Cyber Health

Cybersecurity has become a critical topic to PMMI members and the packaging industry in today’s business environment. As a result, PMMI has created CyberHealth, to assist you with your cybersecurity needs and keep you up to date on current business practices, key trends, and imminent threats. Check this page often as we will be updating the information and resources on a regular basis.

Get cybersecurity updates straight to your inbox by opting in to receive CyberHealth emails.

Lock image over code
CISA recommends getting rid of default passwords

Following our recent blog post about vulnerabilities in Programmable Logic Controllers, the Cybersecurity & Infrastructure Security Agency (CISA) is urging manufacturers to change or even get rid of default passwords altogether on equipment and software they manufacture.  The agency went on to say that “studies by CISA show that the use of default credentials, such as passwords, is a top weakness that threat actors exploit to gain access to systems, including those within U.S. critical infrastructure”. 

Person typing on laptop
CISA Warns of Unitronics PLC Exploitation

You may have seen the news last week that multiple municipal water authorities declared themselves under cyber attack.  How did they get in?  The answer is quite simple: by using the default credentials on Unitronics PLCs.  The specific controllers that were compromised were equipped with HMIs and did not have their default passwords changed.  While the attack has a multitude of geopolitical ramifications, ultimately it highlights the need to revisit security measures around interconnected devices, especially those that have not had proper security controls implemented or changed from their default settings.

Lock over cyber information
Cybersecurity Threat Intelligence – Should I have one?

Cybersecurity threat intelligence services are comprehensive offerings that collect, analyze, and provide real-time insights on potential cybersecurity threats, vulnerabilities, and risks to your organization. These services monitor diverse data sources, detect threats, and identify vulnerabilities, including malware and attack patterns, while also offering tailored recommendations and mitigation strategies. They supply real-time alerts, facilitate information sharing among organizations, and often offer educational resources. Threat intelligence services can empower organizations to proactively safeguard their digital assets by staying informed about the evolving threat landscape and taking appropriate measures to protect against cyberattacks and data breaches.  However, these services often come with a significant price tag, which begs the question: should manufacturers sign up?

 

Person typing on laptop
Tabletop Exercises – How to conduct a cybersecurity preparedness exercise

We all know that Cybersecurity is paramount to ensuring the continuous operation of any business in today’s digital world, and responding to any type of cybersecurity incident at some point is only question of when. To safeguard your manufacturing operations from cyber threats, it's essential to assess your readiness and response capabilities regularly. One effective tool for this is the tabletop exercise. In this post, I'll explain what tabletop exercises are and why they're vital to the preparedness of any manufacturing organizations to respond to an incident.

Person typing on laptop
Internet-of-Things Device Attacks

The Internet of Things (IoT) continues to transform the way we approach manufacturing, but it also brings increased risks of cyberattacks.  With the growing volume of IoT devices and sensors, the potential attack surface for manufacturers grows with it, as does the amount of data needed to protect.  In this blog post, we will delve into IoT attacks, highlight why manufacturers need to be vigilant, and provide actionable steps manufacturers can take to safeguard themselves against these evolving threats.

Hands typing on laptop
Exploring the Power of ChatGPT and Artificial Intelligence

If you’ve read the news lately, you’ve probably heard that Artificial Intelligence tools powered by language models like ChatGPT are taking the world by storm and have the potential to revolutionize the ways we all work, especially in the manufacturing industry. Manufacturers are increasingly exploring the potential of AI tools to enhance their operations and gain a competitive edge. In today’s article, we will embark on an exploration of ChatGPT and delve into the ways in which manufacturers can harness the power of AI to elevate their business processes. We will also emphasize the paramount importance of data security and privacy, ensuring that manufacturers can leverage AI tools responsibly and safely.

Green Code
Watering Hole Attack and How To Prevent Them

What is a “watering hole” attack and how do I prevent it from happening to my company?

A watering hole attack targets a specific company by infecting their website with malware which proceeds to then further infect everyone that visits your website.  The attackers essentially use your website as a distribution mechanism to inject malware into as many of your website viewer's computers as possible, with the goal of stealing information or extracting ransom payments.  Manufacturing companies are particularly vulnerable to watering hole attacks because they often rely on supply chain partners and subcontractors who may not have the same level of security measures in place.  These attacks can compromise your sensitive information and/or intellectual property, and can also disrupt your operations.

CyberSecurity
Denial of Service Attacks

A Denial of Service (DoS) attack is a type of cyber-attack that attempts to make a website, online service or computer network unavailable by overwhelming it with a flood of traffic or requests, causing it to crash or become extremely slow and unresponsive.. It can be targeted at a single system or an entire network, and can range from minor disruption or slowness to a complete shut down.  

Man on Tablet
Bring Your Own Device Policies – What do you need to have?

Bring Your Own Device, or BYOD, has become an important technology topic over the past ten years as mobile devices have increased their capability and sophistication.  But how should your company deal with employees using their personal devices for work?  What company services do you allow employees to connect to from their personal devices, and what should you restrict to only corporate-issued computers?  The answer is: it depends! 

Tablet
Business E-mail Compromise: What it is and how to avoid it

Business email compromise (BEC) is a type of online scam where a cybercriminal tricks a company or its employees into transferring money or sensitive information to the fraudster's account.

