All posts tagged cybersecurity

Cybersecurity

New Video on MHI View: Cybersecurity Best Practices

Security is essential to any business. People don’t question security precautions for the people, building, or machines in an organization. But what about your data? Learn more about cybersecurity best practices and the steps you can take to secure your […]

Cybersecurity

HIGHER EDUCATION: Cybersecurity and Its Implication on Material Handling and Supply Chains

Content was pulled from MHI Solutions Magazine Q4.2018 Cybersecurity is the ability to prevent, defend against and recover from disruptions caused by cyberattacks from adversaries. Cyberattacks have been classified as passive attacks and active attacks. Passive attacks are difficult to […]

cybersecurity

Hacking: It Can Happen to You

Content was pulled from MHI Solutions Magazine Q4.2018 A cyberattack can happen to anyone and any company—even if you have cybersecurity programs in place. Hackers don’t just target big multi-national firms nor do they discriminate based on industry. Everyone is […]

Creating Resilient Supply Chains

By Mary Lou Jay for MHI Solutions Ever since the 2011 Japanese tsunami shut down much of Toyota’s parts and manufacturing capabilities, logistics managers have been looking more closely at the vulnerabilities in their own supply chains and searching for […]

Security & Supply Chain: How Secure is your Cloud Data?

by Sterling J. Scott, Marketing Communications Coordinator, MHI | @mhi_sterling With more and more businesses using cloud storage and cloud-based applications, there is a greater risk for cybersecurity threats. There are many businesses using highly-secured cloud services; however, there are many who […]

Shipping and the supply chain may be the next to face the threat of cyber attacks

by Carol Miller, MHI VP of Marketing and Communications U.S. maritime ports handle more than $1.3 trillion in cargo annually. The operations of these ports are supported by information and communication systems, which are susceptible to cyber-related threats. Failures in these […]

1 2 3