Welcome
 | 
My Account

CyberHealth News

Cybersecurity has become a critical topic to PMMI members and the packaging industry in today’s business environment.

As a result, PMMI has created CyberHealth, to assist you with your cybersecurity needs and keep you up to date on current business practices, key trends, and imminent threats. Check this page often as we will be updating the information and resources on a regular basis.

Get cybersecurity updates straight to your inbox by opting in to receive CyberHealth emails.

CISA Warns of Unitronics PLC Exploitation

December 19, 2023

You may have seen the news last week that multiple municipal water authorities declared themselves under cyber attack. How did they get in? The answer is quite simple: by using the default credentials on Unitronics PLCs. The specific controllers that were compromised were equipped with HMIs and did not have their default passwords changed. While the attack has a multitude of geopolitical ramifications, ultimately it highlights the need to revisit security measures around interconnected devices, especially those that have not had proper security controls implemented or changed from their default settings.

Cybersecurity Threat Intelligence – Should I have one?

October 20, 2023

Cybersecurity threat intelligence services are comprehensive offerings that collect, analyze, and provide real-time insights on potential cybersecurity threats, vulnerabilities, and risks to your organization. These services monitor diverse data sources, detect threats, and identify vulnerabilities, including malware…

Tabletop Exercises – How to conduct a cybersecurity preparedness exercise

September 22, 2023

Tabletop Exercises – How to conduct a cybersecurity preparedness exercise We all know that Cybersecurity is paramount to ensuring the continuous operation of any business in today’s digital world, and responding to any type of cybersecurity incident at some point is only question of when. To safeguard your…

Internet-of-Things Device Attacks

June 15, 2023

The Internet of Things (IoT) continues to transform the way we approach manufacturing, but it also brings increased risks of cyberattacks. With the growing volume of IoT devices and sensors, the potential attack surface for manufacturers grows with it, as does the amount of data needed to protect.

Exploring the Power of ChatGPT and Artificial Intelligence

May 22, 2023

If you’ve read the news lately, you’ve probably heard that Artificial Intelligence tools powered by language models like ChatGPT are taking the world by storm and have the potential to revolutionize the ways we all work, especially in the manufacturing industry. Manufacturers are increasingly exploring the potential of AI tools to enhance their operations and gain a competitive edge.

Watering Hole Attack and How To Prevent Them

April 19, 2023

What is a “watering hole” attack and how do I prevent it from happening to my company? A watering hole attack targets a specific company by infecting their website with malware which proceeds to then further infect everyone that visits your website.

Denial of Service Attacks

March 24, 2023

A Denial of Service (DoS) attack is a type of cyber-attack that attempts to make a website, online service or computer network unavailable by overwhelming it with a flood of traffic or requests, causing it to crash or become extremely slow and unresponsive.. It can be targeted at a single system or an entire network, and can range from minor disruption or slowness to a complete shut down.

Bring Your Own Device Policies – What do you need to have?

March 10, 2023

Bring Your Own Device, or BYOD, has become an important technology topic over the past ten years as mobile devices have increased their capability and sophistication. But how should your company deal with employees using their personal devices for work? What company services do you allow employees to connect to from their personal devices, and what should you restrict to only corporate-issued computers? The answer is: it depends! 

Business E-mail Compromise: What it is and how to avoid it

February 27, 2023

Business email compromise (BEC) is a type of online scam where a cybercriminal tricks a company or its employees into transferring money or sensitive information to the fraudster's account. BEC attacks can be very convincing, as the fraudsters often spend time researching their targets, and they may use language and tactics that make the emails seem legitimate. These types of attacks can cause significant financial losses for businesses and individuals, so it's important to be cautious when receiving any email that requires you to provide sensitive information or perform financial transactions.

A Great Time to Catch up on Patches

December 21, 2022

Recently there have been a number of critical and zero-day vulnerabilities that have been announced in the news across several platforms. Whether for personal or business use, Apple or Microsoft, or for servers, laptop, mobile devices, or HMIs; this is a great time of year to check for updates and apply any open patches or hotfixes for known vulnerabilities.