View All Cybersecurity
While innovations can help food processing facilities run smoothly, they can also leave them vulnerable to data breaches and cyberattacks. Four tips for preventing breaches are highlighted.
Explore the qualities and benefits of zero trust, principle of least privilege and other methods of improving cybersecurity. Four key technologies and security concepts are highlighted.
A focus on the spectrum of insider threats against industrial control systems (ICS) and how they specifically relate to industrial environments
Current methods of defending critical energy infrastructure from multi-stage, cyber-physical threats remain largely dependent upon human intervention and compartmentalized monitoring with an emphasis on prevention.
Digitalization and AI bring opportunities for robots, but also a degree of cybersecurity risk as more data is gathered and processed all the way from the edge to the cloud and beyond.
Today’s industrial networks are intelligent and robust, which is a stark change from what they were even a few years ago. Some of these changes and advances are highlighted.
With more remote connections to industrial plants and facilities, risk of cybersecurity breaches has increased. What risk mitigation is in place?
For modern industrial control systems (ICSs), cybersecurity involves technologies and user best practices. Four cybersecurity fundamentals are highlighted.
Analysis of past attacks in the throwback attack series, attacks on operational technology assets, industrial malware, industrial ransomware and physical plant damage beyond computers are among leading topics of industrial cybersecurity interest in 2021.
Articles about cybersecurity and resilience in manufacturing, decoding your motor's nameplate, maximizing plant efficiency, and more were Plant Engineering’s five most clicked articles from Jan. 3-9, 2022. Miss something? You can catch up here.
Having an OT/IT convergence strategy is essential to OT cybersecurity.
ICS security programs need to be evaluated periodically; the evaluation process should be formalized and repeatable.
Bridging the gaps between information technology (IT) and operational technology (OT) can improve performance on the floor and reduce risks to operations.
Many cybersecurity steps are simple, but they must be done
The history of industrial information technology (IT) set the stage for the Industrial Internet of Things (IIoT) and digital transformation; keep it safe with cybersecurity best practices.
Manufacturers should take time to delve deeper into the needs and goals of the organization while considering associated risks.
A power service company and system integrator collaborated to merge information technology (IT) and operational technology (OT) to create a secure platform for the power service company’s operations in Chile.
As the IT and OT worlds continue to overlap, take time to prepare your team for the impact of IT security on OT applications.
By applying information technology (IT) strategies and organization, operational technology (OT) can monitor and manage cybersecurity measures more efficiently.
The rise of Industry 4.0 means there are greater cybersecurity risks and manufacturers and engineering sectors need to take a hard look at what they can do to keep their new systems safe.
Best practices manufacturers can implement to better secure their network in many ways. Five levels of cybersecurity are highlighted.
Articles about tackling overall equipment effectiveness to improve manufacturing operations, differences between NEMA and IEC electric motors, and more were Plant Engineering’s five most clicked articles from Oct. 25-31, 2021. Miss something? You can catch up here.
Securing operational technology (OT) networks for resiliency against cyberattacks requires coordination between information technology (IT) and OT personnel, and recognition of the differences between the two domains
Cybersecurity experts offer advice and best practices on information technology/operational technology (IT/OT) convergence and how manufacturers can prepare themselves for challenges.
The Fortinet OT Symposium, Energy Day, on Aug. 31, provided expert advice and best practices on how to secure the future of industrial controls in the energy sector.
The EU Machinery Directive machinery covers not only physical components as well as digital components and software.
Having realistic expectations of addressing a threat and knowing how to respond in an emergency in an efficient way are essential.
The cybersecurity maturity model certification and NIST SP 800-171 Department of Defense (DoD) Assessment explained.
Cybersecurity vulnerabilities and intrusions pose major risks to the Department of Defense (DoD) and its supply chain which is why the DoD is requiring compliance to CMMC
Provisions within the American Jobs Plan could improve critical infrastructure cybersecurity, but it's the first in many steps needed to make the nation safer from cyber attacks.
Cybersecurity attacks against manufacturers and other industrial sites are growing and companies need to develop a cybersecurity plan that protects industrial PCs and other vulnerable targets that, until recently, were not connected to the internet.
Reduce the risk of ransomware attacks on OT/ICS systems by following these prevention tips
IEC 62443 can hold the answer to enhancing cyber resilience for manufacturers and smart factories as it aims to mitigate risk for industrial communication networks by providing a structured approach to cybersecurity.
