1660253499771 Livenowstreamhero

"Janis Joplin is live now"

Jan. 14, 2021
Are you as comfortable with network security as you are with social media?

How often does social media grab your attention when you least expect it? One second you’re refilling your coffee after finishing that bill of materials, so you check in on Facebook and … Who’s that standing next to that wind turbine? And, oh, it’s my boss’ birthday. I’d better post a birthday message.

It’s so easy to be drawn into the allure of social media. No matter where you are. And no matter when it is.

Imagine my surprise the other day, when I received a notification from Facebook that “Janis Joplin is live now.”

Wait. What?

Of course, I clicked on it, only to be disappointed to find out she’s still dead and the notification only meant the Janis Joplin page was livestreaming Side 1 of Pearl on vinyl. That’s the first time in my life I’ve ever been disappointed to hear “Move Over.”

U.S. citizens spend more than two hours per day on social media, according to a 2020 survey by eMarketer. And Facebook alone has more than 2.7 billion active users.

Much of that social-media time is spent during work hours. Some of it is work-related, but most of it isn’t. In a Pew Research survey, the top reason people checked social media during work was to take a mental break (34%), followed by keeping in touch with family and friends (27%). Almost half of the workers surveyed by Bambu said they check social media intermittently throughout the day.

And we have no issue sharing sensitive information or trusting the integrity of what we see and read on social media. The point is we’ve become very comfortable with remote connectivity and its security in our personal lives.

So, why is cybersecurity still the top concern of businesses, according to a 2019 survey from The Travelers Companies? Is it the stakes that drive leaders to such risk aversion?

Cybersecurity is a way of life for businesses of every type, whether financial, medical or industrial. Despite our best efforts, breaches still occur.

It’s no wonder. Cyber attacks on computers with Internet access take place every 39 seconds on average, according to a December 2020 study out of the University of Maryland, affecting one in three Americans every year.

Combative strategies exist. Defense in depth. Block chain. The list goes on, and new ones are on the horizon. So, don’t let the threat of cyber hackers block your business objectives. Reap the rewards of connectivity and data analysis. The rewards far outweigh the risk. Shared information is far more valuable than siloed data. Remember you’re not alone. By the time you’ve finished reading this, someone has posted an update to Facebook that could be important. You’d better check on that.

About the author: Mike Bacidore
About the Author

Mike Bacidore | Editor in Chief

Mike Bacidore is chief editor of Control Design and has been an integral part of the Endeavor Business Media editorial team since 2007. Previously, he was editorial director at Hughes Communications and a portfolio manager of the human resources and labor law areas at Wolters Kluwer. Bacidore holds a BA from the University of Illinois and an MBA from Lake Forest Graduate School of Management. He is an award-winning columnist, earning multiple regional and national awards from the American Society of Business Publication Editors. He may be reached at [email protected] 

Sponsored Recommendations

High Sensitivity Accelerometers to Monitor Traffic and Railroad Vibration for Semiconductor Manufacturing

This paper examines highly sensitive piezoelectric sensors for precise vibration measurement which is critical in semiconductor production to prevent quality and yield issues....

Simulation for Automation Guide

How digital twin solutions are expanding the capabilities of plant engineers.

Enhancing HMI Security and Accessibility with Cloud VPN Solutions

Enhance HMI security and remote access with Beijer’s cloud VPN solution. Enjoy advanced encryption, easy setup, and secure access via laptops, smartphones, or tablets. Cut costs...

Motor Encoders: What They Are and How They Work

Motor encoders are rotary encoders adapted to provide information about an electric motor shaft's speed and/or position. Like rotary encoders, motor encoders are most commonly...