ILMA Compoundings September 2018 - 14

INDUSTRY RUNDOWN

Virtual Vigilance
The industrial internet of things (IIoT) has been credited
with bringing about the fourth industrial revolution,
often referred to as Industry 4.0. These new "smart factories" connect the supply chain via the cloud and allow
our machinery to "talk" to us, creating a more efficient,
productive, profitable and safer manufacturing process.
However, this connectedness also opens a doorway to
cyberthreats. Many experts echo the same sentiment -
it's not a case of if you will suffer a breach, but when.
You might not think your company will be a target of
attack, but consider that a 2016 study by Deloitte and the
Manufacturers Alliance for Productivity and Innovation
(MAPI) found that errors (or deliberate acts) by employees
pose a significant concern to companies, especially those
firms that are not actively protecting their IP addresses and
do not have procedures to protect against insider threats.
So, how do you protect your company from internal and
external threats? There are four steps you should take.
STRENGTHEN PASSWORDS
Your employees and their weak passwords are a significant
security risk. The sharing of passwords is also common and
is another potential area for risk. You can easily fix these
problems by forcing the reset of weak passwords and setting
up a two-step user-verification process, which reduces the
practice of sharing passwords. If employees are sharing
computers, set up automatic logoff processes to run at specified intervals so that your employees are not inadvertently
working under a co-worker's account.
UPDATE SOFTWARE
It's not unusual to find workstations that are running
obsolete or unsupported versions of the operating system
in manufacturing facilities. In fact, it's quite common.
Unfortunately, this practice is what paved the way for the
widespread success of the WannaCry ransomware attack of
2017, which affected computers in more than 100 countries.
Not only should you be running the latest version of your
computer's operating system, but you should also be updating all the software you are using, from your accounting
programs to your plant systems and everything in between.
Software companies are constantly updating their applications to detect and stop new viruses, but they can't help you
if you are not updating your software.

14

SEPTEMBER 2018

| COMPOUNDINGS | ILMA.ORG

Speaking of detecting viruses, while you're updating your
software, be sure you are running anti-virus software on
all computers, and ensure it is updating and scanning on a
continuous basis.
TRAIN ALL EMPLOYEES ON CYBERSECURITY
AWARENESS
Simply mandating a more robust password procedure or
denying employees the ability to connect personal and
unsecured devices to your network is going to result in a lot
of grumbling. Instead, conduct regular employee training
to explain your security procedures and why they have been
put into place.
One of the most common ways viruses are spread is
through email. Educate your employees on the warning
signs of phishing scams and viruses and the steps they
should take when they suspect a breach.
CONDUCT SECURITY ASSESSMENTS
Not having in-house cybersecurity expertise is no excuse for
leaving your organization open to attack or putting off the
creation of a cybersecurity plan. Do your research and find a
reputable and capable service provider who can conduct a security audit to expose your vulnerabilities, present a plan to secure
your network and provide a system to address future risks.
Cyberattacks do not affect just your operations and
your bottom line; they affect everyone in the supply chain
- including your customers. For the protection of your
company and the industry you serve, it's smart to take steps
to implement these four ideas immediately.