Having a robust strategy, building organizational engagement, and more importantly and realizing operational excellence are keys to cybersecurity management success.
It's critical to realize the importance of cybersecurity in food and beverage manufacturing, an infrastructure that is often over looked.
Developing a strong cyberattack incident response plan requires a thorough examination of everything from building a response team to actually testing out the plan and ensuring it works.
A government-sponsored test on whether a cyberattack could inflict real-world physical damage has had major repercussions to this day. See eight steps on how to mitigate a potential cyberattack against your industrial control systems (ICSs).
The SolarWinds cybersecurity attack has had far-reaching effects in many different ways and it will change how operational technology (OT) handles cybersecurity threats.
Pacific Northwest National Laboratory (PNNL) created a cybersecurity guidance report for marine renewable energy (MRE) devices to help improve MRE’s resiliency as a reliable source of renewable energy.
Articles about spare part inventory for maintenance organizations, how hyperautomation can help manufacturers, and how to resolve a conflict before it manifests itself were Plant Engineering’s five most clicked articles from April 12-18, 2021. Miss something? You can catch up here.
Digital transformation can change manufacturing, but companies need to invest in cybersecurity knowledge and training to make it viable.
Industrial control systems require secure remote connections. Did the pandemic help IT to understand OT needs and help OT to see IT concerns about cybersecurity and remote access?
Industrial Cybersecurity Pulse is a new website dedicated to educating and informing engineers about the latest challenges and developments relating to cybersecurity, information/operational technology (IT/OT), the cloud and more. Check it out!
Below are more answers resulting from a cybersecurity webcast on cybersecurity architectures, training, best practices, risk assessment and trends based on research.
Information technology strategies can help combat new cybersecurity vulnerabilities and deploy a solid cybersecurity program for operational technology use for industrial control systems, remote terminal units, supervisory control and data acquisition systems, as Industrial Internet of Things deployments increase.
Cybersecurity often is the catalyst for control system modernization, and industrial and critical infrastructure sector projects increasingly specify automation products and systems that are designed as cybersecure.
Manufacturing's resilience has been strong during the COVID-19 pandemic, and cybersecurity needs to be stronger than ever as the nature of work changes.
The Industrial Internet of Things (IIoT) will have the strongest impact on operational technology/industrial control system (OT/ICS) cybersecurity.
The inability to stop production and a bureaucratic approval process are the main barriers that inhibit industrial cybersecurity projects according to a report by Kaspersky.
Regardless of how companies buffer supply chain gaps, they need to be cybersecure.
Businesses need to be ready to pick up where they left off when it comes to enhancing physical security measures in the wake of COVID-19.
System integrators need to ensure that their automation systems are IEC 62443-compliant to adhere to international cybersecurity requirements.
There are several preventive measures that can be taken to secure industrial processes against cyber attacks.
It’s hard to know how much cybersecurity spending is enough to lower risk to an acceptable level. What is enough and what else is needed? A cybersecurity risk assessment (CRA) can help. Four tips are highlighted.
More workers are forced to work remotely due to COVID-19, but cybersecurity prevention and training is lagging behind.
Forward-looking organizations realize they need the same level of aggressiveness to protect assets as they have done for COVID-19 risk reduction. A three-pronged strategy on securing essential infrastructure is highlighted.
The Fourth Industrial Revolution has brought innovation and advanced technology, but it has also made these systems increasingly vulnerable. Industrial-grade cybersecurity is recommended.
More than 70% of industrial control system (ICS) vulnerabilities disclosed in the first half of 2020 can be exploited remotely according to a report by Claroty.
Phishing assaults are becoming increasingly targeted, and the COVID-19 pandemic is one of many ways hackers are exploiting people and small companies.
Virtual private network (VPN) implementations that give remote access to operations technology (OT) networks have received more focus due to COVID-19 since more people are working remotely.
Secure remote access (SRA) is being used to help companies survive and thrive during the COVID-19 pandemic, but there are some new challenges that need to be considered. See 10 remote access best practices.
COVID-19 cyber attacks are on the rise according to researchers, and they are getting very sneaky in their methods.
Researchers warn smart manufacturing users and security professionals to be aware of advanced hackers.
The amount of distributed denial of service attacks (DDoS) rose at the beginning of this year primarily on education and municipal sites.
Expectations for workers are changing due to the pandemic. Even after they return to work, it's going to be different, and companies need to adjust to this and ensure their workers are cyber-secure.
