Implement a Mes safely
Filippo Nalesso
Industrial Engineering Consultant | Fractional Manager | Supporting Lean Transformation & Operational Excellence | Lean Six Sigma & TWI Trainer
How to successfully complete a digital transformation without being victimized by cyberattacks.?The incorporation of digital technologies into machinery and production lines leads to a reduction in waste and inefficiencies, this leads to an increase in efficiency and the ability to monitor and maintain the machinery remotely. However, it also has problematic aspects: a remote system that is connected and accessible is potentially more susceptible.?Here, besides evaluating the technology that is most appropriate for your needs, you must also invest in defense against cyber attacks.??
The production of goods is crucial to increasing efficiency and productivity.??
First, we must understand why data collection and monitoring systems, such as the MES software, are crucial to analyzing processes, discovering hidden costs and optimizing production. Today's markets are increasingly complex and unpredictable: it is therefore important to save time and make effective decisions quickly, whether dealing with operators, department heads or plant managers. This is necessary to have systems that collect data at the same rate as the products.?A successful MES facilitates not only production control, but also the sharing of data on Andon, the management of activities on direct and indirect operators, the capacity scheduling of all orders, traceability, preventive maintenance, and the generation of control plans automatically. Additionally, we can monitor energy consumption for individual orders for machines and shifts, we understand that energy management is of paramount importance to the company today.??
A legacy to preserve??
The information obtained by the Mes can be utilized:??
领英推荐
This is why production data are of paramount importance, they represent true knowledge that must be preserved and protected.?Particularly harmful are the Killware that are able to alter the parameters of infrastructures. By altering the production process, it is possible to cause significant damage to companies (e.g. The process of smelting iron was a dangerous endeavor, as it involved raising the temperature of a blast furnace to the point that it could explode.??
How to prevent OT attacks??
Many cyber attacks begin with a single click that is intended for a different location. The frequent misuse of VPNs and other remote working methods that increased during the pandemic, but also outdated technology and an incorrect convergence between IT and OT.??
Have you read the previous articles about the MES? If you are curious to read the previous articles of THE NEW ENGINEERS, join the Linkedin page or subscribe to the Telegram group.?