{"id":1960,"date":"2018-09-13T11:26:06","date_gmt":"2018-09-13T16:26:06","guid":{"rendered":"http:\/\/dev-mhisolutionsmag.officialdirectory.com\/?p=1960"},"modified":"2018-12-19T12:47:07","modified_gmt":"2018-12-19T18:47:07","slug":"hacking-it-can-happen-to-you","status":"publish","type":"post","link":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/","title":{"rendered":"Hacking: It Can Happen to You"},"content":{"rendered":"<p><strong><a href=\"http:\/\/dev-mhisolutionsmag.officialdirectory.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1911\" src=\"http:\/\/dev-mhisolutionsmag.officialdirectory.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p-300x188.jpg\" alt=\"\" width=\"300\" height=\"188\" srcset=\"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p-300x188.jpg 300w, https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target big multi-national firms nor do they discriminate based on industry.<\/strong><\/p>\n<p><em>* By Katie Kuehner-Hebert *<\/em><\/p>\n<p>A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target big multi-national firms nor do they discriminate based on industry.<\/p>\n<p>Everyone is at risk and hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. And, if your company is part of a supply chain, not only do you have to take into consideration a direct attack, but also a cyberattack that could occur to any one of the companies in your supply chain\u2014and that is a very real threat.<\/p>\n<p>\u201cIt is a mistake to think, \u2018It won\u2019t happen here,\u2019\u201d said Rick Fox, president and CEO of MHI member FOX IV Technologies Inc. \u201cFOX IV was hit with ransomware demanding thousands of dollars.\u201d Fortunately, one of the company\u2019s cybersecurity policies is to back up the entire system every night, Fox said. Moreover, the company\u2019s email system is provided by a vendor that has a secure cloud-based platform.<\/p>\n<p>\u201cWe were able to recover in three hours and not pay the ransom,\u201d he said.<\/p>\n<p>Cybersecurity policies are especially important when companies have remote access to their equipment at a customer plant, Fox said. \u201cNothing would be more devastating for the relationship than to inadvertently download a virus into your customer\u2019s WMS,\u201d he said. \u201cIn addition, they may need to consider intentional acts like a disgruntled employee coding a virus into the software,\u201d said Fox.<\/p>\n<p>Christian Dow, president of MHI member Panther Industries Inc., considers cybersecurity to be of paramount importance\u2014for everyone\u2019s sake. \u201cWe not only protect our own data, but also ensure that we are not a point of vulnerability for our customers,\u201d Dow said. \u201cAs equipment OEMs, we need to protect customers by ensuring our devices are up to date and free of viruses or malware before implementation, service or training site visits.\u201d<\/p>\n<p><a href=\"https:\/\/www.mhisolutions-digital.com\/mhiq\/0418_volume_6__issue_4\/MobilePagedArticle.action?articleId=1423643#articleId1423643\"><strong>Read More\u2026<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target big multi-national firms nor do they discriminate based on industry. * By Katie Kuehner-Hebert * A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target &#8230;<\/p>\n","protected":false},"author":46,"featured_media":1911,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1960","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hacking: It Can Happen to You - MHI Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hacking: It Can Happen to You - MHI Solutions\" \/>\n<meta property=\"og:description\" content=\"A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target big multi-national firms nor do they discriminate based on industry. * By Katie Kuehner-Hebert * A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/\" \/>\n<meta property=\"og:site_name\" content=\"MHI Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-13T16:26:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-12-19T18:47:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melinda Runkle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Melinda Runkle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/\",\"url\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/\",\"name\":\"Hacking: It Can Happen to You - MHI Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.mhisolutionsmag.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg\",\"datePublished\":\"2018-09-13T16:26:06+00:00\",\"dateModified\":\"2018-12-19T18:47:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.mhisolutionsmag.com\/#\/schema\/person\/75c7b64e8c837441fbd28bb800c1252c\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#primaryimage\",\"url\":\"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg\",\"contentUrl\":\"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg\",\"width\":400,\"height\":250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mhisolutionsmag.