search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
6. Be careful picking up zip drives from trade shows.


Many companies still use these portable drives as giveaways at trade shows for company and product information. T ese have become commonplace in today’s world. It is also a good way for malicious software to enter your systems without you knowing it. Just be vigilant.


External Prevention and Protection When traveling, you also need to be aware you are


potentially vulnerable to malicious attacks. T ese attacks can take place in your automobile, your hotel or even a restaurant. T e following are some simple steps to take to avoid these attacks from disabling the system and stealing valuable data: Using a rental car: Personal data and information may be


at risk. According to the Federal Trade Commission, data is vulnerable through as something as simple as connecting to the car’s infotainment system that works with a driver’s personal devices so they can navigate, stream music, or use hands-free calling and texting. T e FTC suggests avoiding connecting phones or devices to an infotainment system and deleting all personal data from the infotainment system before returning the vehicle. Not deleting this data before returning the car puts you at risk of sharing it with future renters, rental car employees, or cybercriminals. T is is espe- cially important when traveling overseas. Hotel risks: Hotels are increasingly becoming targets for


cyberattacks. One can avoid risks at hotels by choosing not to use public-use terminals, instead using a virtual private network (VPN), to connect to the internet. You really do not know whether the hotel is using an up-to-date fi rewall. Keep your devices in hand always. How often have you seen people leave either their smart phones or laptops unat- tended? It is easy for a cybercriminal to walk by and quickly steal your device before you even know it. Limit your use of credit cards at some ATMs gift shops or hotel restaurants. Many malware attacks target gift shops and restaurant point-of-sales systems because they are older systems or on the periphery of network security. According to cyber security software company Trend Micro, over the past three years more than 10 diff erent hotel properties have reported a breach of their systems by malicious software. T is includes Hilton, Hyatt, and Starwood.


Brave New World A recent Forrester Research survey suggested more than


three-quarters of all employees who use smartphones at work and 63% who use tablets access their company intranet or various portal sites using their mobile devices. Nearly 82% of various recipients survived by Forrester reported they use their smartphones to read or view documents, presentations, and spreadsheets for work. T e increased use of these various mobile devices is


typically not associated with any security policies or tools to manage them eff ectively. To ward off the daily and consis- tent malicious attacks on your system, the casting industry at large will need to be vigilant. It pays to be knowledgeable in this critical area.


CORE AND MOLDING SANDS


Trust your most complex cores to INCAST®. The ideal combination of geometry, density and particle size distribution, INCAST improves critical core making and casting properties including binder utilization, permeability and dimensional stability. Higher strength cores, better surface finish and increased efficiency and yield are the INCAST advantages. These sands are engineered for the metalcaster.


For more information contact us: Phone: 203-442-2500 ContactUs@MetalCaster.com www.metalcaster.com


® INCAST and UNIMIN are registered trademarks. All rights reserved. ©2017 July 2017 MODERN CASTING | 39


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60