Be careful on the Web

Aug. 29, 2011

Of all the activity taking place on the Web, especially with social networks such as Facebook, and so many others, we've come to accept that personal privacy is vanishing rapidly. Embarrassing items posted out there certainly don't have any automatic self-destruct features and, therefore, will probably persist online to dog your steps while you're here and long after you've left this mortal realm.

Of all the activity taking place on the Web, especially with social networks such as Facebook, and so many others, we've come to accept that personal privacy is vanishing rapidly. Embarrassing items posted out there certainly don't have any automatic self-destruct features and, therefore, will probably persist online to dog your steps while you're here and long after you've left this mortal realm.

While that fact might not have an immediate connection to the industrial world, many plants might have a communication system or two that are dependent on the existence of that Web for their functionality. Merely being connected to the Internet, even through a robust firewall, might have a bit of a downside if some nefarious person also is sufficiently clever.

You’ve heard the many news items about hackers getting into the computers of unsuspecting corporate systems, perhaps causing them the crash after successfully stealing important private personal data.

Researchers at Georgia Tech are trying to come to the rescue. “Tackling Global Cybersecurity Threats,” an article by Abby Robinson, discusses the many varieties of attacks that can be waged against unsuspecting systems. You’ll find the article on page 6 of the PDF that opens in your browser.

Have you heard of something called drive-by download? It happens when you’re enticed to visit some website you’ve not heard of before. The malicious software infects your machine undetected. According to Robinson, the most numerous “drive-by download exploits included Adobe Acrobat Reader, Sun Java and Adobe Flash.” And, for the truly paranoid, your cell phone also can be a target.

You might want to pass this information to your trusty IT department. Meanwhile, take care when you’re online. Sometimes there’s no backtracking allowed.

Sponsored Recommendations

Enclosure Climate Control: Achieving the Ideal Temperature

March 28, 2024
There are several factors to consider when optimizing the climate inside your electrical enclosure. Download this white paper to learn more.

Find the ideal enclosure cooling solution for your application

March 28, 2024
Use the Climate Control Quickfinder tool to find the ideal climate control solution for your application in just three easy steps.

Smart Cooling Solutions: Reduce Your Energy Consumption with Advanced Technology from Rittal

March 28, 2024
Wall extension cooling units for external or internal mounting in doors and walls using standardized mounting cut-outs. Cooling output 0.3 – 5.8 kW. Also available in energy-efficient...

Arc Flash Prevention: What You Need to Know

March 28, 2024
Download to learn: how an arc flash forms and common causes, safety recommendations to help prevent arc flash exposure (including the use of lockout tagout and energy isolating...