Employee Login

manufacturing, data security, nam, trade secrets, consumer trust, verizon breach report, dbir, ftc, tier 3, compliance, production

Manufacturing and Utilities

No matter the focus, manufacturers generate, store, and share very important and private information constantly. A data breach in this sector could have a massive negative impact on our daily lives. There are a broad range of threats to this sector, and the results of a breach are potentially devastating for companies that produce consumer goods. When consumers of products lose trust in a company, demand decreases and production slows. The wheels of production and manufacturing rely on a positive consumer perception, and a positive perception is dependent on data security among other things.


One of the central concerns for large or small manufacturers centers around trade secrets, how they produce what they produce. This is ultimately the differentiator for companies, and their business model relies on keeping their secrets out of the hands of the competition. Resource 1 understands the need for extremely tight information security processes and works with some of the Southeast's largest manufacturers to oversee the safe decommissioning and destruction of their IT devices.


According the the 2014 Verizon Enterprise Data Breach Investigation Report (DBIR), many of the threats to the manufacturing sector hinge on corporate espionage, trade secret and intellectual property theft, and general mishandling of sensitive information.

Current and former employees of large and small manufacturing companies pose a specific threat, and can wreak havoc if there is any lapse in the IT security environment. When asked what the source of a large percentage of security incidents was, many IT professionals in the manufacturing sector cited employees (current and former) as most likely sources.


A secure IT environment requires an eye on all of the various avenues for malicious intruders, and taking care at the final stage of IT device disposition (Tier 3) is paramount to a fully compliant and secure ecosystem.

Public and Private Utilities have always posed a threat to local, state, and federal governments because they operate such vital resources that, in the wrong hands, could lead to massive disasters and loss of life. This, coupled with the emerging importance of green technologies and "smart" grid infrastructures to better implement and allocate energy to consumers, has caused a shift in thinking from traditional methodologies to more advanced and intensive thinking. NERC-CIP (North American Electric Reliability Corporation Critical Infrastructure Protection) has recently transitioned from version 3 to version 5 in their protocol, and along with this transition means more focus on critical infrastructure protection from threats near and far.


It is obvious that we should focus extreme efforts on security of utilities when we think about nuclear energy, but perhaps less obvious and arguably just as important to allocate resources to protecting all forms of utilities. If control of a dam were to be maliciously obtained for wrongdoing, millions could be at risk. In 2014 Black & Veatch’s Strategic Directions: U.S. Electric Utility report was released outlining the direction the United States must take in order to more thoroughly and securely protect the nation's critical utilities infrastructure. Among the points outlined is physical security not only of plants and access, but also information pertaining to plants and access. This means that the employee operating procedures for information bearing devices containing data integral to standard operations must be treated just as delicately as the codes to the door of the plant itself.

As manufacturing systems continue to integrate across the globe to streamline production, securing these networks that pass highly confidential trade and process information is a key to success. Resource is there to make sure your company's IT secrets remain so.


For more information about any of the resources provided, contact one of our representatives today. We know that an informed populous is a safe populous, and will continue to offer information and tips to staying safe and secure in our technological age.

About Resource 1



Resource 1 is a regional leader in the on-site destruction of data bearing hard drives and backup tape media. Our highly secure NAID AAA Certified destruction processes, coupled with our state-of-the-art machinery and environmentally conscious practices, make securing your organization's most important information easier than ever. We have  met or exceeded all government and legislative regulations and mandates overseeing the proper destruction and disposal of data bearing devices and decommissioned IT equipment, and ensure that everything we handle will be thoroughly and securely destroyed and never recovered.

National Institute of Standards and Technology Better Business Bureau Recycling Industry Operating Standard National Security Agency Health Insurance Portability and Accountability Act Information Systems Security Association International Association of Information Technology Asset Managers US Government Verified Vendor