Human-Machine Interface (HMI)

25th March 2020 | Cybrary Human-Machine Interface (HMI)


Human-Machine Interface (HMI) is the hardware or software through which an operator interacts with a controller. An HMI can range from a physical control panel with buttons and indicator lights to an industrial PC with a color display running dedicated HMI software. Human-machine interface technology has been used in different industries like electronics, entertainment, military, medical, etc. Human-machine interfaces help in integrating humans into complex technological systems. Human-machine interfaces are also known as man-machine interfaces (MMI), computer-human interface or human-computer interface. HMIs are often seen on printers, your GPS, or even inside one of the new Teslas. 

Source: NIST SP 800-82 Rev. 2

Additional Reading: Bardstown Bourbon Upgrades HMI for Strategic Connectivity

What does this mean for an SMB?

It wouldn’t be uncommon for the majority of SMBs to be using HMI unless you’re operating in specific industries that rely on such technology to work successfully.

To learn more about HMIs, watch this short 2 minute video:

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Security Culture is Critical — And How CyberHoot Makes It Stick

Why Security Culture is Critical — And How CyberHoot Makes It Stick

In today’s cybersecurity landscape, breaches are rarely caused by a lack of technology. Instead, they stem from...

Read more
Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Top 10 Emerging AI-Based Threats Every Business Must Prepare For

Artificial Intelligence (AI) is transforming productivity and efficiency, but it’s also arming cybercriminals...

Read more
Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Microsoft Rolling Out Token Protection: Practical Guidance for MSPs

Part 2 of Our Microsoft Entra Security Series In Part 1, we explored how Microsoft’s Token Protection...

Read more