
Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.
Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.
While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.
The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.
Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.
Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.
While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!
This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.
Types of cyber threats
Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.
Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.
Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.
Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.
Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.
Zoom Bombing: Intruders hack into online meetings.
Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.
Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Dark web: It is an underground online community where criminals can go to buy and sell your personal information.
Defense
All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.
A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.
It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.
- Marangoni
- Tyre-Retreading
- Tyre-Retreading Machinery
- Sustainability Plan
- Sustainable Development Goals
Marangoni Unveils 2025-2027 Sustainability Plan
- by TT News
- April 03, 2025

Leading tyre-retreading machinery maker Marangoni has unveiled a new strategic sustainability strategy for 2025–2027 that reaffirms its social and environmental pledges.
In order to direct and oversee its ESG (Environmental, Social, Governance) initiatives during the ensuing three years, the tyre retreading expert has voluntarily created a targeted action framework. The framework is in line with the 17 Sustainable Development Goals (SDGs) of the UN's 2030 Agenda. Marangoni claims that the plan was implemented in accordance with globally accepted standards, such as AccountAbility 1000 and the Global Reporting Initiative (GRI) guidelines, and that it is meant to function as a monitoring tool to periodically assess the company's progress as well as a guide for action.
The company has identified 17 specific initiatives as part of this strategy. These were established after a materiality study that took into account input from external stakeholders as well as internal input. Each of the 17 initiatives is built around three core pillars, namely supporting the ecological transition, integrating ESG principles into corporate governance and ensuring a safe, stimulating and inclusive work environment. The result is a ‘balanced approach’ reflecting management’s priorities and stakeholder expectations, said the company.
- Trelleborg
- Trelleborg Group
- National Gummi AB
- Corporate Acquisitions
Trelleborg Acquires National Gummi AB
- by TT News
- April 03, 2025

Trelleborg Group has finalised the purchase of National Gummi AB from the Swedish industrial group National through its Trelleborg Industrial Solutions business unit.
Extruded rubber profiles and gaskets for specialised industrial, automotive and construction applications make up the company offering. Mostly in Northern Europe, sales in 2024 were little over SEK 150 million. The production facility is situated in Halmstad, Sweden. The acquisition is in line with Trelleborg's plan to establish dominant positions in desirable markets. This deal excludes National's activities outside of extruded rubber profiles and gaskets, which will continue to be a part of the National group.
Jean-Paul Mindermann, Business Area President, Trelleborg Industrial Solutions, said, “This is an exciting addition to our portfolio. National has specialist capabilities and knowhow which will allow us to broaden our value-adding offering to customers across Europe.”
- BKT
- BKT Tyres
- Agricultural Tyres
- AGRIMAX SPARGO SB
- Steel-Belted Tyres
BKT Launches Steel-Belted Version Of AGRIMAX SPARGO SB Tyre
- by TT News
- April 03, 2025

BKT has expanded its AGRIMAX range of agricultural tyres with the launch of AGRIMAX SPARGO SB, a new steel-belted version. The new tyre is aimed at row crop, vineyard and orchard operations to meet the specific challenges of farming environments where steep terrain, narrow row spacing and muddy conditions require precision and reliability.
The new tyre, which builds on the AGRIMAX SPARGO row crop tyre, has VF (Very High Flexion) technology, which enables it to bear the same load at lower inflation pressure. This helps to improve handling and comfort while reducing soil compaction. Steel belts improve the tyre's resilience to punctures, lessening the possibility of downtime and damage from sharp objects. At faster speeds, it also enhances riding accuracy. The polyester casing and steel belts work together to distribute stress evenly throughout the tyre, preventing uneven wear and extending tread life. By reducing vibration, a revised sidewall enhances riding comfort even further, which is especially useful for precise spraying operations.
The tread pattern of the AGRIMAX SPARGO SB is more open and higher than that of its predecessor since it has a deeper tread and smaller lugs. With a D-class speed rating that permits travel at up to 65 kmph, this design seeks to enhance road handling. Smoother transitions between field and road are made possible by the tyre's dual-layer mud ejection mechanism, which rapidly removes debris from the tread.
Dilip Vaidya, Senior President & Director Technology, BKT, said, "In the case of the AGRIMAX SPARGO SB, we have paid special attention to the casing design by using a strong polyester structure that offers greater strength, flexibility and durability than traditional materials. This choice enables the tyre to handle heavy loads while keeping deformation under control, improving the footprint and thus traction, stability and handling."
- TBC Corporation
- Michelin
- Sumitomo Corporation
- Mavis Tire Express Service Corp
- Midas
- Company Restructuring
TBC To Divest Midas Franchise Portfolio To Mavis
- by TT News
- April 03, 2025

TBC Corporation, a joint venture between Michelin and Sumitomo Corporation, has entered into an agreement to divest its Midas franchise portfolio to Mavis Tire Express Service Corp., which operates a tyre retail chain across the United States.
The deal is expected to be finalised in the first quarter of the fiscal year 2025, subject to the approval of the competent authorities. This deal is a component of TBC's ongoing reorganisation, which intends to concentrate management resources on its core operations.
According to a statement issued by Michelin, “TBC distributes tyres and provides automotive repair and maintenance services in the US, Mexico and Canada. TBC identifies wholesale, distribution and Big O Tires, tyre retail focused franchise portfolio under TBC, as core businesses, leveraging an industry-leading network and scale, whereas Midas activity mostly relies on retail automotive services. The operation will enable TBC to focus on driving accelerated growth and value in its core businesses. It is also an opportunity for Michelin and Mavis to support and reinforce their commercial agreement.”
Comments (0)
ADD COMMENT