The Food Industry May Be Finally Paying Attention To Its Weakness To Cyberattacks

This article was originally published by NPR. To view the original article, click here

A recent ransomware attack on the world’s biggest meatpacker is raising questions about cybersecurity in the food industry and about whether the industry is so concentrated in a few hands it is more vulnerable to sudden shocks.

The company, Brazil-based JBS, is a giant in the meat industry, with operations all over the world. The attack forced it to shut down several plants in the U.S. and Australia, which briefly rattled beef markets. But the plants soon came back online, and JBS downplayed the impact, saying it lost less than a day’s worth of production. The company admitted it had paid $11 million in ransom to the hackers.

But according to John Hoffman, a senior research fellow at the Food Protection and Defense Institute at the University of Minnesota, the attack has continued to reverberate. Hoffman says he’s receiving a wave of inquiries about cybersecurity from industry executives who previously were inclined to disregard his warnings.

“People just didn’t accept that it was that big of a risk,” he says. “I think that’s changed today. I’ve already heard from folks in government [that] it’s changed. People are looking at this and saying, ‘OK, we’ve got to do something.’ “

According to Hoffman, many food companies’ computer systems are vulnerable. “If you go to factory floors around this country, you’re going to find a wide range of outdated software still being used, and computer devices that aren’t secure,” he says.

He recalls a visit to one plant a few years ago — he won’t say which company — where he noticed a supervisor sitting at a computer on the production floor, monitoring operations. Hoffman could see it was running an old operating system, Windows 98. He asked the plant manager and a top executive of the company, who were giving him the tour, whether the computer was connected to the internet. “And they say, ‘Oh, no, no. This isn’t connected to the internet.’ “

Hoffman then talked to the supervisor on duty, who acknowledged he could log into that computer from home to monitor and control equipment in the plant. The company hadn’t taken steps to secure that access using, for instance, a virtual private network, or VPN.

“There it is. That’s the definition of vulnerability,” Hoffman says. In fact, food itself is vulnerable, because those computers “are controlling valves and monitoring temperatures, controlling mixes of additives to food. These are part of food safety.”

Hoffman has been pushing for the government to enforce computer security standards in the food industry in the same way it enforces food safety standards. Currently, food safety regulations don’t explicitly address cybersecurity.

Other longtime critics of the meat industry, such as Diana Moss, president of the American Antitrust Institute, are drawing another lesson from the JBS attack. Moss says the industry is too concentrated in the hands of too few companies, so a problem in just one company can disrupt supplies for millions of consumers.

“What we have, in the meat supply chain, is a cartel,” she says. Just four companies, including JBS, slaughter about 85% of the country’s cattle that are raised for beef. Those companies operate giant, centralized slaughterhouses. Moss says a small number of companies also dominate chicken production, flour milling and other kinds of food processing.

“When you have only a few firms, in this critical midstream part of the supply chain — processing, manufacturing — the supply chain becomes very unstable. It lacks resiliency and is very subject to shocks to the system,” she says.

The biggest recent shock was the COVID-19 pandemic when the coronavirus spread rapidly among workers at meatpacking plants. Hundreds of workers died. Companies were forced to suspend operations at some of the largest processing plants, leaving many ranchers and pork farmers with no place to take their animals.

Kathryn Bedell, a rancher in Colorado, says that 60 years ago, “processing was more regionally distributed, and we would have never faced this problem. You wouldn’t have noticed either the pandemic or the JBS [ransomware] problem.”

The U.S. Department of Agriculture appears to be sympathetic to these arguments. The USDA is offering grants to support small and medium-size meat processors, and it recently asked for public comment on ways to build “more resilient, diverse, and secure supply chains.”

The North American Meat Institute, which represents meat producers such as JBS, says the existing supply chain is already resilient. Mark Dopp, NAMI’s senior vice president of regulatory and scientific affairs, told the USDA that during the pandemic, “the industry fared reasonably well in extraordinary circumstances,” and that “suggestions that the government needs to step in and ‘do something’ may be trying to fix something that is not broken.”

A NAMI spokesperson pointed out that the cyberattack on JBS ultimately caused little disruption and said that meat companies reacted immediately to that attack and reviewed their own computer systems to ensure they were secure.

Read More

What is Juneteenth?

As a certified MBE and MWBE, Compulink Technologies, Inc. is excited to hear the recent news that Juneteenth has been recognized as a National Federal Holiday. 

What is Juneteenth?

We’re glad you asked. Juneteenth marks the official end of slavery in the United States. 

I thought that was the Emancipation Proclamation? 

