Due to COVID-19 pandemic, work-from-home using internet has become a growing way of connecting with associates and clients. This year, internet use has nearly doubled, due to work-from-home and lockdowns. But internet is a risky environment, especially when connecting your mobile devices to a public network. You are at an airport and connect to its public Wi-Fi network. But you are unaware that there is a hacker lurking around the corner, monitoring the internet traffic and ready to hack into your personal account. It is estimated that there are over 450 million public Wi-Fi hotspots globally, offering a rich hunting ground for cyber criminals.
Cyber specialists tell us that currently there are more than 375 malicious threats PER MINUTE and growing. Mobile malware threats grew by a whopping 70% in Q1-2020 over Q3-2019! Cyber criminals have generated 113,000+ malicious URL’s related to COVID-19, targeting healthcare, education and banking in particular. Cybercriminals steal personal and company information by hacking into our susceptible computers and mobile devices. Cyber-attacks are especially devastating for small businesses - industry data shows that a staggering 60% of small companies, which have been hacked by cyber criminals, go out of business within 6 months after the attack.
While business operations, from conceiving an idea to its final delivery to the user, are going digital at breakneck speed, the entire operational areas remain vulnerable to cyber malfunctioning in one form or other. This impact the operations very hard short-term as well as long-term. Cyber security threats can be due to inherent flaws within the system. But the possibility of deliberate cyber-attacks and hacking from one source or the other is abundant. As competition and market battles hot up, this remains a real danger.
The risk covers a large area. One of the biggest threats is the compromising of vital data. This includes important technical details, hard-earned market information, customer information etc. Loss of data can bring the operation to a halt at great financial impact. As hinted, the problem can be due to malfunctioning of the software or external interference to steal the data.
Either way, the cost of recovery is immense, not to talk about the time lost in the process. Hidden or not, these expenses will have a big role in fixing the final profit and loss accounts.

Adding to this is the loss of credibility of the business. The output will be negatively impacted and the company will have to do great degree of explanations to the customer. It is an equal task to recover lost data and to recover lost credibility. Consumers have other options and look elsewhere. But the company cannot afford that luxury.
While the margin for deliberate external intrusion possibilities remains large, many of these security breaches are caused by human error. One needs to realise that however deep an entity goes digital, there is always that unavoidable human touch that makes it run. AND, to err is human!
This underlines the need for proper intense training. There are studies that say employee ignorance is one of the leading contributors. Workers may know the essential basics of an application, but that does not make him or her a cyber security expert. While the IT departments execute a new cloud computing initiative or new application software, they have to ensure that those handle it on a daily basis are equipped to manage a crisis.
Types of cyber threats
Cyber threats are ever-evolving and cybercriminals use different types of malware to get what they want. Malware is an abbreviated form of “malicious software.” This is software that is specifically designed to gain access to or damage a digital device, usually without the knowledge of the owner.
Crypto jacking: Malware that gives cybercriminals access to “mine” cryptocurrency on your computer, at the expense of your resources.
Form jacking: Malware in which cybercriminals inject malicious code into online forms to steal payment card details on legitimate websites.
Ransomware: It is a malicious software that uses encryption to hold data for ransom, the purpose of which is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it.
Phishing: These are fake emails that can look surprisingly legitimate. If you get tricked into clicking a link or providing information, thieves can get your passwords and account numbers.
Zoom Bombing: Intruders hack into online meetings.
Remote Access Trojans (RAT): Malware that gives a cybercriminal a “back door” to remotely access a compromised computer.
Spyware: It is unwanted software that infiltrates your device, stealing your Internet usage data and sensitive information. Spyware gathers your personal information and relays it to advertisers, data firms, or external users.
Dark web: It is an underground online community where criminals can go to buy and sell your personal information.
Defense
All digital devices need to be protected using a highly-rated, proven anti-virus program. These programs provide a shield for your operating system in the form of a real-time scanner. When your antivirus program detects an infected file or program, it can delete it on the spot or move it to a special "quarantine" folder. When your antivirus quarantines a file, it prevents it from interacting with the rest of the computer.
A Virtual Private Network (VPN) creates a private network within a broader network, adding security by using encryption and tunneling mechanisms. There are some free VPN products available, but these may trade your information to help offset their costs, or impose other limitations, such as how much VPN data available per month. A paid subscription service may enable you to deploy a powerful, yet easy-to-use VPN that protects your Wi-Fi connections, bandwidth and privacy with guarantees against any losses. These VPN’s work with all digital devices - PCs, Macs, smartphones and tablets.
It goes without saying that users of all digital devices that use Wi-Fi connectivity must become more mindful of cybersecurity needs, and companies must invest in security programs and ongoing employee training.
Linglong Tire Becomes Global Tyre Partner Of Chicago Bulls
- By TT News
- November 26, 2025
In a significant move to bolster its international profile, Linglong Tire has entered a global partnership with Chicago Bulls, the iconic NBA team. This alliance represents a strategic advancement in the company's global sports marketing, building upon previous high-profile sponsorships with Chelsea FC and Real Madrid. The primary objective is to substantially enhance brand recognition for its product lines, including Green Max, Atlas and Evoluxx, across the crucial North American market, with promotional activities also extending into Europe.
This marketing initiative is strategically aligned with the company's operational expansion, notably a new manufacturing facility under construction in Brazil, which is expected to optimise supply chains and support a drive for increased market share in the Americas. The collaboration has been designed to create meaningful fan engagement through co-developed activation strategies. These will include immersive experiences such as joint basketball camps and interactive tours, aiming to forge a powerful connection with a global community passionate about basketball and high-quality, innovative tyres.
