
Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.
Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.
While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.
The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.
Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.
Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.
While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!
This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.
Types of cyber threats
Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.
Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.
Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.
Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.
Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.
Zoom Bombing: Intruders hack into online meetings.
Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.
Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Dark web: It is an underground online community where criminals can go to buy and sell your personal information.
Defense
All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.
A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.
It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.
Michelin Fully Deploys TreadEye Technology Across US Retread Network
- By TT News
- October 17, 2025

Michelin has announced the full deployment of its proprietary TreadEye technology across the Michelin Retread Technologies franchise network in the United States. TreadEye is a technology developed to enhance the retread process and deliver value to fleets.
The company stated that TreadEye is a tread depth assessment tool that helps fleets maximise their tyre investment. The system collects 1,200 measurement points accurately and consistently, providing insights into tread wear and casing condition.
Key benefits of the TreadEye technology include:
- Identification of pull points by fleet location.
- Maximisation of rubber on the road by helping to avoid early pulls.
- Helps in prevention of casing damage and helps reduce DOT violations.
- Helps reduce downtime from late pulls.
- Improved efficiency in the tyre removal process, directly affecting a fleet’s bottom line.
Nate Kirian, Vice-President of Sales and Distribution, Commercial Business Lines for Michelin North America, Inc, said, “TreadEye is a game-changer for our retread operations and for the fleets we serve. It’s a powerful example of how Michelin continues to innovate in ways that directly benefit our customers.”
TyreSafe And NTDA Unite For Road Safety
- By TT News
- October 17, 2025

In a significant move for UK road safety, TyreSafe, the nation's dedicated tyre safety charity, has formed a landmark partnership with the National Tyre Distributors Association (NTDA). This alliance represents a powerful consolidation of industry voices, uniting manufacturers, distributors and safety advocates behind the common goals of enhancing road safety, elevating professional standards and promoting positive behavioural change among motorists.
This formal collaboration brings together two central organisations within the automotive aftercare sector. By combining their strategic objectives, they aim to amplify crucial safety messages and deepen engagement with the frontline professionals – retailers, fitters and technicians – who directly influence driver habits. The NTDA, a leading trade association founded in 1930, represents over 300 companies operating more than 2,000 retail outlets across the country, from major national chains to independent family-run businesses.
The partnership will facilitate joint public campaigns, shared research projects and the development of educational resources designed to help both consumers and industry professionals better understand the critical importance of correct tyre maintenance and timely replacement. This collaborative effort is bolstered by compelling new data from the NTDA's recent TyreCheck 2025 study, which examined over 58,000 vehicles. The research revealed a concerning increase in the number of tyres nearing the legal minimum tread depth, underscoring an urgent need for renewed public education on what constitutes a truly roadworthy and safe tyre. Ultimately, this unified initiative marks a new era of cooperation, driven by a shared vision to eliminate the dangers posed by illegal and defective tyres on Britain's roads.
Stuart Lovatt, TyreSafe Chair, said, “This partnership represents a pivotal moment for the tyre industry. TyreSafe and the NTDA share a common goal – to make tyre safety a central part of the national road safety conversation. By combining TyreSafe’s public awareness and behavioural insight with the NTDA’s trade expertise and nationwide reach, we are uniting every part of the tyre supply chain behind one clear message – safe tyres save lives. Together, we can make that message stronger, more consistent and more effective than ever before.”
Ian Andrew, CEO, NTDA, said, “The NTDA has long been committed to raising standards across the tyre trade and promoting the professionalism of our members. Working collaboratively with TyreSafe allows us to take this commitment to the next level – ensuring that retailers, fitters and technicians play a central role in improving driver understanding and road safety outcomes. This partnership will help unify our industry around shared goals, driving both cultural and practical change.”
Yokohama Rubber Expands Versatran Hydraulic Hose Lineup
- By TT News
- October 16, 2025

The Yokohama Rubber Co., has added a new hose with a 3/8-inch (9mm) inner diameter and a 4-spiral structure to its Versatran ISO Series of hydraulic high-pressure hoses for markets outside Japan. The sales of the new hose has already started in September 2025.
The development, the company shared, responds to increased demand from underground mining sites for hoses with small diameters and high durability to fit narrow spaces and improve operational efficiency. The new 3/8-inch hose conforms to the highest durability standard, DC Type of the ISO18752 international standard. It also meets the flame-retardant standards of the U.S. Mine Safety and Health Administration (MSHA), ensuring safety under demanding conditions.
The hose is described as flexible and easy to manoeuvre, allowing for greater freedom in machine design and more efficient maintenance.
The addition of the new 3/8-inch hose expands Versatran's lineup in the 42MPa specification to include inner diameters from 3/8 of an inch (9mm) to 2 inches (50mm). This is expected to broaden the lineup's appeal across various markets and applications beyond mining machinery.
Yokohama Rubber's Versatran brand also includes the 4SH/4SP Series (meeting the EN856 European Standard) and the R1/R2 Series (complying with the EN853 and the US Society of Automotive Engineers (SAE) J517 standard). The company views its hose and couplings business as a key growth driver under its Yokohama Transformation 2026 (YX2026) management plan.
- BKT
- Balkrishna Industries
- Cricket Australia
- T20
- BKT Tyres Men's ODI Series
- BKT Tyres Men's T20 International Series
- Todd Greenberg
- Rajiv Poddar
BKT Secures Naming Rights For Australia-India Cricket Series
- By TT News
- October 16, 2025

Balkrishna Industries (BKT), an off-highway tyre company, has been named Cricket Australia’s (CA) naming rights partner for the Men’s One Day International (ODI) and T20 International series against India.
The matches between Australia and India will be titled the BKT Tyres Men’s ODI Series and the BKT Tyres Men’s T20 International Series.
The three-match BKT ODI series is scheduled to begin in Perth on 19 October, followed by the five-match BKT T20I series starting in Canberra on 29 October.
The partnership reinforces BKT’s existing association with cricket and reflects its commitment to advancing the sport globally. CA’s leadership is visiting India this month to engage with key stakeholders, highlighting the significance of the partnership between the two countries through sport.
Todd Greenberg, CEO, Cricket Australia, said, “We’re delighted to welcome BKT Tyres as the Naming Rights Partner for these marquee series. Their passion for cricket and dedication to creating immersive fan experiences align perfectly with our vision for the sport. We’re expecting huge crowds across Australia for the eight matches in the ODI and T20 series and it’s great to have a partner who shares our excitement about this series and for the game itself.”
Rajiv Poddar, Joint Managing Director, BKT, said, “This partnership with Cricket Australia marks a strategic milestone in strengthening BKT’s global footprint and deepening our connection with key markets where cricket is more than a sport — it’s a shared passion. As an Indian-origin company with a strong international presence, we see this collaboration as an opportunity to build brand equity, create meaningful engagement with fans across both India and Australia, and celebrate the values of performance, resilience and teamwork. Australia has been a key market for us for over a decade, and we are excited to elevate our journey in line with our ‘Growing Together’ philosophy.”
Comments (0)
ADD COMMENT