Seven Best Practice to Protect Yourself from a Phishing Attack

Sebastian Abbinanti Perspectives Leave a Comment

Phishing attacks typically occur through e-mail. The attacker will send you an e-mail with a link that would take you to an authentic-looking site. In a typical phishing attack, the link will take you to a fake site and ask you to login. If you login, the login almost always fails, but not before the attacker has captured your username …

Bend, Don’t Break: Build In Resilience

Sebastian Abbinanti Perspectives Leave a Comment

Manufacturers must have computer systems that work. When talking about making systems that keep working, we often talk about “hardening” the system, but that can be misleading. Some things are hard but brittle, in that they can resist light pressure but shatter under a hard shock. What you want are systems that are resilient—able to absorb shocks and bounce back …