Shop Financials: Automotive Technology Isn't All Under The Hood - Engine Builder Magazine

Shop Financials: Automotive Technology Isn’t All Under The Hood

Like our cars, many of us take our computer systems and networks for granted. Once they are installed and working, we tend to forget about scheduled maintenance and security.

Since most of the services that our companies require are on the Internet, we are forced to get access to stay current with technology. When on the Internet, there is no such thing as being 100 percent secure but if you take the proper precautions and keep your safeguards up-to-date, you will be less vulnerable to viruses and other attacks.

You should always have a firewall, an anti-virus protection program, keep all of your software up-to-date, and never open an email that has an attachment which you are not expecting. It is easy for a virus to exploit email clients by adding malicious code inside email that will automatically run if you open or preview the attachment. Most viruses are network aware, so adding a firewall device will block virus attacks from the Internet. Use passwords to protect your shared network and resources. Keep your software and operating system up-to-date, and this will minimize the known vulnerabilities and security exploits on your network. Anti-virus protection (if kept up-to-date) will catch viruses that have gotten through other layers of protection. Negligence in these areas can be detrimental to your business if your customer credit cards are stolen or your bookkeeping records are destroyed. Don’t risk your livelihood by doing nothing when it is easy to protect yourself.

Biggest Threats

  1. Internet access without a firewall: A firewall is a device that helps control and or block network traffic. Networks without a firewall share the same resources with the Internet as they share with the local network computers.

  2. Inadequate anti-virus protection: Some fail to keep the protection up to date while others ignore the risk until it is too late, losing money, and irreplaceable data. Even if there are current backups, there is a high probability the backup was infected.

  3. Security policies: Not enforcing a security policy is like not having one at all. Make sure there are policies covering Internet usage, installing third party software, and email usage, etc. Knowledge is the most powerful tool in securing your network.

  4. Software updates: Always keep your operating systems and software up-to-date. When a security bug is reported, most companies have a patch or a hot fix (software or operating system update) ready to download to repair your system.

  5. Disaster Recovery Plan (DRP):
    Internet access without a firewall is like welding on a half full gas tank without goggles. Every time you connect, you are looking into the face of disaster while not seeing how dangerous the situation is. You also open yourself up for anyone and everyone to view/edit/delete the contents of your system. This includes financial records, customer databases, and personal information.

Inadequate anti-virus protection is as bad as not having virus protection at all. If the anti-virus software is not up to date, you are not protecting yourself from new viruses (10-20 new viruses or variants are created every day). Anti-virus companies usually have updated virus definitions (software updates) 24 hours after a spreading virus is discovered.

Security policies are the crux of every business information system. Unfortunately, most people do not realize the importance of having security policies in place. These policies let employees know what is expected of them and what penalties may be enforced from non-compliance. There are increasing cases of legal issues arising from companies being infected by viruses and cyber thieves, who then use the infected network to attack other target organizations or systems. The end victims are now starting to sue the unprotected network owner by reason of downstream liability. Security policies that are in place and enforced minimize the potential liability Software updates are available to fix bugs and security holes that are in your current software or Operating System (OS). However, there are times that these updates open up new security holes that viruses and cyber criminals can exploit. These vulnerabilities are usually patched up soon after the exploit is discovered. This is why frequent checking for updates on a scheduled basis is good policy.

DRPs are important because they give employees direction for when something goes wrong. A DRP should contain easy-to-access contact information for parties that are needed for a speedy recovery. Contact information should include parties such as:

  • Internet Service Provider

  • Business Management Service provider

  • Computer/network technician

  • Power Company

  • Telephone Company

  • Company managers

  • The owner.

IT should also contain a “To do” list for when certain situations happen. For example here are the steps you should follow to safeguard your computer equipment in case of a power failure.

  1. Save work and shut down systems before battery backups shut down.

  2. Backup current data.

  3. Properly shut down all computer/network equipment including switches/routers.

  4. Using an analog phone or cell phone, call the power company at a predetermined number easily located.

In the case of a network failure:

  1. Backup data if possible and proceed until the issue is resolved.

  2. Restart local computer.

  3. If not localized to the one system, restart server.

  4. Shut down entire network including all switches for 5 minutes.

  5. Turn switch on.

  6. Turn server on and log on.

  7. Turn on computers/workstations/printers

  8. Call your predetermined computer/network technician.

More detailed information can be found at www.securitydocs.com/
go/2397.

Jeremy Martin is the Director of Communication for PLUSS Corp., a business management service provider for the automotive and heavy duty trucking industries, and holds the computer industry’s top security certification, the CISSP. [email protected]

You May Also Like

The Road to AAPEX Season 2, Ep 1

Last year, the idea was simple: Find a junker, fix it up with the best from the automotive aftermarket, and drive it to Las Vegas for AAPEX 2022. This year, it’s anything but simple. The automotive aftermarket is at the crossroads of change. Electric vehicles, driver assistance systems, autonomous vehicles, sustainability—it’s a shifting landscape. This

Last year, the idea was simple: Find a junker, fix it up with the best from the automotive aftermarket, and drive it to Las Vegas for AAPEX 2022. This year, it’s anything but simple.

The automotive aftermarket is at the crossroads of change. Electric vehicles, driver assistance systems, autonomous vehicles, sustainability—it’s a shifting landscape. This year, the Big Bosses at AAPEX, Bill Hanvey, president and CEO of Auto Care Association, and Paul McCarthy, president and CEO of MEMA Aftermarket, offered a challenge. Babcox Media’s Joe Keene, an ASE-certified technician, couldn’t refuse: Find and fix a rare Lincoln Blackwood and drive it down the Lincoln Highway to AAPEX 2023.

What’s a Ford Sidevalve Engine?

It looks like an ordinary inline 4-cylinder flathead engine. Essentially it is, but it has quite a cult following here in the UK.

The Drag & Drive Revolution

Following that first drag-and-drive event back in 2005, spinoffs of Drag Week have been happening all over the country, and the world, both large and small. In recent years, the trend has been completely blowing up!

The Evolution of Pro Mod Diesels

The advancements within the performance diesel world over the past 20 years have been nothing short of phenomenal. In fact, within just the last five to 10 years, that progress has been even more rapid and impressive, but few progressions have been more astonishing than those within the Pro Mod Diesel realm.

Top Fuel and Funny Car Engines

They’re the pinnacle of drag racing, and the engine builders, crew chiefs and teams who make these cars function at peak performance all season long are looking at every single area of the engine and the car to make it down the track as fast as possible.

Other Posts

Race Oils

Choosing the correct performance racing oil is essential to ensure optimal performance and longevity of your engine.

Facts About Engine Bearings

The experts all agree that cleanliness is the most important factor during installation, and the lack thereof is the most common problem that leads to bearing failure. But measuring is just as critical.

Does Connecting Rod Length Matter?

Over the years, we’ve gotten asked numerous times about connecting rod length and the impact that has on an engine’s horsepower and durability. As it turns out, this question is often overthought. It’s not so much the connecting rod length that matters as much as it is the correct piston pin height. The connecting rod

LTR Engine Build

This Late Model Engines build is centered around Concept Performance’s new LTR block, which is the first aftermarket as-cast aluminum Gen V LT block.