Yes and no. The Emancipation Proclamation was signed into effect by Abraham Lincoln on January 1, 1863, which declared that “all enslaved people in the States, henceforth, would be free forever.” While this signaled the end of slavery in the United States, it did not become official until when a Union General by the name of Gordon Granger travelled south to Galveston, Texas on June 19, 1895 and informed enslaved African-Americans of their freedom and end of the war. General Granger’s announcement put into effect the Emancipation Proclamation and marked the end of slavery in the United States as we know it. The holiday received its name by combining June and 19, the day of Granger’s announcement. 

Interesting. How is it celebrated today? 

Lots of ways. The holiday was originally celebrated in Texas as a way to commemorate the final domino pieces that toppled that would end slavery in the United States. Since 1979, the holiday has been recognized and slowly gained traction, state-by-state. Today, the bill has been signed into law as a national holiday and there are many cities such as Atlanta, Los Angeles, and Detroit that host city parades and other festivities.

Conclusion:

Today we celebrate this momentous event in American History, where we can catch our breath and see for ourselves the positive changes that have taken into effect throughout our past. We must never forget our history, and we must always strive each day to make our promise to make this nation a place where all people are created equal.

Read More

The History Of 3-D Printing

This article was originally published on PCGuide.com | 

3-D Printing

Despite being around for the better part of 40 years, 3D printing is still a relatively new technology that most home consumers are still yet to learn the benefits of. It’s still thought of as a concept that was cherry-picked out of a science fiction movie without any real merit.

It’s an assumption that couldn’t be more true, as 3D printing has actually undergone a number of exciting developments over the last couple of decades. Even still, there are probably many who are wondering, “what is 3D printing? What can it do for me?”

These questions (and many more) are exactly what we at PC Guide are here to answer. This page is your hub to everything you need to know about the world of 3D printing, its history behind 3D printing, and its uses today.

History Of 3D Printing

Whilst you might assume that 3D printing is still in its infancy, which in some ways it very much is, additive manufacturing technology has actually been around for the last 40 years.

The Financial Times has recently reported it as being “bigger than the internet”, which goes to show how technology can evolve and develop over time into what they are today.

You can date the earliest record of 3D printing back to May 1980, when Dr. Kodama filled out a patent application in Japan, but you can trace it further back to its origins in 1986 when Charles Hull patented his stereolithography apparatus (SLA). He then went on to co-found 3D Systems Corporation, which is now a household name in the 3D printing industry.

It was this company that created one of the first machines to utilize 3D printing technology, and they’ve only gone on to develop their products and make new strides in this field.

However, it might interest you to know that only in the late 1990s was 3D printing truly acknowledged for the potential you see it beginning to touch upon today.

Since then, there have been major efforts to better understand this technology.  One example of this was in 2005 when it became apparent that 3D printers had evolved to the point where they could basically build themselves. Who knows where we’ll be with it in another twenty years!

What Is 3D Printing?

3D printing is the production of parts and system components which are typically stronger, better quality, and more lightweight compared to their more traditionally printed counterparts.

What this essentially entails is the creation of a three-dimensional digital design by layering material on top of itself in order to build a physical model that replicates this design exactly.

At its core, additive manufacturing technology provides the basis for 3D printing, which is an entirely new and unique printing process compared to anything else currently on the market.

This is different from subtractive manufacturing, which is the process of cutting out sections of a type of material such as metal or plastic, using a tool like a milling machine, for example.

In order for 3D printing to work, you’ll need to design your digital model.

There is a wide variety of software available that you can use to design your 3D model, each with a number of different tools ranging from industrial level to open source.

We believe the best software to start out with when you’re still learning the ropes of 3D printing is Tinkercad, which is free and can be used in-browser without needing to install it.

There are lessons offered for beginners and once designed, you can export your model as a printable file, like .STL or .OBJ, for example. Once the file is ready, you will need to get it prepped and ready for your 3D printer, which is what’s known as slicing.

In order to be ready for printing, your 3D design needs to undergo a process called slicing, done using special slicing software. This essentially means your 3D model is sliced into thousands of layers, ready for your 3D printer to layer the material as it builds your design.

Your digital design turned printable file will now be ready for printing, and you can transfer the design to the printer via a USB, SD, or Wi-Fi connection.

Read More

Blog Post Title

What goes into a blog post? Helpful, industry-specific content that: 1) gives readers a useful takeaway, and 2) shows you’re an industry expert.

Use your company’s blog posts to opine on current industry topics, humanize your company, and show how your products and services can help people.

Read More

Compulink Technologies Now A Lot 3 (Cloud) Vendor For Cisco’s NYS OGS Contract!

Compulink Technologies has recently been awarded as a lot 3 vendor for Cisco System’s New York State OGS Contract! Lot 3 is Cloud Services and this means that Compulink can sell cloud products and services to New York City and State public institutions while leveraging the OGS Contract.

