\"There's got to be something that the business can do even if they're not managing the network themselves.\"
\"...they have to train the employees really well to understand and make sure that every access is limited... and they have to work closer with the manufacturer and they can work with guys like us, guys like you.\"
\"Just to remind our viewers as well too, that because this is wireless, the attacker doesn't necessarily have to be within the facility to exploit any sort of vulnerability. It's wireless.\"
\"They need to have a regular review of their security posture and all of the plans and that's not happening... and they have to train the employees really well to understand...\"
\"The typical thing that they need to do is they need to actually develop a plan with the robotics manufacturer and with the guys who are supporting all that... they need to start getting those things, those plans out...\"
\"This almost sounds like that it's a third-party risk management issue where you have the robotics vendor that is responsible for maintaining and managing not only their equipment but also the connections...\"
\"Cyber criminals actually get in there and do a hell of a lot of mess for everybody. The sensors are vulnerable to ransomware. They get malware... you get a hijacking, you get a signal modification, you get intentional attacks...\"
\"And it's a really simple thing, things get hacked. Like for example, the automated robot in a car like a Jeep Cherokee, for example, you know, the sensors in the wheels facilitate the wireless communication. Well, they can be exploited by a hacker.\"
\"And this is because everything has been set up with IoT functionality—that's, you know, the Internet of Things—and most of that is connected via wireless. And, you know, it turns out that a lot of that is on a separate wireless network and is not secured.\"
\"Yeah. Well, you know, it turns out that the most targeted industry for cybersecurity issues and breaches and things like that is starting in 2023 was manufacturing. It accounts for almost 27% or so of attacks.\"