EFFECTIVE CYBERSECURITY

Yokohama ADVAN Sport EV tyre to be Introduced in Intl Mkts

Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.  

Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.

While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.

The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.

Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.

Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.

While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!

This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.

Types of cyber threats

Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.

Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.

Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.

Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.

Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.

Zoom Bombing: Intruders hack into online meetings.

Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.

Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.

Dark web: It is an underground online community where criminals can go to buy and sell your personal information.

Defense

All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.

A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.

It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.

Comerio Ercole Honoured With Top Innovation Award At Tire Technology Expo 2026

Comerio Ercole Honoured With Top Innovation Award At Tire Technology Expo 2026

Comerio Ercole has concluded a successful participation in the Tire Technology Expo 2026, a premier international event for the tyre sector held in Hannover, Germany. Over the three-day exhibition, the company’s stand drew considerable attention from a global audience of customers, partners and industry professionals. The event served as a vital hub for fostering technical dialogue and commercial relationships, leading to the acquisition of new orders and forward-looking discussions that resonated deeply within the international tyre manufacturing community.

A defining moment for the company at this year’s expo was its recognition at the Tire Technology International Awards for Innovation and Excellence 2026. Comerio Ercole was honoured with the ‘Tire Manufacturing Innovation of the Year’ award, an accolade that underscores its enduring commitment to technological advancement. This achievement was complemented by the company’s status as a finalist in three additional award categories, highlighting its pervasive leadership and innovative edge in calendering technology.

These accolades reinforce Comerio Ercole’s standing as a pivotal technology partner for the global tyre industry. The recognition affirms the company’s strategic focus on engineering increasingly sophisticated solutions to meet the evolving demands of the market and shape its future trajectory.

CEAT Drives Women’s Leadership And Inclusion Through Comprehensive Workplace Policies

CEAT Drives Women’s Leadership And Inclusion Through Comprehensive Workplace Policies

CEAT has introduced a comprehensive set of policies aimed at supporting the specific needs of its women employees and fostering their professional advancement. The organisation emphasises work-life balance as a means to enhance both personal well-being and workplace productivity, offering flexible remote work options in coordination with managers. A Wellness Leave policy allows women two days of monthly work-from-home or leave during menstruation without requiring justification, while shopfloor employees can access on-site Occupational Health Centres for shift changes or rest as necessary.

To cultivate leadership and career growth, CEAT has implemented targeted programmes such as Womentoring, the Women Accelerator Program and STARS, which focus on building digital, functional and leadership competencies. The EmpowHer Employee Resource Group further promotes inclusion and facilitates open dialogue within the organisation.

The company also provides extensive support for mothers, including 26 weeks of paid maternity leave, hospitalisation coverage and facilities such as crèches and lactation rooms across offices and plants. Returning mothers can benefit from flexible hours and a reduced four-hour workday until their child turns one, while shopfloor workers are assigned morning shifts during the first year after childbirth. A gender-neutral Child Caregiver Travel and Stay Policy ensures that caregiving responsibilities do not hinder career progression.

In manufacturing, CEAT has enhanced accessibility by introducing automated machinery, ergonomic fixtures and lift-assist devices. These changes have contributed to a 20 percent women workforce at the Chennai facility and 28 percent representation on the Nagpur shopfloor, which was the first in Maharashtra to introduce night shifts for women. Safe transport, women security personnel and ergonomic workplace design further support this inclusion. Collectively, these efforts reflect CEAT’s commitment to enabling women to lead and succeed in diverse roles.

ZC Rubber Exhibits Industrial And OTR Tyre Solutions At CONEXPO 2026

ZC Rubber Exhibits Industrial And OTR Tyre Solutions At CONEXPO 2026

ZC Rubber is showcasing an extensive selection of industrial and off-the-road tyre solutions at the CONEXPO-CON/AGG 2026 trade show, being held from 3 to 7 March 2026 in Las Vegas. Attendees can visit the company at booth #N11041 in the North Hall to explore products from its key brands, including WESTLAKE, TIANLI, ARISUN and YONGGU. These offerings are specifically engineered to withstand the rigorous demands of sectors such as construction, agriculture, forestry and material handling.

The display features a comprehensive range of products, such as radial OTR tyres, agricultural tyres, forest tyres, material handling tyres and rubber tracks. Each product is designed to deliver durability, superior traction and operational efficiency in challenging work environments. The exhibition provides an important platform for ZC Rubber to engage with industry professionals, highlight its technological advancements and demonstrate its commitment to supporting global construction and industrial sectors with reliable, high-performance solutions.

Visitors can explore the lineup and speak with the team to learn how these tyre solutions can enhance productivity across a wide variety of applications.

Benjamin Lou, Global OTR Director, ZC Rubber, said, “CONEXPO brings together the people and machines that keep the world building, and it’s a great place for us to connect with customers face-to-face. With brands like WESTLAKE, TIANLI, ARISUN and YONGGU under one roof, we’re able to offer a true one-stop tyre solution across construction, agriculture, forestry and material handling. Our goal is simple – help customers find the right tyre for every job, all in one place.”

Bridgestone Develops Industry-First TRWP Vehicle Collection Method For Trucks And Buses

Bridgestone Develops Industry-First TRWP Vehicle Collection Method For Trucks And Buses

Bridgestone Corporation has announced a significant advancement in environmental research with the development of an industry-first vehicle collection method for tyre and road wear particles (TRWP) specifically from truck and bus tyres. This innovation is designed to enhance scientific understanding of how such particles may interact with the environment. Tyre and road wear particles are generated through the friction between a tyre’s tread and the road surface – a process essential for vehicle safety and comfort – and consist of a combination of worn tyre material and fragments of road pavement. The newly developed collection method for trucks and buses was also showcased at the Tire Technology Expo 2026, held from 3 to 5 March in Hannover, Germany.

The company had previously introduced a collection method for passenger car tyres in 2025 and has since been working to improve its efficiency. Applying insights gained from that earlier development, particularly regarding how particles are generated and dispersed, Bridgestone created a proprietary system tailored to the larger scale of truck and bus tyres. To ensure the accuracy of the collected samples, the company used a dedicated proving ground designed to replicate real-world driving conditions. Before each test, the track was meticulously cleaned to prevent contamination from pre-existing debris.

For the collection process, Bridgestone engineered suction devices and intake mechanisms compatible with larger tyres. A sturdy aluminium frame was used to construct the tyre cover, ensuring durability against strong winds during operation. Following controlled driving sessions, particles that remained both on the track surface and inside the tyre cover were gathered for analysis.

This effort is part of a broader commitment to investigate the physical and chemical characteristics of tyre wear particles and their potential environmental effects. Bridgestone participates in the Tire Industry Project (TIP) facilitated by the World Business Council for Sustainable Development and collaborates with external research organisations and corporate partners. With the ability to collect samples from both passenger vehicles and heavy-duty trucks and buses, the company aims to accelerate research, share findings widely and support efforts to reduce particle generation.

Alongside this research, Bridgestone is advancing several complementary initiatives. These include developing longer-lasting tyres with improved wear resistance, offering solutions that help customers lower total operating costs and working to minimise environmental impact throughout the product lifecycle.