Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.
Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.
While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.
The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.
Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.

Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.
While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!
This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.
Types of cyber threats
Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.
Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.
Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.
Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.
Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.
Zoom Bombing: Intruders hack into online meetings.
Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.
Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Dark web: It is an underground online community where criminals can go to buy and sell your personal information.
Defense
All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.
A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.
It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.
Tegeta Green Planet And Shine Energy Inspire Eco-Responsibility In Young Learners
- By TT News
- May 23, 2026
Tegeta Green Planet and Shine Energy, both affiliated with Tegeta Holding, have launched a joint educational initiative to raise environmental awareness and a sense of responsibility among young people. The project addresses modern challenges such as environmental protection and sustainable development.
Company representatives are visiting schools across Tbilisi to hold informational meetings, presentations and workshops. The programme begins with presentations, followed by interactive games and activities designed to help students retain the information. At the end of each session, participants receive symbolic gifts and prizes as motivation.
Tegeta Green Planet focuses on teaching students the principles of specific waste management, including how to properly handle used tyres, batteries and oils. The sessions explain why proper waste management is essential for environmental protection and how it connects to the circular economy. Meanwhile, Shine Energy educates young people on the importance of energy, its everyday use and why developing renewable and sustainable energy resources is crucial.
The initiative is not limited to schools. In the near future, both organisations will expand their efforts to universities, aiming to broaden awareness about environmental protection, waste management and energy efficiency. The ultimate goal is to foster environmentally responsible attitudes among the younger generation, helping build a more sustainable and conscious society.
Zeon Earns Top Supplier Engagement Rating From CDP For First Time
- By TT News
- May 22, 2026
Zeon has been recognised as a Supplier Engagement Leader in the 2025 Supplier Engagement Assessment (SEA) conducted by CDP, a United Kingdom-based international environmental nonprofit organisation. This achievement represents the first time the company has received the highest possible rating in this assessment.
The evaluation measures how corporations address climate change within their supply chains, focusing on responses to the CDP Climate Change Questionnaire across five critical areas. These include governance, emissions targets, Scope 3 emissions management, risk management and overall supplier engagement strategies.
Zeon earned the top rating for its efforts to reduce greenhouse gas emissions through supplier collaboration, a group-wide initiative, alongside continuous dialogue maintained via procurement activities. Guided by its philosophy of contributing to planetary preservation and human prosperity, Zeon remains committed to sustainable management. The company reaffirmed that it will continue working with suppliers and other stakeholders to tackle climate change and meet societal expectations.
WACKER Announces Price Hike For Resins, Dispersions And Dispersible Polymer Powders
- By TT News
- May 22, 2026
German chemical group WACKER has announced a price increase of up to 15 percent for its resins, dispersions and dispersible polymer powders produced at its European and US facilities. The adjustment takes effect on 1 June 2026, or as existing customer contracts permit. The move is designed to allow the company’s Polymers division to maintain high product quality, deliver technological innovations and provide superior customer service and technical support. It will also support investments aimed at securing future growth in key markets.
Rising costs for raw materials and logistics have forced the pricing measure, with the Polymers division being particularly affected. The recent conflict in the Middle East has caused significant disruptions across global commodity markets. As a direct result, prices for energy, raw materials and transportation have climbed sharply.
Despite the increase, WACKER remains focused on sustaining its commitment to customer support and long-term capability. The company underscored that the adjustment is necessary to continue meeting market demands while ensuring operational stability and future-oriented development across its focus markets.
- Pirelli North America
- Closed-Loop Tyre Recycling Initiative
- Tire Recycling Foundation
- Bolder Industries
Pirelli North America Launches First Closed-Loop Tyre Recycling Initiative
- By TT News
- May 22, 2026
Pirelli North America has launched its first closed-loop circular recycling initiative, marking a significant step in the company’s broader strategy to increase recycled and bio‑based content in its tyre production. The project has received the Tire Recycling Foundation’s Value Chain Collaboration Award.
The programme recovers scrap tyres generated during Pirelli’s own North American manufacturing process. These materials are sent to Bolder Industries, which applies ISCC PLUS‑certified pyrolysis technology to produce BolderBlack recovered carbon black. Pirelli then reintroduces this material into new tyre production at its North American facilities, partially replacing virgin carbon black. The effort is part of a wider Pirelli plan to expand such industrial ecosystems across the group’s production network, aiming to valorise waste by reintegrating recovered materials into tyre manufacturing.
Beyond the award, the initiative reflects Pirelli’s broader circularity approach, which includes ongoing work to boost recycled and bio‑based material usage. The company targets over 80 percent bio‑based and recycled content in its best‑performing products and forty percent in total production by 2030.
Claudio Zanardo, CEO, Pirelli North America, said, "The Rome plant is one of the most technologically advanced manufacturing facilities in Pirelli. This initiative reflects an approach focused on increasing the use of recovered materials within existing production processes. It is part of a broader effort to gradually integrate raw materials derived from recycled resources into our products while maintaining consistency in performance and quality."
Tony Wibbeler, CEO, Bolder Industries, said, "Our collaboration demonstrates that a traceable, mass-balance approach to tyre-to-tyre circularity is not only achievable, but it's ready to scale inside a premium manufacturing environment, meeting real performance and certification requirements at every step. This is the kind of progress the industry has been working toward for many years."


Comments (0)
ADD COMMENT