The move towards connected manufacturing has introduced sophisticated threats to data, intellectual property (IP), and operations.
Industrial espionage and IP theft
Manufacturing organizations invest heavily in IP development. It’s often an organization’s most valuable asset and its theft is among the most damaging of manufacturing cyber threats. Recently, manufacturing executives cited IP protection as their primary concern2.
Stolen IP can provide a competitive advantage, be sold on for profit, or used to disrupt operations amongst other things, and that’s why its theft has become so prevalent. It’s not only criminals and competitors carrying out these attacks—nation states are too, and their involvement can be significantly damaging to organizations and even the economies of the countries where they reside.
It’s important that organizations implement internal and external measures to protect IP, which often flows out via the supply chain.
Increasing sophistication of cyber threats
In a sample of over 120 manufacturing industry breaches, 28% were motivated by espionage.1
The crucial nature of the manufacturing industry and its valuable data make it a target for many advanced threat actors. Attacks sponsored by nation states and e-criminals are both increasingly common. Due to the industry’s dynamic nature and openness to technology, it’s difficult for organizations to detect, prevent, and respond to attacks.
Advanced techniques like spear-phishing which targets individuals, malware which affects functionality, and ransomware that holds an organization’s data ‘hostage’ are frequently successful. In these cases, IP and data are often the target. Attacks can also employ advanced methods that hijack connected systems.
In manufacturing, there’s also the risk that hacked systems could lead to catastrophic events that put employee and customer safety at risk. Therefore, organizations can’t ignore the need for a robust information security strategy.
Unsecured or legacy manufacturing systems
25% of manufacturing companies are not confident in their ability to prevent cyber-attacks.3
Many manufacturing organizations are still operating at least one unsecured legacy system. They’ve often been in service for a long time and, in some cases, they won’t have been designed with cyber and data privacy in mind. As attacks grow more sophisticated, they’re inevitably going to find more inventive and destructive ways to exploit these systems.
The lack of compatibility between legacy systems and newer control systems is something that manufacturers must address moving forward in order to control risks. Nonetheless, the process of upgrading to smarter systems carries a huge price tag which is a deterrent for some organizations. Eventually, all manufacturers will reach the point where legacy systems introduce too much risk to be ignored.
Internal threats and malicious insiders
Manufacturing is one of the top 5 industries with the highest percentages of insider threat and privilege misuse incidents.4
It’s common for external actors to target employees with attacks that trick them into handing over key credentials, data and systems access.
In manufacturing, employees’ threat awareness is generally considered as a weak link. So, it’s important to train the wider business in threat recognition to raise awareness around certain types of risks. This helps reduce carelessness and human error - both problems synonymous with data breaches.
Attackers aren’t always external; malicious insiders also pose a huge threat. In manufacturing, insider attacks are common and include theft of assets for profit or revenge. Insiders can also manipulate data with small, unnoticed changes.
73% of manufacturers plan to increase investments in smart factory technology in the next year.5
Connected products introduced into supply chains represent a significant risk. That said, for almost all manufacturers they’re vital for growth - even if that does come with increased vulnerability.
As manufacturers shift to smarter manufacturing models, each new connection represents a potential vulnerability because most connected products can store and transmit sensitive data. Many organizations also use connected products alongside mobile apps and sensors that transmit data wirelessly. This leads to sensitive data flowing in and out of the organization, giving attackers more opportunities.
Failure to implement measures that mitigate the risks posed by these connected devices can lead to serious attacks, capable of significant disruption and data theft.
Preparedness is key
Although manufacturing organizations are reasonably advanced in their awareness of the cyber and information security risks they face, preparedness varies. A certified ISO 27001 Information Security Management System (ISMS), paired with independent testing, detection, and response services, provides a transparent solution.