Google and Apple unveiled a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of COVID-19 while protecting user privacy.
Information technology (IT) and operational technology (OT) are continuing the process of working together, but non-manufacturing types need more understanding and context of what is happening on the plant floor for this merger to work.
A researcher at the University of Arkansas is leading a project to invest in new projects that will lower solar electricity costs, while also making solar systems more resilient to cyberattack.
ASIS International and the Security Industry Association have partnered to help in the coronavirus recovery and rebuilding efforts. The primary focus areas will begin with business operations and advocacy, and content development and coordination.
Cyber criminals are taking advantage of COVID-19 forcing the majority of employees forced to work remotely. Europol published an updated threat assessment after monitoring the impact of coronavirus and cybercrime.
With many employees working remotely, there is a rise in COVID-19 themed email phishing scams. Follow these suggested tips to keep companies safe.
It's crucial to recognize the possible threat from a supply chain risk and understand best practices to avoid them.
Employees working from home need to be vigilant about phishing campaigns using COVID-19 related content to find gaps and organize cyberattacks.
Because of the coronavirus pandemic, more people are working remotely to avoid getting sick. Consider these five tips to make sure your cyber hygiene is as strong as your physical hygiene.
Companies are starting to offer protected remote access at no cost in response to the large number of employees working remotely due to coronavirus.
With a large influx of people working remotely due to COVID-19, cybersecurity is becoming a topic of concern for employers and their employees.
Good cybersecurity hygiene is needed as more employees move toward working out of their homes in the wake of the coronavirus pandemic.
The coronavirus disease (COVID-19) is being used as bait in email spam attacks on targets around the globe by using the promise of information or a cure to fool people.
Ransomware and cyber attacks are increasing against manufacturers. Some are trying to understand more about the people behind them and their motives, which are not always clear.
Manufacturers are realizing the potential dangers from cyber attacks, but that is the first step in the process. Learn how companies are trying to combat this growing problem and what more they can do.
Wayne State University researchers have developed a process designed to enhance cybersecurity of chemical process control systems.
The National Institute of Standards and Technology (NIST) is working on a publication designed to reduce cybersecurity risks to the supply chain.
Utilities need to embrace a risk-based approach to cybersecurity to match the existing basic-level of compliance. See four issues utilities are currently facing.
Cybersecurity is critical as information technology (IT) and operations technology (OT) converge, which is the first step in making the transition between the two sides almost seamless.
The distinction between digital and physical cybersecurity is vanishing, and the risks associated with connectivity have accelerated the need for new security protections in all aspects of manufacturing.
The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.
Protecting industrial automation systems is easier when controllers offer built-in cybersecurity features.
A solid access control plan can reduce the complexity in securing these critical spaces and protect a manufacturing facility and reduce potential theft as well as overall costs.
The University of Arkansas received a five-year, $4.63 million award from the National Science Foundation to recruit, educate and train the next generation of cybersecurity professionals.
Emerging condition monitoring software and devices have ingrained cybersecurity that helps bring legacy systems and processes into the modern era.
The International Society of Automation (ISA) named the founding members of its Global Cybersecurity Alliance (GCA): Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks.
A report from Applied Risk found that cybersecurity basics are still not being practiced by many companies, which is increasing their risk for potential attacks as untested technologies continue proliferating critical infrastructures.
Researchers at Georgia Tech have discovered that side channel signals and bolts of lightning from distant storms could one day help prevent hackers from sabotaging electric power substations and other critical infrastructure.
Cybersecurity in the robotics field is still immature, but manufacturers are starting to realize the vulnerability that connected robots and automation equipment creates in their operations.
Cybersecurity: Improving evaluation and certification methods, security audits, and testing provide a foundation for evaluating Industrial Internet of Things (IIoT) devices.
Technology update: Cybersecurity remains a key concern for manufacturing and process facilities as explained in the media session at ARC Forum 2019.
Cybersecurity is a major concern during digital transformation and companies should be asking plenty of questions about how prepared everyone is.
Sixnet’s new industrial serial to Ethernet device servers (Models ET-DS-1 and ET-SDS-1) connect serial-based software applications over Ethernet to remote industrial serial devices. The two models offer real-time secure performance including an auto-detecting 10/100 RJ45 Ethernet port and a universal EIA-RS232/422/485 Serial port for serial data tunneling across an IP network.
Honeywell research finds exposure through portable USB drives can cause serious disruption to process facilities through unsecure or malicious files.
