Welcome
 | 
My Account

CyberHealth News

Cybersecurity has become a critical topic to PMMI members and the packaging industry in today’s business environment.

As a result, PMMI has created CyberHealth, to assist you with your cybersecurity needs and keep you up to date on current business practices, key trends, and imminent threats. Check this page often as we will be updating the information and resources on a regular basis.

Get cybersecurity updates straight to your inbox by opting in to receive CyberHealth emails.

Watering Hole Attack and How To Prevent Them

April 19, 2023

What is a “watering hole” attack and how do I prevent it from happening to my company? A watering hole attack targets a specific company by infecting their website with malware which proceeds to then further infect everyone that visits your website.

Denial of Service Attacks

March 24, 2023

A Denial of Service (DoS) attack is a type of cyber-attack that attempts to make a website, online service or computer network unavailable by overwhelming it with a flood of traffic or requests, causing it to crash or become extremely slow and unresponsive.. It can be targeted at a single system or an entire network, and can range from minor disruption or slowness to a complete shut down.

Bring Your Own Device Policies – What do you need to have?

March 10, 2023

Bring Your Own Device, or BYOD, has become an important technology topic over the past ten years as mobile devices have increased their capability and sophistication. But how should your company deal with employees using their personal devices for work? What company services do you allow employees to connect to from their personal devices, and what should you restrict to only corporate-issued computers? The answer is: it depends! 

Business E-mail Compromise: What it is and how to avoid it

February 27, 2023

Business email compromise (BEC) is a type of online scam where a cybercriminal tricks a company or its employees into transferring money or sensitive information to the fraudster's account. BEC attacks can be very convincing, as the fraudsters often spend time researching their targets, and they may use language and tactics that make the emails seem legitimate. These types of attacks can cause significant financial losses for businesses and individuals, so it's important to be cautious when receiving any email that requires you to provide sensitive information or perform financial transactions.

A Great Time to Catch up on Patches

December 21, 2022

Recently there have been a number of critical and zero-day vulnerabilities that have been announced in the news across several platforms. Whether for personal or business use, Apple or Microsoft, or for servers, laptop, mobile devices, or HMIs; this is a great time of year to check for updates and apply any open patches or hotfixes for known vulnerabilities. 

Do I Need An Incident Management Process?

December 9, 2022

Does your organization have a defined incident management or problem management process? If not, it may be a good idea to spend some time formally defining your incident management process and plan for how your technology and cybersecurity teams respond to incidents. 

[Attention IT Departments] Federal Cybersecurity Advisory Issued

November 22, 2022

The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) released a joint cybersecurity advisory regarding cyber threats from ransomware.

Geofencing - what is it and why should you consider using it?

November 9, 2022

A geofence is a type of virtual perimeter for a real-world geographic area. Geofencing has many uses that can vary widely, from smart devices and appliances to marketing / audience engagement to security and human resources. 

PACK EXPO International Cybersecurity Briefing

October 12, 2022

Heading to PACK EXPO International in a few weeks? You’ll want to keep the following in mind to ensure a safe and secure experience while at the show.

Wireless Security – What do I need?

September 30, 2022

There are varying levels of wireless security that you can employ on your Wi-Fi networks ranging from completely open to tightly secured. Here is a look at the various security protocols you should consider employing on your wireless networks.