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hacking: It Can Happen to You\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mhisolutionsmag.com\/#website\",\"url\":\"https:\/\/www.mhisolutionsmag.com\/\",\"name\":\"MHI Solutions\",\"description\":\"Improving Supply Chain Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mhisolutionsmag.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mhisolutionsmag.com\/#\/schema\/person\/75c7b64e8c837441fbd28bb800c1252c\",\"name\":\"Melinda Runkle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mhisolutionsmag.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/92959c758b90d2ef7150661fcf30fefe1962b390dd4d94d9cf21ec6ca8e79af7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/92959c758b90d2ef7150661fcf30fefe1962b390dd4d94d9cf21ec6ca8e79af7?s=96&d=mm&r=g\",\"caption\":\"Melinda Runkle\"},\"url\":\"https:\/\/www.mhisolutionsmag.com\/index.php\/author\/mrunkle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hacking: It Can Happen to You - MHI Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/","og_locale":"en_US","og_type":"article","og_title":"Hacking: It Can Happen to You - MHI Solutions","og_description":"A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target big multi-national firms nor do they discriminate based on industry. * By Katie Kuehner-Hebert * A cyberattack can happen to anyone and any company\u2014even if you have cybersecurity programs in place. Hackers don\u2019t just target ...","og_url":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/","og_site_name":"MHI Solutions","article_published_time":"2018-09-13T16:26:06+00:00","article_modified_time":"2018-12-19T18:47:07+00:00","og_image":[{"width":400,"height":250,"url":"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg","type":"image\/jpeg"}],"author":"Melinda Runkle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Melinda Runkle","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/","url":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/","name":"Hacking: It Can Happen to You - MHI Solutions","isPartOf":{"@id":"https:\/\/www.mhisolutionsmag.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#primaryimage"},"image":{"@id":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg","datePublished":"2018-09-13T16:26:06+00:00","dateModified":"2018-12-19T18:47:07+00:00","author":{"@id":"https:\/\/www.mhisolutionsmag.com\/#\/schema\/person\/75c7b64e8c837441fbd28bb800c1252c"},"breadcrumb":{"@id":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#primaryimage","url":"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg","contentUrl":"https:\/\/www.mhisolutionsmag.com\/wp-content\/uploads\/2018\/09\/Hacking-400x250p.jpg","width":400,"height":250},{"@type":"BreadcrumbList","@id":"https:\/\/www.mhisolutionsmag.com\/index.php\/2018\/09\/13\/hacking-it-can-happen-to-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mhisolutionsmag.com\/"},{"@type":"ListItem","position":2,"name":"Hacking: It Can Happen to You"}]},{"@type":"WebSite","@id":"https:\/\/www.mhisolutionsmag.com\/#website","url":"https:\/\/www.mhisolutionsmag.com\/","name":"MHI Solutions","description":"Improving Supply Chain Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mhisolutionsmag.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mhisolutionsmag.com\/#\/schema\/person\/75c7b64e8c837441fbd28bb800c1252c","name":"Melinda Runkle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mhisolutionsmag.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/92959c758b90d2ef7150661fcf30fefe1962b390dd4d94d9cf21ec6ca8e79af7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/92959c758b90d2ef7150661fcf30fefe1962b390dd4d94d9cf21ec6ca8e79af7?s=96&d=mm&r=g","caption":"Melinda Runkle"},"url":"https:\/\/www.mhisolutionsmag.com\/index.php\/author\/mrunkle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/posts\/1960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/comments?post=1960"}],"version-history":[{"count":0,"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/posts\/1960\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/media\/1911"}],"wp:attachment":[{"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/media?parent=1960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/categories?post=1960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mhisolutionsmag.com\/index.php\/wp-json\/wp\/v2\/tags?post=1960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}