Skip to main content

Do no harm


Having endured another restless night, Oscar reaches for the alarm.   His mind wanders as he recalls the nightmare which seems to be top of mind, even as the sun peaks through the windows.   Their service company,  WeHelpU was in court defending their position regarding the data breach at the "TrustMe nuclear plant".   They,  like many other service providers, WeHelpU jumped on the IoT bandwagon a couple of years ago.  It didn't take long for Oscar to become overwhelmed, current situation aside, what about the thousands of our other customers?



A couple of years ago, in 2018, we established  rules of engagement to prevent us from being in this situation, where did we fail?



  • Air Gap | at first we were very disciplined to only install non-intrusive monitoring.  As our skills and knowledge broadened we started making exceptions.   Hey, we can save some capital if we just connect to the existing control system?
  • Cellular | while very tempting we stood our ground and never connected to the clients network,  sensors to the  gateway and gateway to the cloud.
  • Anonymized | this was the trickiest of all.  Fact is we have lots of sensors and actuators which all tie to assets,  which belong to sites,  sites which belong to clients.   Whether structured data sets or metadata tags, they are all vulnerable.   The short term recall of data is powerful for scheduled and unscheduled activity and needs to relate to the customer.   Long term data is helpful for models and AI, this data should be anonymous.



Our discipline, or lack thereof, will impact our organizations and our clients.   We simply don't know what we don't know, be curious but cautious.



-----

Next post:  who's data is it?

Thoughts?  feel free to leave replies or direct message

See all of the "last mile worker" posts here:  http://lastmileworker.com

-----


Comments

Popular posts from this blog

Is custom software in 2019 spelled EGO?

I still struggle , as do many, with the rationalization between building software and buying software. Microsoft Excel , likely one of the most widely recognized packaged software applications, was released over 30 years ago . My guess is not many people would consider building a custom piece of software which performs math and other worksheet related tasks. While this is an obvious example, it highlights an important factor for many in deciding between custom and configurable software solutions . Fact is, everybody understands how Microsoft Excel works. Let's mix it up a bit and add the opinions that you have regarding what makes your approach to business so special.   The things that you do, in an industry, which are totally unique to your competitors.   This is where it gets a bit murky, we must tease out the transactional components from the value add aspects of software.   For instance, you use a staffing system to help find, manage, and retain internal and external

no one told you when to run

From the clients perspective, what is the perfect service call? "To interpret my field conditions and apply a solution which resolves the issue immediately and ensures trouble-free long-term operation. Delivered by a professional, courteous, empathetic, appropriately skilled, years of experience, materials required for repair, a good listener, and one that treats me as if I am their only customer; amen"! As you might expect the perfect service call is really a blend of attitudes, attributes, and capabilities. The trick is, while we all may agree that these aspects make the perfect service call, endeavoring to achieve these results is becoming increasingly more difficult. Our customers, with their visibility and awareness of our activities, raise the bar regarding the level of service that we need to provide. Let's unpack a few of these elements: Appropriately skilled :   haven't we all had this discussion in the past?   My workers are all

Modern tech moving us forward?

Think about some of the most recent technologies;   Solar fields, I doubt the designers considered the impact on the bird population; Facebook , do you believe that they thought about the long-term ramifications regarding how false news might be proliferated through this platform; Twitter , could anyone imagine it would be such a haven for bullies; and what about TOR, the US government "internet" built for military families use in foreign countries which has turned into the " dark web " were all sorts of things are bought and sold? I would like to believe that all of these started with the best intentions in mind. Unfortunately it is not enough to dissuade those with impure and nefarious intentions.   I continue to get excited about the future with items such as IOT and cognitive computing machines, assisting us in making better and more deliberate decisions, the other part of me gets nervous that we will inadvertently create a world of "black boxes&