Your browser does not support JavaScript!

Author : admin | Friday, 22 February 2019

How to Stay Secure From Cyberthreats Affecting Manufacturers

Author : admin | Friday, 22 February 2019

Manufacturers are already going through a digital improvement age, which is modifying the technology landscape in the whole industry. Today, manufacturing machines connected to the network can provide process feedback, predict failure rates, and communicate in real time with a larger manufacturing system. Manufacturers leverage this data from the plant floor to optimize their business.

 Unfortunately, this digital transformation is causing manufacturers to increasingly become more vulnerable to cyberattacks. Over the last several of years, the industry has spotted annual double digit increases in the number of attacks on manufacturing systems. We’re transitioning to a period where Industrial IoT (IIoT), Industry 4.0 and IT/Operational Technology (OT) has become the norm in the manufacturing industry, but it’s also leading to major security difficulties. IIoT is pushing the convergence of IT and OT where both IT and OT teams need to know the risks imposed by IIoT devices connecting to the Internet or corporate network and determine how to track and monitor those risks. And Industry 4.0 moves data from complex systems into converged platforms (PLM, ERP, MES, etc.), where some may call the information in these systems “the crown jewels” of their IP. Once that gets hacked, it’s game over for manufacturers.

 When it comes to cyberattacks in the industry, there are two major problems; intellectual property (IP) and downtime caused by breaches. Hackers target manufacturers for their product designs, computer-aided design (CAD) and computer-aided manufacturing (CAM) data, bill of materials and production process information. They also target a manufacturers programmable language controllers (PLCs) and manufacturing execution systems (MES), which are what makes the production line move. A breach into these systems could trigger downtime, missed supplier commitments and huge financial losses.

 Instead of worrying about having to shut down the shop because of a cyberattack, or a cyberattack shutting down the shop floor by itself, apply these steps to help improve the security of your business. 

 Need for increased visibility:

It’s crucial for manufacturers to have visibility into their network so they can see and understand threats as they happen. With visibility of the network, the security team can distinguish when a new device comes on line or a new IP is accepted. It also allows you to determine which device(s) are causing problems, and when a device on the shop floor is talking to another device that it shouldn’t be communicating with. Tools such as security event information event software, and network monitoring applications can aid in real time visibility.

 It is time to patch:

Let’s say you manufactured a ball joint. Generally, there was no need for changes.  The injection molding was the same, the specs, process, and systems didn’t need to change for generations.  Even the PC operating system and patch level remained the same. Well, now Industry 4.0 is changing all of that. These systems now connected to the internet meaning we need to spot vulnerabilities. Previously, manufacturers were concerned that patching could impact their specific software, so they disregarded it.  That isn’t an option any longer. Manufacturers need to patch, test patches against software, and upgrade systems that can’t be patched anymore.

 Connectivity & Collaboration:

Many manufacturers have plants across the globe where remote availability is required. Plant professionals need to access the shop floor from anywhere and vendors need access to their machines for diagnostics, performance metrics and updates. Different business devices from across the globe need to interact on one network, in real-time. VPNs, SDWAN, two factor authentication, 24x7 monitoring, and third party security are all topics of consideration now. For organizations with limited teams or skillsets, outsourcing to a vendor may be a reasonable approach.

 Rapid response:

Your business is more connected than ever. Even if you practice the tips above, and go above and further industry best practices, something is going to happen. It is a matter of time before there is a security incident. Plan ahead. Develop procedures, educate both internal and external teams and make sure they know what to do when a breach occurs, and drill these procedures often. If you do not have expertise on hand to deal with a security incident, reach out to a partner to fill any gaps. Partners can help with proactive threat mitigation, threat investigations and threat response. When something happens, timing is key. Having people, processes, and partners in place is key to a rapid response.

 The digital transformation age is already here, and hackers aren’t going anywhere. Don’t wait for a breach to happen on your network to make a change. Implementing these key tactics can make a huge difference in your security posture.

This article is originally posted on

stay secure from cyberthreats affecting manufacturers hackers


Tronserve Announcement

Tronserve Form! Where the Hottest Industrial Topics are discussed!

Popular Articles
Popular articles will appear here.
Follow Tronserve