Thursday 7 September 2017

Digital attacks on control systems!

Boulting Technology, has released an infographic detailing history’s top five industrial computer viruses. The infographic educates industries that rely on computer control systems on how the lack of preventative measures against viruses and hackers can lead to costly downtime due to lost or stolen data.

The infographic is free to download here from Boulting Technology’s website.

Many industry sectors, such as manufacturing, rely on technology and the data it produces to aid production. Lost or corrupt data can lead to expensive downtime and can be difficult to restore.

Boulting Technology understands the importance of using preventative measures to avoid the consequences of leaving computer systems open to viruses. Its new infographic explains how some of the most notorious viruses of the digital age, such as Stuxnet, Flame and the Blackout Worm, have impacted businesses across a variety of sectors.

“Cyber security has become top of the agenda for many businesses over recent weeks, following the Wanna Decryptor (WannaCry) ransomware attack in May, which crippled the NHS and many other organisations across the globe.

“While it is difficult to predict the likelihood of a virus targeting a computer, companies should take preventative measures, like installing antivirus software, to ensure they are not at risk of losing data,” explained, Nick Boughton, sales manager at Boulting Technology.

“Legacy systems can present numerous problems as they do not contain as many safeguards as newer systems. At Boulting Technology we develop and install bespoke control systems which aid in both highlighting and resolving potential problems."


“Our infographic highlights the importance of protecting against hacking and viruses. Computer security researchers are constantly developing ways to enable antivirus solutions to more effectively detect, prevent and destroy new viruses, however it is up to businesses themselves to ensure they are protected.”

@BoultingTech #PAuto #Cybersecurity @StoneJunctionPR

No comments:

Post a Comment