Why Manufacturers Should Be Mindful Of Cybersecurity
Hackers can penetrate the corporate IT network of a manufacturing company, then gain access to a robot’s controller software and, by exploiting a vulnerability remotely, download a tampered configuration file. As a result, instead of a straight line, the robotic arm draws one that is 2 mm off. This minuscule defect, if left unnoticed, could lead to catastrophic effects in this hypothetical example — this line is responsible for welding the chassis of a car that, if compromised, could result in casualties and a vehicle recall.