Over the last ten years, Cyber Security threats have increasingly become a major problem for all organisations. Rather worryingly, the manufacturing sector is now reported to one of the most frequently hacked industries, second only to healthcare. i Whilst some businesses plan to make a significant investment into cyber defences (totalling $1 Trillion globally over… Read More
Over the last ten years, Cyber Security threats have increasingly become a major problem for all organisations. Rather worryingly, the manufacturing sector is now reported to one of the most frequently hacked industries, second only to healthcare. i
Whilst some businesses plan to make a significant investment into cyber defences (totalling $1 Trillion globally over the next five years) it seems the manufacturing sector is lagging behind. A recent study held by Cisco revealed that 40 percent of manufacturing security professionals said they do not have a formal security strategy, nor do they follow standardized information security policy practices such as ISO 27001 or NIST 800-53. ii
With manufacturers increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure, this gives them greater level of exposure to attack. Cyber-attacks can be costly both financially and in terms of business reputation and legal standing.
Awareness and preparation are key to looking out for security threats and preventing them from materialising into a genuine threat. So what are the main things for you to look out for?
Phishing is on the Rise
One of the main cybersecurity threats on the increase is phishing or spear phishing. This involves creating emails to appear as if they’re from a trusted source (like a colleague, boss or client) that contain a link which the recipient is encouraged to click on. This allows the cybercriminals to gain access to the network and encrypt data until the business pays a ransom to “unlock” their files and data. To prevent this, and other malware attacks, employees should be made aware of the risks, shown how to spot phishing emails and encouraged to ask questions before opening any links they are not expecting to receive. At the same time, regular backups should be taken so that data is recoverable, even if it is compromised.
Internal Sabotage and Data Access
Manufacturers are not only at risk from external threats, but there is a chance that internal employees could also pose their own cybersecurity risks. Disgruntled employees or past employees who are able to access highly confidential information have the potential to cause real damage to your business. It is important to keep track of employee access; removing accounts and users once people leave, and implementing restrictions at different levels to limit the volume of confidential data that employees have access to, so that it is only those who are required to view specific information that can see it.
BYOD device and remote working threats
The chances are that many of your employees are not going to set out to sabotage your business and compromise data security maliciously; however, there are ways that employees also increase cybersecurity threats without realising. The most common of these threats is from Bring Your Own Device (BYOD) schemes which allow employees to work on-site and remotely using their own devices. This means that data can then be accessed from anywhere, and the data on the devices can be put at risk when the user is connected to an unsecured network. To prevent data being compromised, you should ensure that passwords and access are restricted to allow only necessary access and that remote access is through a secure VPN – which is essential if employees are working on a public WiFi network.
Prevention through Education
There are many cyber threats that manufacturers face every day, but it is not impossible to reduce the risk of you falling victim to these attacks. Educating your users and delivering cybersecurity training is central to ensuring that they don’t make themselves a target.
If you’d like some help training your users on cyber security, give Systems Assurance a call today on 0114 292 2911 to discuss our training sessions.
Subscribe to our blog.
We will only use your email to send you new blog posts.
Whether you have 5 or 5,000 users, you need affordable and professional IT tools. Microsoft Office 365 gives you and your employees access to popular productivity applications, including Microsoft Word, Excel, and PowerPoint anytime, from virtually anywhere. You can also take advantage of built-in enterprise-grade services such as high-definition video conferencing, business-class email, and portals… Read More
Is it time to wave a final goodbye to those dusty, energy-consuming old servers? The requirement for their own dedicated storage space, security from theft and ventilation certainly brought a certain amount of inconvenience, not to mention the continual upgrades and the cost of maintenance. These are just a handful of reasons why organisations are… Read More
Follow these steps if you want to preview the syncing of SharePoint Online files before enabling the feature for your entire organisation. IMPORTANT: You only need to follow these steps to set registry keys on computers you want to use to preview the functionality. When you’re ready to enable SharePoint sync for your organisation, you… Read More
New research released in 2017 shows that over half of all UK companies experienced a Cyber-attack in 2016, costing businesses as much as £30 billion. Phishing and viruses were the most common threats, affecting nearly a quarter of those surveyed, while 18 percent suffered a hack or data breach. Although ransomware claimed fewer victims –… Read More
GDPR now makes companies accountable for the personal data they hold and process with breaches of the law carrying fines of up to 20,000,000 euros. WHERE THE CHALLENGES ARE: Where is that personal data across my organisation? How do I secure it? Who has access to it? How can I lower the risk of being… Read More
As the majority of today’s public sector organisations face the challenge of cutting costs across the board to meet government spending targets, one area that is coming under increasing scrutiny is IT infrastructure. As a result, cost-effective distributed IT platforms and services are being considered as an alternative to the costly proprietary mini-computers and mainframes… Read More
Microsoft will end support for Windows Server 2003/R2 on 14 July 2015. For some this is purely another headline in another tech mag, for others this means a great deal of work. We explore the issues and questions you should be asking either your IT team or your IT provider; And provide some options and… Read More
A Perfect Storm Could Brexit spell a revival for UK manufacturing? Whilst the London fat cats might be trembling in their boots over Brexit, UK manufacturers shouldn’t be. The fallout from our EU divorce could provide the perfect conditions for us to become global leaders in production once again. Turn back the clock to May… Read More
A large scale cyber-attack took place on Friday 12th May. The attack targeted health organisations worldwide, impacting nearly 150 different countries, including 48 organisations in the UK alone. Over 230,000 computers were infected. Despite fast reactions and following disaster recovery plans, 16 of these companies had to completely shut down their systems, with 6 still… Read More