Be careful on the Web

Aug. 29, 2011

Of all the activity taking place on the Web, especially with social networks such as Facebook, and so many others, we've come to accept that personal privacy is vanishing rapidly. Embarrassing items posted out there certainly don't have any automatic self-destruct features and, therefore, will probably persist online to dog your steps while you're here and long after you've left this mortal realm.

Of all the activity taking place on the Web, especially with social networks such as Facebook, and so many others, we've come to accept that personal privacy is vanishing rapidly. Embarrassing items posted out there certainly don't have any automatic self-destruct features and, therefore, will probably persist online to dog your steps while you're here and long after you've left this mortal realm.

While that fact might not have an immediate connection to the industrial world, many plants might have a communication system or two that are dependent on the existence of that Web for their functionality. Merely being connected to the Internet, even through a robust firewall, might have a bit of a downside if some nefarious person also is sufficiently clever.

You’ve heard the many news items about hackers getting into the computers of unsuspecting corporate systems, perhaps causing them the crash after successfully stealing important private personal data.

Researchers at Georgia Tech are trying to come to the rescue. “Tackling Global Cybersecurity Threats,” an article by Abby Robinson, discusses the many varieties of attacks that can be waged against unsuspecting systems. You’ll find the article on page 6 of the PDF that opens in your browser.

Have you heard of something called drive-by download? It happens when you’re enticed to visit some website you’ve not heard of before. The malicious software infects your machine undetected. According to Robinson, the most numerous “drive-by download exploits included Adobe Acrobat Reader, Sun Java and Adobe Flash.” And, for the truly paranoid, your cell phone also can be a target.

You might want to pass this information to your trusty IT department. Meanwhile, take care when you’re online. Sometimes there’s no backtracking allowed.

Sponsored Recommendations

A Paradigm Shift in Pump Selection

Jan. 22, 2025
Discover how INNOMAG® is transforming pump selection with innovative design and unparalleled performance. Learn how this breakthrough solution simplifies operations, enhances ...

The Need for Speed: The Most Advanced Sealless Pump is Also the Fastest

Jan. 14, 2025
Struggling with a troublesome pump? Get a reliable solution in just five days with the fastest, most advanced sealless pump on the market.

Say Goodbye to Pumping’s Weakest Links

Jan. 14, 2025
Shaft seals and ball bearings cause nearly 80% of pump failures—but not with INNOMAG®. With no seals, no bearings, and a thrust-balanced design, these pumps deliver unmatched ...

Ready to Reduce the Cost of Energy with a Highly Efficient, More Forgiving Pump?

Jan. 14, 2025
INNOMAG® pumps save energy and maintain peak efficiency over time—no wear and tear. Discover how they can lower your operating costs and increase reliability.