Front-end loading (FEL) offers advantages for planning and budgeting
MHI study cites three barriers to digital supply chain adoption, but a majority of companies already use the technology.
Cybersecurity, maintenance, and robotics are among the most discussed topics in manufacturing, and those topics will be the focus at the 2018 Global Automation and Manufacturing Summit (GAMS).
Aon’s Chad Pinson talks about how manufacturing must react to growing threats .
Maturity Index helps manufacturer create a roadmap for the future.
The focus of this year's ARC Advisory Group;s annual conference will be the digital transformation of manufacturing.
Co-founder and Chief Business Development Officer, Claroty, New York
Whitepaper: How digitalization is changing the face of cyber security.
ARC’s Andy Chatha sees machines getting smarter, and plant management needs to follow suit to match this trend.
Top 5 Plant Engineering articles, September 7-13: Maintenance and the IIoT, skilled workers and apprenticeships, manufacturing maintenance practices, more
Articles about maintenance and the IIoT, apprenticeships and skilled workers, world-class manufacturing maintenance, predicting equipment lifecycle, and optimizing electrical systems were Plant Engineering’s five most-clicked articles from last week, September 7-13. Were you out last week? Miss something? You can catch up here.
IIoT experts say emerging manufacturing models will change plant processes.
The C-more HMI configuration software version 6.0 delivers more functionality, more usability and more value.
After almost a decade of uncertainty, the confidence of plant floor managers is soaring. Even with a number of challenges and while implementing new technologies, there is a renewed sense of optimism among plant managers about their business and their future.
Connectivity improvements are poised to transform manufacturing
Foreign Policy Magazine's recent examination of "The Looming Robotics Gap" by University of Pennsylvania international relations associate professor Michael C. Horowitz, and a recent Pentagon insider on national security issues, is an up-to-date review of the worldwide state of military robotics.
Security is becoming mainstream as 93% of companies globally are maintaining or increasing their investment in cyber security to combat the ever increasing threat from attacks, a new survey said.
Two Republican senators urged the Environmental Protection Agency (EPA) to reconsider its methods of calculating methane emissions from natural gas operations.
The unspoken knowledge shared by cyber security analysts could convert into an automated tool that helps analysts strengthen their cyber defenses.
Malware striking systems may be more prevalent than suspected as 57% of malware analysts working on enterprise-related data breaches have addressed security problems that U.S. firms failed to disclose, a new survey said.
No industrial control system can ever be 100% secure, that is a given, but a manufacturer has to understand the threat and know how far they want to go and still remain confident they can withstand the inevitable attack.
IMS Research reports that Milestone Systems and Genetec were the No. 1 suppliers in the VMS market, which is expected to expand in EMEA and China in future years.
A survey, completed primarily at the end user management level, solidifies trends seen in many IHS studies over the last 12 months.
Indoor air quality: Food redistributor overcomes high ceiling and high energy costs to better manage heat
Following these seven tips can help you spot counterfeit products and keep your workers and plant safe from potential hazards
The storage capacity of concentrating solar power (CSP) can add significant value to a utility’s optimal mix of energy sources, a new report said.
U.S. intelligence officials have warned as nation-sponsored cyber warfare goes mainstream this year, attacks on U.S. installations and institutions could result not just in damage and theft but in fatalities.
The National Research Council and Department of Homeland Security have concluded that electric grids are vulnerable to cyberterrorism and the damage would be far more catastrophic than natural disasters like the recent Hurricane Sandy in October 2012.
Hackers are using knowledge about their intended targets to predict the websites they visit and seize private information
Eaton expert cites dangers to employees, economy from fake products
Finalists in the Energy Management category for the Plant Engineering 2012 Product of the Year competition
Cyber security is a major issue for utilities because of the potential vulnerabilities, the investments and the risks. The big questions always stares everyone straight in the face: Will the security actually work?
In case anyone was wondering, air gaps don’t exist.
A disaster may never occur, but it is nice to know if one does, a system is in place to take on whatever elements present themselves.
Hospitality, commercial and manufacturing and industrial are the fastest growing verticals for access control equipment in Latin America.
Flow of manufacturing jobs between China and the West to equalize.
There is a need for improved cyber security for industrial networks, all security professionals know this. After all, the whole industrial automation world was stunned by the sudden appearance of Stuxnet in 2010.
The 2012 Middle East Market for CCTV and Video Surveillance Equipment report by IMS forecasts that the market in Saudi Arabia will grow strongly to overtake that of the United Arab Emirates to become second largest in the region.