http://www.ILMA.ORG

ILMA Compoundings September 2018

Table of Contents for the Digital Edition of ILMA Compoundings September 2018

LETTER FROM THE CEO
INSIDE ILMA
WHAT’S COMING UP
INDUSTRY RUNDOWN
ROUGH ROAD AHEAD
A BRIEF HISTORY OF BASE OILS
BUSINESS HUB
COUNSEL COMPOUND
WASHINGTON LANDSCAPE
IN NETWORK
PORTRAIT
ILMA Compoundings September 2018 - Cover1
ILMA Compoundings September 2018 - Cover2
ILMA Compoundings September 2018 - 1
ILMA Compoundings September 2018 - 2
ILMA Compoundings September 2018 - LETTER FROM THE CEO
ILMA Compoundings September 2018 - INSIDE ILMA
ILMA Compoundings September 2018 - 5
ILMA Compoundings September 2018 - 6
ILMA Compoundings September 2018 - 7
ILMA Compoundings September 2018 - 8
ILMA Compoundings September 2018 - 9
ILMA Compoundings September 2018 - 10
ILMA Compoundings September 2018 - 11
ILMA Compoundings September 2018 - WHAT’S COMING UP
ILMA Compoundings September 2018 - 13
ILMA Compoundings September 2018 - INDUSTRY RUNDOWN
ILMA Compoundings September 2018 - 15
ILMA Compoundings September 2018 - 16
ILMA Compoundings September 2018 - 17
ILMA Compoundings September 2018 - 18
ILMA Compoundings September 2018 - 19
ILMA Compoundings September 2018 - 20
ILMA Compoundings September 2018 - 21
ILMA Compoundings September 2018 - ROUGH ROAD AHEAD
ILMA Compoundings September 2018 - 23
ILMA Compoundings September 2018 - 24
ILMA Compoundings September 2018 - 25
ILMA Compoundings September 2018 - 26
ILMA Compoundings September 2018 - 27
ILMA Compoundings September 2018 - 28
ILMA Compoundings September 2018 - 29
ILMA Compoundings September 2018 - A BRIEF HISTORY OF BASE OILS
ILMA Compoundings September 2018 - 31
ILMA Compoundings September 2018 - 32
ILMA Compoundings September 2018 - 33
ILMA Compoundings September 2018 - BUSINESS HUB
ILMA Compoundings September 2018 - 35
ILMA Compoundings September 2018 - COUNSEL COMPOUND
ILMA Compoundings September 2018 - 37
ILMA Compoundings September 2018 - WASHINGTON LANDSCAPE
ILMA Compoundings September 2018 - 39
ILMA Compoundings September 2018 - IN NETWORK
ILMA Compoundings September 2018 - 41
ILMA Compoundings September 2018 - 42
ILMA Compoundings September 2018 - 43
ILMA Compoundings September 2018 - PORTRAIT
ILMA Compoundings September 2018 - Cover3
ILMA Compoundings September 2018 - Cover4
https://www.nxtbook.com/ygsreprints/ILMA/G127535ILMA_vol71_no7
https://www.nxtbook.com/ygsreprints/ILMA/G126213ILMA_vol71_no6
https://www.nxtbook.com/ygsreprints/ILMA/G125546_ILMA_vol71_no5
https://www.nxtbook.com/ygsreprints/ILMA/G124996_ILMA_vol71_no4
https://www.nxtbook.com/ygsreprints/ILMA/G123886_ILMA_vol71_no3
https://www.nxtbook.com/ygsreprints/ILMA/G123315_ILMA_vol71_no2
https://www.nxtbook.com/ygsreprints/ILMA/G122980_ILMA_vol71_no1
https://www.nxtbook.com/ygsreprints/ILMA/G121540_ILMA_vol70_no11
https://www.nxtbook.com/ygsreprints/ILMA/G120882_ILMA_vol70_no10
https://www.nxtbook.com/ygsreprints/ILMA/G120035_ILMA_vol70_no9
https://www.nxtbook.com/ygsreprints/ILMA/G121XXX_ILMA_vol70_no8
