Is Your Business IT Ready for Industry 4.0?

Over the past several hundred years there have been trends which revolutionized industry and manufacturing around the world… steps taken in an industrial revolution which advanced the evolution of civilization and life as we know it. The first revolutionary phase was combining mechanization with steam and waterpower, and the second was the combination of mass production with electricity. The third was the rise of electronics, IT systems and automation. We are now at the start of the fourth phase of industrial revolution.

PwC’s Insights suggests that Industry 4.0 “refers to the fourth industrial revolution, which connections machines, people and physical assets into an integrated digital ecosystem that seamlessly generates, analyzes and communicates data, and sometimes takes action on that data without the need for human intervention.”

This next phase advances on concepts introduced through digitization and connected frameworks, tying in the industrial IoT (Internet of Things) and smart manufacturing. This meshed model relies on interconnectivity of systems, lots of automation at high levels, machine learning and AI… all collecting and generating data in real-time.

Where physical operations and production join with smart digital technologies, big data, and machine learning, businesses can forge systems which focus directly on manufacturing and supply chain management, gaining new insights and getting actionable data at all levels.

Virtualizing physical resources and digitization of analog data is now coupled with improved access to and management of the platforms. Rather than building out on-prem physical servers and systems, businesses are finding that the agility, scalability, and fault-tolerance of the cloud is necessary when designing an operation that connects, communicates and collects data, performs intelligent analyses, and potentially acts without people getting directly involved.

Every company is different, but all face a common challenge — the need for connection and access to real-time insights across processes, products, and people.

The consulting team at Mendelson Consulting and our NOOBEH cloud services group know how to get businesses in the best position to implement the tools and services that will propel the operation forward. From the most popular and powerful small business financial software to cloud platforms which enable connectivity in applications and workflows, we understand what it takes to help small businesses transform.

jm bunny feetMake Sense?

J

4 Rules of Thumb Regarding Passwords and Authentication

Many people believe passwords are dumb.  They store their credentials for easy login, or maybe even leave the password blank if the app allows. For IT managers, forcing users to come up with a strong, unique password is definitely not an easy task.  Resting on convenience over security, many people would prefer to use familiar names and dates or simple phrases they can remember.  Even when IT departments try to enforce best practices there is often a struggle between honoring those standards and influencing user behavior.

Relaxed password standards allow users to set passwords that may be as easy to guess as they are to remember, and very strict requirements for strong and complex passwords often results with users storing passwords in document files or on post-it notes on the monitor. Setting password standards and managing the policy implementation requires a balance between usability and security, but more often than not the balance skews toward simplicity. Yet passwords aren’t going away any time soon, even while biometrics and multi-factor authentication methods grow in prominence.

It is most likely that new technologies and standards will be combined with passwords to protect critical data. Using only a password to protect information may not be the ultimate in security, but it is important to recognize that passwords remain as a key element in any security model. For now, passwords should be as strong and unguessable as possible.  As technologies and standards rise up to meet the demands of users as well as enterprises, there are likely to be changes in how passwords are used. Here are 4 rules of thumb to consider regarding passwords and where authentication technologies are going.

1. Your face might be your password.

Biometrics won’t fully replace passwords right away, but the use of biometric data for authentication is growing rapidly. Face recognition, fingerprinting and voice identification are all being employed as authentication mechanisms and users are embracing the technology because it is easier to use than a remembered password.  Smartphones and PCs have sensors for reading fingerprints and cameras for seeing faces, and microphones for hearing your voice.  Many systems are also now able to use geodata with the biometric data (matching person to place), making it harder to compromise an identity while also being less disruptive to the user. While the technology isn’t foolproof, it represents a major step towards creating more secure systems without placing the responsibility strictly on the user.

2. Two pieces of ID are better than one.

The point of multi-factor authentication is that there are two different pieces of evidence a user must present in order to gain access. For example, a password may be the first piece of evidence presented, with a pass code sent to a mobile device as a second. Even as biometric authentication grows in prominence, industry participants recognize that no single method covers all the bases all the time. Multi-factor authentication is gaining in prominence as users become more familiar with the methods and the implementations become less intrusive. AI may also influence how these systems are applied. As user behavior and transaction parameters are “learned”, systems can identify activities that fall outside of normal routines and additionally prompt users for single-use pins or passwords sent to their mobile device.

3. Businesses should learn from past mistakes.

With news of hacking, ransomware and malware being daily fare, companies and their users are realizing that password security really is important and are stepping up their security efforts. The information is available to help prevent businesses from making the same mistakes that others have, offering worst case scenarios a’plenty to learn from.  Using default passwords and recycling passwords across work and personal accounts, using unsecured network connections, not encrypting files that contain password information and failing to patch or update systems and software are entirely preventable situations that put information at risk. Taking the reports seriously and identifying mistakes to avoid is highly useful in designing security for the business.

4. There’s a growing ecosystem for authentication.

With the number and type of systems requiring authentication – from industrial control systems to dating websites – there is a great and growing need to find highly secure methods of authentication that are actually usable for the user. Even in the world of blockchain there is a need for “identity assurance” and confirmation when documents or biometrics are captured via smartphone. Fast IDentity Online (FIDO) is a set of security specifications for strong multi-factor authentication, developed by the FIDO Alliance. The FIDO Alliance includes members such as Google, Aetna, Amazon, Microsoft, Bank of America and Samsung, and developed the spec as an initial basis for standardizing authentication across platforms and systems at the client and protocol layers.  