- Yokohama Rubber
- Yokohama Tire Corporation
- Porsche One-Make Racing Series
- Yokohama ADVAN Racing Tyres
Yokohama To Supply ADVAN Tyres For Porsche One-Make Racing Series
- By TT News
- November 26, 2025
The Yokohama Rubber Co., Ltd. has confirmed a continued partnership that will see its US subsidiary, Yokohama Tire Corporation, provide ADVAN racing tyres for three Porsche one-make racing series in 2026. This multi-series agreement includes the Porsche Sprint Challenge North America by Yokohama, the Porsche Sprint Challenge USA West by Yokohama and the Porsche Endurance Challenge North America. All three are sanctioned by the United States Auto Club (USAC) and function as key developmental categories within the Porsche Motorsport Pyramid, featuring race-prepared vehicles such as the 911 GT3 Cup and the 718 Cayman GT4 RS Clubsport.
The upcoming 2026 season represents a significant milestone, marking the sixth consecutive year Yokohama has been the control tyre supplier for the North America and USA West series and the third straight year for the Endurance Challenge. The company will support the competitors with its ADVAN A005 for dry tracks and the ADVAN A006 for wet weather conditions across a combined schedule of numerous events. This ongoing involvement is a strategic initiative designed to bolster the profile and recognition of the ADVAN brand throughout the important North American market.
This commitment to one-make racing extends beyond the Porsche family. Yokohama Rubber is also the official control tyre supplier for the recently launched Mustang Cup, reinforcing its active role and investment in North American motorsport. Through these high-profile partnerships, Yokohama aims to enhance brand power by associating its ADVAN products with some of the most exciting and competitive racing series on the continent.
Adami Trasporti Relies On Continental Tyres For A Greener Fleet With Lower TCO
- By TT News
- November 26, 2025
Continental has demonstrated its role as a key partner for sustainable fleet management through its collaboration with Italian transport company Adami Trasporti. Since 2023, Continental has supplied its Conti Hybrid series tyres – Conti Hybrid HS5, Conti Hybrid HD5 and Conti Hybrid HT3 – to Adami's fleet, leading to significant reductions in the company's total operating costs and a marked improvement in its environmental performance. This partnership underscores how strategic tyre selection is central to modern logistics.
For Adami Trasporti, a family-owned business specialising in food transport for over four generations, operational integrity is paramount. The company operates a fleet of 200 modern tanks and tank containers for sensitive liquid goods like fruit juice, wine and cooking oil, requiring adherence to the highest hygiene standards and strict EU environmental regulations. To meet these demands, the Verona-based firm, with additional locations in Italy, Slovakia and Germany, invests heavily in technological innovations, from real-time data monitoring to modern vehicles designed for minimal emissions.
Within this comprehensive sustainability strategy, the choice of tyres has proven to be a critical factor. While tyres themselves account for a small fraction of direct operating costs, their influence on fuel consumption and CO2 emissions can affect up to 31 percent of a fleet's total costs. Continental is actively informing the logistics industry that a shift in focus from mere tyre mileage to rolling resistance is essential. Tyres with optimised rolling resistance, such as the Conti Hybrid models, serve as a direct lever for saving fuel, lowering costs and reducing a fleet's carbon footprint.
This aligns perfectly with Adami Trasporti’s concrete goals for greater sustainability. The company complements its use of Continental’s tyres with other forward-thinking initiatives, most notably the integration of LNG-powered vehicles that cut nitrogen oxide emissions by 70 percent. Through this multi-pronged approach, in which Continental’s tyre technology plays a fundamental role, Adami Trasporti positions itself as an industry pioneer. Together, the companies are actively contributing to lower CO2 emissions across the European transport sector.
Stefano Adami, owner at Adami Trasporti, said, “With the rolling resistance-optimised tyres, we are reducing our CO2 emissions, saving fuel and benefiting from high mileage at the same time. The fuel savings of one and a half to two percent are crucial for us, as consumption has a direct impact on our operating costs. The service and support offerings increase operational reliability of our vehicles and enable us to offer consistent and punctual services throughout Europe.”
Metso Redefines Thickener Maintenance With Landmark Split Geared Ring
- By TT News
- November 25, 2025
Metso has introduced its largest split geared ring model, the SCDH4500, a significant innovation designed to transform thickener maintenance in the mining sector. This new model directly confronts the difficulties of traditional full slew bearing replacements through its advanced two-piece split design.
By enabling installation to be completed up to 50 percent faster and minimising the extent of system disassembly required, the solution substantially reduces operational downtime. Furthermore, it enhances worksite safety by removing the necessity for large cranes and the associated risks of suspended loads. The resulting benefits for customers include considerable cost savings from lower labour and equipment hire expenses, as well as a reduction in lost production.
This product launch is a key component of Metso's wider strategy to enhance its thickener portfolio and bolster its aftermarket services. The SCDH4500 is engineered for seamless integration with existing SCD drive geometries, ensuring compatibility and dependable performance in even the most demanding applications. The company’s comprehensive thickening and clarifying portfolio is built on advanced engineering and a focus on sustainable outcomes, which support improved water recovery, lower chemical usage and safer operations.
Andrew McIntosh, Product Director, Thickening Services, Metso, said, “The innovative two-piece split design allows faster installation without requiring extensive system disassembly. This not only minimises operational disruptions but also enhances safety by eliminating the need for large cranes and suspended loads. Additionally, the SCDH4500 seamlessly integrates with existing SCD drive geometries, ensuring reliability in high-torque applications.”

Comments (0)
ADD COMMENT