https://www.nxtbook.com/ygsreprints/ILMA/G120XXX_ILMA_vol70_no7
https://www.nxtbook.com/ygsreprints/ILMA/G119XXX_ILMA_vol70_no6
https://www.nxtbook.com/ygsreprints/ILMA/G118112_ILMA_vol70_no5
https://www.nxtbook.com/ygsreprints/ILMA/G117382_ILMA_vol70_no4
https://www.nxtbook.com/ygsreprints/ILMA/G116888_ILMA_vol70_no3
https://www.nxtbook.com/ygsreprints/ILMA/G115555_ILMA_vol70_no2
https://www.nxtbook.com/ygsreprints/ILMA/G114774_ILMA_vol70_no1
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no12
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no11
https://www.nxtbook.com/ygsreprints/ILMA/g110500_ILMA_vol69_no10
https://www.nxtbook.com/ygsreprints/ILMA/g109884_ILMA_vol69_no9
https://www.nxtbook.com/ygsreprints/ILMA/g109284_ILMA_vol69_no8
https://www.nxtbook.com/ygsreprints/ILMA/g108494_ILMA_vol69_no7
https://www.nxtbook.com/ygsreprints/ILMA/g107507_ILMA_vol69_no6
https://www.nxtbook.com/ygsreprints/ILMA/g106483_ILMA_vol69_no5
https://www.nxtbook.com/ygsreprints/ILMA/g105803_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/g104743_ILMA_vol69_no3
https://www.nxtbook.com/ygsreprints/ILMA/g103647_ILMA_vol69_no2
https://www.nxtbook.com/ygsreprints/ILMA/g102869_ILMA_vol69_no1
https://www.nxtbook.com/ygsreprints/ILMA/g101930_ILMA_vol68_no12
https://www.nxtbook.com/ygsreprints/ILMA/g100836_ILMA_vol68_no11
https://www.nxtbook.com/ygsreprints/ILMA/g99200_ILMA_vol68_no10
https://www.nxtbook.com/ygsreprints/ILMA/g98468_ILMA_vol68_no9
https://www.nxtbook.com/ygsreprints/ILMA/g97711_ILMA_vol68_no8
https://www.nxtbook.com/ygsreprints/ILMA/G96767ILMA_vol68_no7
https://www.nxtbook.com/ygsreprints/ILMA/G95397ILMA_vol65_no6
https://www.nxtbook.com/ygsreprints/ILMA/G94323ILMA_vol68_no5
https://www.nxtbook.com/ygsreprints/ILMA/G93127_ILMA_vol69_no4
https://www.nxtbook.com/ygsreprints/ILMA/G91785_ILMA_vol68_no3
https://www.nxtbook.com/ygsreprints/ILMA/G90956_ILMA_vol68_no2
https://www.nxtbook.com/ygsreprints/ILMA/G89146_ILMA_vol68_no1
https://www.nxtbook.com/ygsreprints/ILMA/G87981_ILMA_vol67_no12
https://www.nxtbook.com/ygsreprints/ILMA/G85409_ILMA_vol67_no11
https://www.nxtbook.com/ygsreprints/ILMA/G83595_ILMA_vol67_no10
https://www.nxtbook.com/ygsreprints/ILMA/G81672_ILMA_vol67_no9
https://www.nxtbook.com/ygsreprints/ILMA/G80238_ILMA_vol7_no8
https://www.nxtbook.com/ygsreprints/ILMA/G79388_ILMA_vol7_no7
https://www.nxtbook.com/ygsreprints/ILMA/G78361_ILMA_vol7_no6
https://www.nxtbook.com/ygsreprints/ILMA/G77448_ILMA_vol7_no5
https://www.nxtbook.com/ygsreprints/ILMA/G75899_ILMA_vol67_no4
https://www.nxtbook.com/ygsreprints/ILMA/G75036_ILMA_vol67_no3
https://www.nxtbook.com/ygsreprints/ILMA/G72720_ILMA_vol67_no2
https://www.nxtbook.com/ygsreprints/ILMA/G72220_ILMA_vol67_no1
https://www.nxtbook.com/ygsreprints/ILMA/G70970_ILMA_vol66_no12
https://www.nxtbook.com/ygsreprints/ILMA/G69813_ILMA_vol66_no11
https://www.nxtbook.com/ygsreprints/ILMA/G67522_ILMA_vol66_no10
https://www.nxtbook.com/ygsreprints/ILMA/G66343_ILMA_vol66_no9
https://www.nxtbook.com/ygsreprints/ILMA/G64859_ILMA_vol66_no8
https://www.nxtbookmedia.com