IMS Research has just published the ninth edition of its World Market for CCTV and Video Surveillance Equipment report. The 2012 edition forecasts that despite the weak and uncertain economic climate, the world market for video surveillance equipment will grow in excess of 12% in 2012.
A new report from IMS Research has found that almost 40% of North American security systems integrators would prefer to deal with IT distributors when purchasing their IP-based video surveillance products.
Security experts are blaming cloud computing providers for giving cyber criminals the tools to launch attacks more easily, efficiently and anonymously than ever before.
Wen cites challenges, concedes China has ‘a long way to go’ on manufacturing quality
Reports provide insight into the key trends in the security industry, helping security integrators understand technology challenges, the competitive landscape and growth opportunities.
PowerSure CM Series
Criminal and malicious attacks accounted for 37% of corporate data breaches in 2011, a 6% rise from 2010, a new study said.
Visunet IND SlimLine Operator Workstations have received Zone 2 certification for use in hazardous environments
Cyber security legislation that would update laws that govern how the federal government secures its information systems as well as help safeguard vital private networks that American society depends on hit the Senate last week.
Cloud computing will keep increasing as the demand for computing power increases.
It is not surprising because of short staffing, but when it comes to planning for the worst, small businesses don’t even come close to being able to tackle a serious dilemma.
A variant of the Sykipot Trojan Horse is able to hijack U.S. Dept. of Defense (DoD) smart cards in order to access restricted resources.
Software provider sees a more flexible, dynamic supply chain process
Over the past few years I’ve witnesses many changes in the access control industry. The question that immediately comes to my mind is if changes began to take place during a downturn where budgets were tight, how will the market look in three or four years?
The new era of Ethernet and wireless networking in industrial applications has increased security concerns to an all time high, and for good reason.
When VCA was first introduced, its capabilities were often oversold. As the technology did not always live up to expectations, some customers became dissatisfied and this created negative publicity. There was a general perception that VCA did not work as well as it should.
Finalists in Productivity Training Software in Plant Engineering’s 2011 Product of the Year competition
A new report details trends that may lead to improvements that will help to protect a system from attack.
The United States and India signed a Memorandum of Understanding to foster closer cooperation and timely exchange of information between their respective government organizations responsible for cyber security
Talk is starting to actually move to action as companies are beginning to make a big push to really make the Smart Grid a secure reality. Sensus, the Raleigh, NC-based company, recently incorporated encryption and key management technologies from IBM
This week’s riots in London have shown that there is a limit to what electronic security can do: at some point you’ll need a pair of boots and a truncheon. But even then there have been complaints about ineffective deployment of the police; being in the wrong place at the wrong time.
If end users were not frightened before the Siemens 2011 Automation Summit, they are now as cyber security took center stage.
The grid security exercise will test NERC and the electricity industry’s crisis response plans and validate current readiness in response to a cyber incident.
There are intended and unintended hits, or attacks, on control systems and if you believe what one study says, 20% are intentional and 80% unintentional.
Two security experts at the 2011 Siemens Automation Summit talked about lessons learned during the Stuxnet affair.
This is an explosive new age of industrial productivity and with that brings a bigger risk for cyber attackers to hit manufacturers.
Exxon Mobil took twice as long as it said it did to fully seal a pipeline that spilled 1,000 barrels of crude oil into the Yellowstone River, according to federal documents.
Web tool to help users determine whether injuries and illnesses are work-related and recordable under the OSHA Recordkeeping rules
Bill aims to change federal law to help improve U.S. oversight of workplace safety and health.
Propane-fueled forklifts maintain consistent, 100% power throughout operation, reduce greenhouse gas emissions, and have a well-established fuel delivery and cylinder exchange structure.
For many of the integrators attending the show, the RMR model helps with financial and strategic planning, making it easier to forecast growth and identify areas and regions that need extra resource. It can also be appealing to investors who appreciate the security of this future revenue source and can offer some resilience to shorter-term economic problems.
With a well-established cloud based service experiencing difficulty and a global technology brand’s IT system hacked; does this raise concerns about the current trend towards cloud-based physical security?
A water utility reported a cyber incident when remote users experienced difficulties logging into the control systems, according to an ICS-CERT report.
Electric companies in the United States might not be able to protect the power grid in the United States from a cyber attack, said the director of the National Security Agency (NSA).