BEC attacks can be very convincing, as the fraudsters often spend time researching their targets, and they may use language and tactics that make the emails seem legitimate. These types of attacks can cause significant financial losses for businesses and individuals, so it's important to be cautious when receiving any email that requires you to provide sensitive information or perform financial transactions.

Person who will complete the membership application.

Are you a manufacturer of:

Categories may include:
  • Engineering
  • Design & construction services
  • Integrators
  • New equipment distributors
  • Instrumentation, automation
  • Process control systems & software
  • Material handling
  • Distribution & warehouse equipment
  • Refrigeration
  • Cooling chilling & freezing equipment
  • Sanitation
  • Food safety & plant maintenance equipment.


Primary Address

*If you manufacture packaging, processing or converting machinery outside of North America this will be your Incorporated North American facility that supplies sales, parts and service. This address will be used for billing & shipping)
Primary Address


Headquarters/Corporate Address

Headquarters/Corporate Address

Plant Address

Plant Address

Product Category Detail

You're almost done!

To help us serve you best, we'd like to know just a little bit more about the product category areas which best define your company's profile. We use these categories to help potential customers find you through our online member directory, get the best exposure when you exhibit at the PACK EXPO family of shows and to make sure we're targeting our efforts to you for business intelligence reports.

Please select ONLY those definitions that best classify your business so that we can make the best use of the data.

Selecting a sub-category will automatically classify you by the related primary category to help us better classify and target our offerings for you. Please select only fields appropriate to your company so we may properly process and approve your application! This information is very important!

1.0: ACCUMULATING / COLLATING MACHINES
2.0: BLISTER, SKIN / VACUUM PACKAGING MACHINES
3.0: CAPPING, OVER-CAPPING, LIDDING MACHINES (uses a closure)
4.0: CARTONING MACHINES
5.0: CASE / TRAY SEALING MACHINES
6.0: CASE / TRAY, LOADING / UNLOADING MACHINES
7.0: CASE ERECTING / TRAY FORMING MACHINES
8.0: CASE GROUP / LOAD AND CLOSE / SEAL MACHINE
9.0: CLEANING, STERILIZING, COOLING AND DRYING MACHINES
10.0: CLOSING, SEAMING & SEALING MACHINES
11.0: CODING, DATING, PRINTING, MARKING, STAMPING AND IMPRINTING MACHINES
12.0: CONVEYING MACHINES
13.0: FEEDING MACHINES
14.0: FILLING AND CLOSING MACHINES
15.0: FILLING MACHINES - DRY / POWDER / SOLID PRODUCT
16.0: FILLING MACHINES / LIQUID / GAS / VISCOUS PRODUCT
17.0: FORM / FILL / SEAL MACHINES - HORIZONTAL
18.0: FORM / FILL / SEAL MACHINES - VERTICAL
19.0: INSPECTING, DETECTING, AND CHECKWEIGHING MACHINES
20.0: LABELING MACHINES (Product Identification, Decorating)
21.0: ORIENTING, UNSCRAMBLING MACHINES
22.0: PALLET UNITIZING MACHINES
23.0: PALLETIZING - ANCILLARY MACHINES
24.0: PALLETIZING / DEPALLETIZING MACHINES
25.0: SPECIALTY PACKAGING MACHINES
26.0: WRAPPING / BANDING / BUNDLING MACHINES
27.0: CONVERTING MACHINES - CONTAINER / MATERIAL MANUFACTURE
28.0: CONVERTING SUPPORT / SPECIALTY MACHINE
29.0: DECORATING / MARKING / PRINTING MACHINES
30.0: MACHINERY SYSTEMS AND COMPONENTS
31.0: PACKAGING CONTAINERS
32.0: PACKAGING COMPONENTS
33.0: PACKAGING MATERIAL
40.0: PROCESS MACHINERY - PRODUCT PREPARATION - SIZE / SHAPE MODIFICATION
41.0: PROCESS MACHINERY - PRODUCT PREPARATION - MIXING, SEPARATION, FILTRATION
42.0: PROCESS MACHINERY - SPECIAL PRODUCT MODIFICATION
43.0: PROCESS MACHINERY - PRODUCT COOKING, HEATING, COOLING, PASTEURIZING
44.0: PROCESS COMPONENTS - PIPING, PUMPS, STORAGE
45.0: PROCESS CONTROL - INSTRUMENTATION & SYSTEMS
46.0: FACILITIES EQUIPMENT, SYSTEMS, SUPPLIES, AND SERVICES
47.0: PROCESS MACHINERY LIFE SCIENCES
48.0: INGREDIENTS
49.0: DAIRY / CHEESE / ICE CREAM EQUIPMENT, SUPPLIES SERVICES
50.0: SUPPLY CHAIN / MATERIAL HANDLING SYSTEMS AND SERVICES
51.0: PHARMACEUTICAL SERVICES
52.0: PHARMACEUTICAL INGREDIENTS, DEVICES AND SUPPLIES
53.0: TRANSPORTATION / DISTRIBUTION EQUIPMENT, SYSTEMS, SERVICES
60.0: PACKAGING / PROCESSING SERVICES
This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.