Compulink Technologies holds a strong, longstanding relationship with both Cisco Systems, and the procurement community in New York. As we reach a new normal under the novel COVID19 pandemic, we need to become flexible with how we approach IT. This includes having a hybrid approach to our IT environments that enable our teams to access their work and data from anywhere. Since the need for cloud services is quickly growing across sectors, we are excited to become an IT Resource to public institutions, and small-medium sized businesses.

Under Lot 3 of Cisco’s OGS Contract, Compulink is able to better assist with the following solution sets:

Cisco Flex

Get cloud, on-premises, and hosted collaboration in a user-based subscription. You can buy meeting, team collaboration, calling, and contact center services for all employees, or simply purchase what you need today and grow at your own pace. With the Flex Plan, one agreement includes software, upgrades, and support.

Cisco Webex Meetings

Don’t let being away from the office slow your business down. Experience engaging, productive meetings from wherever you are.

Cisco Webex Meetings delivers over 6 billion meetings per month, offering industry-leading video and audio conferencing with sharing, chat, and more. 

General features:
â€Ē Join and present from any meeting, event, or training session
â€Ē Hands-free voice commands with Google Assistant and Google Home Hub
â€Ē Seamless joining directly from your calendar or customizable widget
â€Ē Schedule meetings or playback recordings directly from your app
â€Ē Customizable video layouts
â€Ē Share your screen to everyone

 

If you have not considered cloud solutions for your organization’s IT environment yet, do learn more about it! Contact the Compulink team to learn more about how cloud solutions can benefit your IT environment!

Read More

IT Concerns About Consciousness In The Cloud

In May 2020, Amazon Prime Video released a new show called Upload. The premise of this show was that it was in the future, and there is a new technological tool called “Upload” sponsored by the company Horizon Technologies that enabled individuals to extend their lives by uploading their consciousness into the cloud. They navigate the digital atmosphere through their avatars which are designed to look like them. Uploads also need to pay for perks such as food, drinks, stay, and other types of experiences in their environment. The characters escape into the deep web to purchase illicit services and upgrades for their avatars.

The show delves into many interesting philosophical questions such as whether the uploads are actually alive or deceased, and the ethical connotations of individuals living in the physical world developing a connection with the “deceased” who are uploaded into the cloud.

There was one interesting incident in the show that was worth noting if you follow information technology. The uploads are all stored in a datacenter located on-premise. So this was a hybrid cloud. In this incident, an unknown character attached a device to the datacenter that caused a shock throughout the network. This affected the entire graphics of the system and put the overall digital atmosphere at risk.

As part of the IT industry, the disruption in their datacenter was alarming. I have come up with a few suggestions for IT environments that will be handling these types of software-based consciousness:

Disaster Recovery and Backup

If the data you are storing in the cloud is vital to your organization, as it is for most, then disaster recovery backup solutions are essential to have in place. With the proper disaster recovery solution, your data will be protected during emergency disasters. Typically in a disaster recovery solution, when a datacenter faces a physical or cyberthreat, the data automatically transfers into another datacenter in a separate location. In the show, if Horizon Technologies had a disaster recovery in place, the sensitive data (human consciousness) would be well protected in the event of a disaster.

Cybersecurity

Since in this show, human consciousness are digital entities, they are prone to cyber attacks. The uploads interact directly with their customer service personnel which are individuals in the physical world. The customer service professionals work through a user interface on their office desktops and speak through a microphone and virtual reality gear.

This direct interaction on the office desktops can make the programs vulnerable to threats. In the employees’ desktops, there can be a cyber breach via phishing emails, or web access. To take preventive measures against this vulnerability, the company should adopt high-level firewalls (which they probably already have), email security gateways, and insider threat detection. This can help protect some of the actual lives at stake in this cloud environment from cyber breaches that can literally impact their conscious existence.

In Summary

Every IT environment has delicate data involves sensitive work for the organization involved. In this case, the data are the extension actual human lives and conscious realities. So when it comes to a product as crucial as this, it is important for the decision makers of the organization to develop a robust, IT solution with attention to security and data recovery.

This is not isolated to the fictional company in the television show. It applies to all different types of companies in reality as well. Every company and organization deals with products, services, and data that are sensitive and require protection measures. It is vital for IT and management to align on their environment in order to ensure business continuity, and overall protection of the organization at large.

Read More

Classroom Management Is Now an IT Matter

The recent COVID19 Pandemic has proven to us that education is an important cornerstone of our society. It is economically crucial to have an educated populace in order to boost the exchange of ideas and help advance areas of society such as technology, science, public policy, etc. In order to maintain quality education; the necessary IT tools and resources need to be made available. Nowadays, schools have adopted remote learning. HP Inc.’s Classroom Manager is a trendy solution that we found would benefit education tremendously.

