Presented by Minnesota Manufacturing Executives (MME)

IT Consulting Sponsor

Scott Wiyninger
6130 Golden Hills Drive
Golden Valley, MN 55416

Craig Jacques
6130 Golden Hills Drive
Golden Valley, MN 55416

Intellectual property is the lifeblood of every manufacturing company. Your company’s IP, whether that’s patents, formulas, designs, client lists, or financials, are likely more valuable than its physical assets. And, as a result, your IP is a target for cyber-attacks. Even more, technology has evolved and empowered manufacturers in a variety of ways, and companies have become increasingly reliant on IT and its automation capabilities for their daily operations. Therefore now, more than ever, your cybersecurity strategy is vital to protecting your intellectual property and to avoiding major disruptions to operations and the delivery of your products. SUCCESS has developed these principles and more to guide your
decision-making about security:

Behavioral analysis

The traditional security tools that have been in place for decades (firewall, antivirus, antispam, antimalware, patching/updates) are still an important
part of the security solution but are no longer sufficient to protect business networks against modern attacks on their own. New tools and resources
are required to protect, detect, and respond to the evolving threats that exist today. A modern security solution will include behavioral analysis and alerting on specific network events:
• Network logins at odd times
• Administrator account creation
• Elevation of rights
• New software installed on high value assets
• Document and review sensitive data and where it’s stored
Performing behavioral analysis in addition to traditional security tools is essential to increasing visibility in your environment and reducing the number of days a bad actor has access to your infrastructure.

Use a multi-layered approach

Contrary to popular advertising, there is no single tool or technology that provides comprehensive security protection on its own. Security depends
on the careful combination of intrusion prevention/threat management (firewall) appliances, antivirus software, patch management and other tools, combined with human behaviors that protect security as well.

Patch and update

Don’t be “low-hanging fruit” for hackers who often search for devices that don’t receive security updates and patches on a timely basis. Today, any
device that connects to your network or your data should maintain an up-to-date patch status that is centrally managed and monitored.

Conduct regular logging/audits
Business-class security tools should be configured to log activity, including security events, changes, and configuration information. If you don’t have a process to continuously gather and review logging information, you will likely be unaware of security vulnerabilities or exploits that occur on your network. This leaves your ability to troubleshoot these events significantly reduced.
Enforce policy
Security is not a piece of software but a system of technology tools, monitoring systems, rules and human behavior that work together to mitigate risk on an ongoing basis. If an organization invests heavily in expensive, sophisticated security technology but fails to enforce consistent security policy, they are at great security risk. Each network must have an up-to-date written security policy whose rules and settings are reflected in system policies and configurations.
Let’s get started.
Our mission is to empower your business with the best and most appropriate technical infrastructure. Partnering with SUCCESS enables you to move beyond worrying about the next attack, allowing your business to focus on growth instead of security.
Why work with SUCCESS?
In the simplest of terms, our behavior is guided by a production methodology of having excess capacity or  “too much of everything” in order to deliver on our promises to our clients. Compared to other service providers, we don’t consider a “bench of people” underutilized resources that must be cut from the budget, but a necessary requirement to provide responsive service to our clients and future clients. Our goal is to make good on our promises. To help us achieve this we must be able to consistently deliver not just when things go right, but also when “Murphy’s Law” hits or opportunity strikes. Our competition looks to operate “efficiently”; we strive to meet the needs of our clients.