul/Aug 2021 - 7
ILMA Compoundings - Jul/Aug 2021 - 8
ILMA Compoundings - Jul/Aug 2021 - 9
ILMA Compoundings - Jul/Aug 2021 - 10
ILMA Compoundings - Jul/Aug 2021 - 11
ILMA Compoundings - Jul/Aug 2021 - 12
ILMA Compoundings - Jul/Aug 2021 - 13
ILMA Compoundings - Jul/Aug 2021 - 14
ILMA Compoundings - Jul/Aug 2021 - 15
ILMA Compoundings - Jul/Aug 2021 - 16
ILMA Compoundings - Jul/Aug 2021 - 17
ILMA Compoundings - Jul/Aug 2021 - 18
ILMA Compoundings - Jul/Aug 2021 - 19
ILMA Compoundings - Jul/Aug 2021 - 20
ILMA Compoundings - Jul/Aug 2021 - 21
ILMA Compoundings - Jul/Aug 2021 - 22
ILMA Compoundings - Jul/Aug 2021 - 23
ILMA Compoundings - Jul/Aug 2021 - 24
ILMA Compoundings - Jul/Aug 2021 - 25
ILMA Compoundings - Jul/Aug 2021 - 26
ILMA Compoundings - Jul/Aug 2021 - 27
ILMA Compoundings - Jul/Aug 2021 - 28
ILMA Compoundings - Jul/Aug 2021 - 29
ILMA Compoundings - Jul/Aug 2021 - 30
ILMA Compoundings - Jul/Aug 2021 - 31
ILMA Compoundings - Jul/Aug 2021 - 32
ILMA Compoundings - Jul/Aug 2021 - 33
ILMA Compoundings - Jul/Aug 2021 - 34
ILMA Compoundings - Jul/Aug 2021 - 35
ILMA Compoundings - Jul/Aug 2021 - 36
ILMA Compoundings - Jul/Aug 2021 - 37
ILMA Compoundings - Jul/Aug 2021 - 38
ILMA Compoundings - Jul/Aug 2021 - 39
ILMA Compoundings - Jul/Aug 2021 - 40
ILMA Compoundings - Jul/Aug 2021 - Cover3
ILMA Compoundings - Jul/Aug 2021 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com