Security

 

Where to store your passwords and how

Whether banking, shopping, mailing, streaming music or TV, forums or social networks – passwords are in demand almost everywhere. As secure as possible, of course. And in order to guarantee the highest possible level of confidence, i.e. confidentiality of your data, you should not only choose a password that is as secure as possible, but also a password that is as individual as possible for each individual account. But be careful! One thing should be clear to everyone: there is no one hundred percent guarantee of security. However, one can and should try to make the security layers around one’s own sensitive data as impenetrable as possible in order to get as close as possible to the optimal protection. Fortunately, there are a number of ways to do this.

Read More

Stahl and security: Full concentration in tune with the times

The company R. Stahl can look back with satisfaction on the first six seminars held in April in some major cities in northern and western Germany under the title “Explosion Protection Day”. Whether in Bremen, Hamburg, Leipzig, Dortmund, Cologne or Frankfurt – Yokogawa had the opportunity to be a lecturer at every event. And with the brand-new topic: Plant Security.

Read More

Crucial basic measures to ensure business resilience (Part 2/2)

After the first part of the blog article “Decisive basic measures to ensure corporate resilience” focused on the core tasks of Business Impact Analysis (BIA) and the foundations for resilience via Identity and Access Management (IAM), the second part now follows. Here the core tasks are to be brought up for discussion up to advantages of the Identity and Access management.

Read More

Crucial basic measures to ensure business resilience (Part 1/2)

The Business Impact Analysis (BIA) identifies, quantifies and describes the effects of a loss of resources on the business processes in a company. In the first part of Fatma Evren’s blog article, the core tasks of Business Impact Analysis, the BIA’s “risk appetite” and the fundamentals of resilience, Identity and Access Management (IAM) are examined in more detail.

Read More

Interview with IMK Manager IA Services Fatma Evren

International Women’s Day was a few weeks ago. Nevertheless, we would like to take this opportunity to introduce one of our employees and see what she and the industry are up to. A lot has changed for the better over the years. But what about women working in traditionally male-dominated fields like the process industry? Has their situation really changed as radically as we imagine? And how have the changes impacted on Yokogawa?

Read More

When music streaming meets crude oil

The digitalization of music has forced an entire industry to make a drastic change, which with new business models, especially streaming, has again developed into a growth market in recent years. Let’s remember a little backwards: Filesharing services were initially very popular. Wouldn’t it have a certain charm to get the music directly from the artist and pay him and all those involved quickly and fairly? But how can the integrity of such a software system be guaranteed? The blockchain can make an important contribution to this – also in all areas of the economy, where numerous ideas for new business models are developed and tested against this background.

Read More

Digital ambition – key aspect Plant Security

Sustainable growth in our increasingly networked, smarter times requires adaptation to the new needs of our customers – quickly and efficiently. With the right innovative and digital tools, companies can achieve this in a smart way. In order to ensure the success of technical innovations, companies now have to do one thing above all else: put people and plant security at the centre – without alternatives. Plant security and safety must be “business as usual” and anchored in the corporate culture.

Read More

Plant security – perfect-fit protection for your crown jewels

Plant Security describes the combination of functional security and cyber security to ensure comprehensive protection. The focus is on protecting the IT of industrial plants against cyber attacks.

Read More

Regular monitoring of your safety instrumented system – are you doing it and is it effective?

The monitoring of safety instrumented systems (SIS) is becoming more relevant to organizations in today’s process industries. Most are actively gathering some form of measurement to record and assess safety system performance. However, is this information accurate, reliable and fully inclusive to have real certainty to monitor safety system performance?

Read More

Is my house or plant attractive to criminals? (Part 2)

Especially during the holiday weeks the risk of break-ins increases. Because while we are on holiday, the burglars can get to work in peace and quiet. However – and here lies one of the decisive similarities with Plant Security – with the help of modern security instruments and sensitive, forward-looking behaviour, this danger can be greatly minimised.

Read More