Automation systems remain vulnerable and exposed. Past experiences like Stuxnet and last month’s revelations about SCADA system vulnerabilities show networks are sitting ducks to any aggressive and sophisticated attack.
The purpose of this blog is provide manufacturers, systems integrators, distributors, investors and other interested parties with regular "snapshot" market statistics and analyst opinions.
Stuxnet was the biggest and most noteworthy attack on the industrial control environment, but it was not the biggest in terms of documented and investigated malware incidents
Even hackers face problems with hackers.
Now it is time to turn the table and ask “How might this target protect itself from a worm like Stuxnet?”
Awareness about the importance of preventing work injuries and illnesses presented by OSHA during North American Occupational Safety and Health (NAOSH) Week
Cyber security is a key element for manufacturers to protect against computer-oriented thieves, but no one can over emphasize the importance of physical security
Exxon Mobil, Royal Dutch Shell and BP are three of the six major energy companies hit by cyber attacks through Internet servers in China where thieves stole proprietary information, according to officials close to the investigations
The American Society of Safety Engineers has reiterated to the House Committee on Oversight and Government Reform of the society’s support for the Occupational Safety and Health Administration’s development of an injury and illness prevention program standard.
It is no secret oil and gas companies face cyber security threats on a daily basis, but the level of the attack are becoming more sophisticated and well-organized through criminal syndicates and terrorist groups, according to a new report
There is now groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels of management to the level of individual systems
Some control system vendors continue to bury hidden “default” passwords in their system
Security experts remain locked into researching the Stuxnet worm. They learned how it can infiltrate a system, but now experts are learning more about mitigation strategies that can keep the nasty worm out.
The newest and strongest clues point toward Stuxnet being an American-Israeli project to sabotage the Iranian’s nuclear program.
Parts of America’s most prominent downtowns remain largely sealed off as security zones, which has led to blighted landscapes, limited public access and a need for a new approach to urban planning, according to a new study.
Hackers can potentially use Internet-connected HDTVs to infiltrate malware into home networks, according to a new report.
A bill that would force the government and the private sector to require minimum cyber security standards for devices that connect to the Internet is out on the Senate floor.
Control system vendors continue to bury hidden "default" passwords in their system which can fall victim to malware or hackers, making them the perfect backdoor into a company's operations.
To ensure a secure operating environment, there needs to be top flight communication and the Department of Homeland Security (DHS) is looking to do just that. DHS launched a cyber security center so it can communicate more efficiently with state and local governments about potential cyber threats to critical U.S. infrastructure. https://www.isssource.com/dhs-launches-cyber-center/.
This data acquisition and display station features 400 MB of internal flash memory, custom graphics, alarm annunciator display mode and open network connectivity. An advanced security option enables 21 CFR Part 11 compliance.
According to an Associated Press report, UAW and American Axle and Manufacturing Holdings Inc. will return to negotiations April 9.
Like his counterparts on the gridiron or the diamond, the Industrial Athlete looks for every edge to stay competitive on the job. It’s a term coined by Randy Kates, the manager of safety business for Kimberly-Clark Professional, a leading safety and personal protective equipment provider for manufacturing.
Twelve of ABB’s utility partners have formed a consortium to privately fund research and testing into securing supervisory control and data acquisition systems that protect the nation’s electric grid.
1. Manufacturing is cool! I know that. You know that.
Cooper Bussmann announced its venture into wireless technology on Feb. 15 with the launch of the Cooper InVision system. This system detects when a circuit protection device has opened, and alerts maintenance personnel which device has operated, where it is located, the part number of the replacement device and the appropriate level of personal protective equipment to wear to replace or reset the device. The Cooper InVision system includes wireless sensors, mesh routers and gateway.
As the shortage of skilled workers grows and the complexity of industrial jobs increases, new methods are being developed to provide the training these workers need. The field of e-learning is at the forefront of this effort.
Protecting eyesProblem: When grinding or cutting metal, employees would occasionally get particles in their eyes, even when wearing the proper personal protective equipment. Is there a way to prevent this potentially serious problem? Solution: Place a small, inexpensive magnetic strip (about 1 in. 3 1 in.) on the bill of the worker's hardhat.
Safety Answer Book helps determine -- in a matter of seconds -- which OSHA, DOT, and EPA regulations affect a plant. It provides answers to basic compliance questions on 71 workplace topics.
An 8-p publications supplement presents recent titles in educational and training materials for security. References are offered for both experienced security practitioners and those new to the field. American Society for Industrial Security www.