Technology is changing rapidly and solutions once reserved for government and large enterprise are now entering mainstream consumer use. You’ve probably already noticed that banking and other apps are employing the use of fingerprint and other biometric data with increased frequency as users demand easier access to applications and features from their smartphones and other mobile devices.

These technologies sometimes replace traditional password entry as the primary means of authentication or augment password use in some manner. Even MasterCard has announced a component in its payment card solutions that allows users of next-gen payment cards to register their fingerprint data on their credit card.

The push is to allow users to interact with their tasks without putting up barriers to access.

A combination of usability and enhanced protection, the new standards are developing to address not just system security but identity verification for various purposes. Corporate information must be secured and so must personal identity information; simply read the news to understand what can happen when digital identity information gets compromised.

Whether the data is business or personal, keeping hackers and bad actors away from it isn’t easy, so strengthening the most basic first layer of protection – the password – is the best place to start.

Make Sense?

J

The nasty surprises hackers have in store for us in 2018

“Hackers are constantly finding new targets and refining the tools they use to break through cyberdefenses. The following are some significant threats to look out for this year.

More huge data breaches

The cyberattack on the Equifax credit reporting agency in 2017, which led to the theft of Social Security numbers, birth dates, and other data on almost half the U.S. population, was a stark reminder that hackers are thinking big when it comes to targets. ..

Ransomware in the cloud

… The biggest cloud operators, like Google, Amazon, and IBM, have hired some of the brightest minds in digital security, so they won’t be easy to crack. But smaller companies are likely to be more vulnerable, and even a modest breach could lead to a big payday for the hackers involved.

The weaponization of AI

This year will see the emergence of an AI-driven arms race. Security firms and researchers have been using machine-learning models, neural networks, and other AI technologies for a while to better anticipate attacks, and to spot ones already under way. It’s highly likely that hackers are adopting the same technology to strike back…”

Source: The nasty surprises hackers have in store for us in 2018

Big Data, Analysis and Business Intelligence

Big Data, Analysis and Business Intelligence

big dataThere is a lot of talk among IT professionals of “big data”, and discussions at many business conference tables center on how the organization might find greater benefit and advantage from the intelligence buried in the business systems and information.  It is a two-part problem, where the collection and the analysis each play essential roles in developing real business intelligence.

“So what’s getting ubiquitous and cheap? Data.

And what is complementary to data? Analysis. ..”

Hal Varian, Chief Economist at Google and emeritus professor at the University of California, Berkeley
“Hal Varian Answers Your Questions,” February 25, 2008 (http://www.freakonomics.com/2008/02/25/hal-varian-answers-your-questions/).  BUSINESS INTELLIGENCE AND ANALYTICS: FROM BIG DATA TO BIG IMPACT; MIS Quarterly Vol. 36 No. 4, pp. 1165-1188/December 2012

The information technology and systems in a business support the operation.  Software and computers help people do their jobs, and the information collected in and generated by those systems becomes the foundation for developing business “intelligence”.   Today, businesses must reach beyond their own direct operational support systems and consider the full realm of data to be collected, including IoT sensor data or social media data.

Business intelligence is gained from the analysis of the critical business data – analysis which helps owners and managers make better and more informed decisions which are based on an understanding of the business and market.   Business intelligence was a term popularized in the 1990s, but the key was the analytical component (business analytics), which gained focus in the late 2000s. Today it is big data and big data analytics, where organizations are working with massive data sets not previously even imagined.

“…one of the most significant challenges facing enterprise IT teams today is how to efficiently support and enable the “science” of big data, while providing the confidence and maturity of more traditional (and often better understood) infrastructure services.”

http://www.datacenterknowledge.com/archives/2015/05/26/hadoop-big-data-storage-challenge-overcoming-science-project/

The volume and velocity of information collection is ever-increasing even in the smallest of businesses, creating a great need for tools which can structure and correlate data so that it might render some insight.  Simply storing and managing these huge and growing data sets has become a challenge, and there isn’t one right way.

Once the business has the data, then it must find a way to analyze the data, which generally involves also applying visualization tools. Many IT departments are feeling pressured in the development of new skills and capabilities around data collection and management, yet it is more frequently the business user who provides the analysis and applies visualization tools to the task.

“Data collected by the Aberdeen Group, found that employees in organizations that used visual data discovery were more likely to find the information they need, when they need it. These same companies were able to scale their use of scarce IT skills more effectively.”

http://www.tableau.com/learn/whitepapers/visualization-set-your-analytics-users-free#0vXrkWZbizxyutw

The use of business intelligence and advanced analytics continues to grow in every segment of the market – from small business to enterprise – and plays an increasingly important role in supporting business success.

Until this point, most businesses didn’t have the technology or the data to enable significant quality or business transformation, but the times are changing and deployments of data collection, analysis and visualization software and tools are expanding with it. This is a fundamental aspect of business digital transformation and fuels the next step, where intelligence is applied to conditions revealed in the data and activities are automatically performed guided by that intelligence.

jmbunnyfeetMake Sense?

J