Webpackaging logo

Constant Monitoring & Open Culture Prevent Security Threats

Laboratory, Testing, Certification, ISO Certifications, ISO 27001 - Information Security

Recent years have seen a rise in threats to corporate IT environments, creating new demands for understanding, preparing and regularly updating protective measures. “It’s traditionally been deemed sufficient for computers to have a firewall and antivirus software, but that doesn’t get you far these days,” says Jonas Tillberg, Global Head of IT for the Nolato Group.

STRONGER CAPABILITIES
So Nolato now has protection in place that entails a high degree of automation, constantly examining suspicious activity in our computers and network. “Our global SOC (Security Operations Center) works around the clock identifying and eliminating threats in and to our IT environment,” explains Jonas Tillberg. Firewalls remain a vital tool. They can still manage the basics of controlling the flow of traffic between different networks and allow or block specific types of traffic. This is done based on predefined rules.

“But what’s different now is their ability to identify, monitor and filter traffic at a deeper level,” notes Jonas Tillberg. “This enables the analysis of the content of the data being transmitted over networks and stops attempted breaches in real time.”

Another security measure entails dividing networks into different segments to reduce the potential attack surface. This makes each segment a separate unit containing a group of units that can communicate with each other within the segment, but not ­necessarily with units in other segments.

“The purpose of network segmentation is to create safety zones within the network, which limits the spread of potential threats and attacks,” explains Jonas Tillberg. “If a segment is affected by malicious code or an attacked unit, the rest of the network is isolated and can’t be damaged by the same threat.”

PHISHING A HUMAN RISK
But it’s not all about technology; the people using the computers also need to understand the risks associated with things like phishing,” notes Jonas Tillberg. “In many cases, phishing is now a more troubling risk for companies than purely ­technical attacks, as phishing is based on the ­manipulation of people.”

An example of phishing is a fraudster using sophisticated email messages to obtain an employee’s username and password to facilitate entry into IT systems and carry out attacks inside the firewalls. But these messages may also entail the fraudster pretending to be a senior executive ordering the worker to pay large sums of money into an account. “These emails are often convincing, with the correct sender and well-written, credible content,” notes Jonas Tillberg.

SIMULATION IMPROVES KNOWLEDGE
“To raise awareness among our employees of this type of crime, we use simulations, in which we create realistic scenarios of fraudulent emails,” says Jonas Tillberg. “These messages are similar to those sent by cybercriminals, and employees are encouraged to recognize and report them.”

Following the simulation, employees receive immediate feedback and access to relevant training material to improve their knowledge. This helps develop a better understanding and greater vigilance of the methods that criminals use.

OPEN CULTURE ALLOWS US TO ACT QUICKLY
Along with the simulations, regular training is also provided to increase awareness of current IT security threats. This offers employees an insight into methods in order to prevent them, and into the best way to protect the company’s, customers’ and their own personal data.

“We encourage our employees around the world to create an open communication culture and welcome the reporting of suspicious activity and potential security risks,” concludes Jonas Tillberg. “This allows us to act quickly in the event of any incidents and prevent serious security threats.”

See also

Cerbo Classic Mass Balance: Design for Environment

Early involvement in the design process allows for sustainability ideas to be evaluated. One of the cornerstones of a circular economy is designing with the ability to recycle a product and optimize the circulation of material for reuse. Today it is also possible to reduce the CO2 emission on existing product ranges, for instance, with the use of BIO-material or mass-balanced solutions. By using the mass balance model, the same quality standards are met, and it contributes to the environment.

Explore Nolato's Unrivaled Pharma Packaging Guide

Packaging designed to meet the requirements of both prescription and over-the-counter medicines, Noloto packaging protects vital pharmaceuticals and life-enhancing drugs in forms such as solids, ophthalmic, and creams in a safe but user-friendly manner. Look inside our high-quality pharmaceutical primary plastic packaging catalog with 3D configurators for select ranges. Nolato Packaging manufactures reliable child resistance (CRC) and tamper-evident (TE) closure technologies.

Cope Allman Jaycare develops process for printing Braille directly onto plastic containers

Cope Allman Jaycare has developed a process that allows a lay down of up to a 0.5mm thickness of UV cured ink directly onto the surface of a plastic container. In-house screen printing facilities were adapted to maintain an even and consistent print height. Although originally developed for printing Braille onto containers, the process also can be used in traditional screen printing, allowing clients the opportunity to highlight particular parts of their artwork (i.e. logos, etc.) by raising the print from the surface of the container.

  • Company News
  • English
  • Modified 13 Dec 2023
  • Hits 379