It is not uncommon to find situations where teachers and students are all in a room full of computers doing work together. However, when students are engaged with the computers, distractions can easily arise. Students can be working with other types of content instead of the main lesson at hand and the educational effort of the teacher would be wasted. HP’s Classroom Manager can address this ordeal.

With Classroom Manager, educators can manage the content that students are exposed to and both teachers and students can share screens. Students can share their screens to present their work to the rest of the class. Teachers can also share their content, avoiding a disconnect on the learning process between the students and the teachers.

Here are the following features teachers have from this solution:

  1. Lock/unlock: Ensure students focus by locking student screens
  2. Blank all: easily clear all students’ devices with a click
  3. Message: Send messages from the teachers’ device to one or all student devices selected.
  4. Help Requests: Students can discreetly alert the teacher when they require assistance.
  5. Student Screen monitoring: View all student screens from the teacher’s PC. Double-click to take control
  6. Q&A: The Question and Answer mode enables the teachers to conduct both individual student and peer assessment scores.
  7. Web Launch: remotely launch a selected website on student devices.
  8. File Transfer: Teacher can quickly transfer file to one or multiple students

This collaborative solution can keep classes synchronized when it comes to the educational progress. HP’s Classroom Manager is a tool for teachers. While the current pain point is that centralizing the productivity has its challenges with every student and teacher in a different location, HP’s Classroom Manager can fine tune how the teachers and students get their point across and make for an improved remote learning experience. Social distancing does not have to mean a reduced quality of education.

For more information on Remote Deployment, click on the image below!

Read More

Compulink Status Update March 30

The Compulink Team has spent two week working remote thus far.  While this is an adjustment period for all sectors, we wanted to provide you a status update for our operations.  Compulink Technologies operations are still running and we are able to take orders.

Last week we accepted multiple emergency procurement orders and we are still able to take more orders.  Additionally, we are working remote with access to our emails and calls to the office route directly to individual cell phones after you dial the extension.

We wanted to reiterate our commitment to supporting both public and private institutions in these trying times and helping keep our public infrastructure alive.  If there is anything you or your agency needs assistance with regarding Information Technology, do not hesitate to contact Sales@compu-link.com.  Click below to reach this email directly.

Read More

K-12 Education Has Gone Remote!

Due to the CoronaVirus Outbreak and the social distancing practiced by the masses, schools and universities have closed. Public Schools are said to be closed until at least April 30. While students were excited for the time off as a vacation, the education system has adopted a remote access model for students and teachers to access at home.

Students and teachers are using Microsoft Teams to communicate and each different class has their own chatroom. Parents are expected to ensure students are remaining productive in their homes. While schools are closed due to social distancing initiatives, this is an important initiative to help the education system continue.

Official information on Remote Learning Can be found here)

However, there have been some setbacks in remote education. A remote education system being suddenly implemented is under the assumption that every student has access to a computer at home. This is not the case. Many students began remote learning last week without the proper tools. Some households have one computer and two or more students that need to use it simultaneously.

The City is purchasing devices for students who live in public housing and are from low income neighborhoods. New York City Schools Chancellor Richard Carranza estimated that there are a shortage of 300,000 devices across the city that will be provided to the students in coming weeks.

Compulink Recommendations

While the New York City Department of Education is currently purchasing laptops for students; there will be an adjustment period. After laptop devices, students may not have the proper headphones or other supplementary hardware to be engaged with the education.

Remote education was a sudden adoption which will cause initial hurdles in the process. It is highly advisable that when schools are back in session, teachers begin to increasingly incorporate laptops into the educational process. This would help the access to education become remote-friendly. Should students need to be home or have a homework packet during vacation, they are able to use their laptops to resume work.

Read More

Compulink is a Certified MBE in New Jersey

Compulink Technologies became officially certified as a Minority-Owned Business Enterprise (MBE) in the State of New Jersey this week. This means that Compulink can help New Jersey based public institutions and business enterprises can meet supplier diversity goals.

Compulink Technologies is a certified Minority-Owned Business Enterprise in the City and State of New York. Because of our extensive experience with IT, strong relationships with multiple brands, and track record for procurement; we have been able to help public and private institutions in New York maintain stable, secure, and efficient IT environments.

Click here to read our case study of a recent NYC Gov Services Project

Compulink Technologies also sponsors the Compulink E-Store, a free online product research resource that can expedite supplier diversity engagement for both public and private institutions. Signing up for the Compulink E-Store is 100% free and convenient.

Read More