How Secure is Your Manufacturing Operation?

By:  |  Category: Manufacturing & Distribution, Security Monday, February 18th, 2019  |  No Comments
Manufacturing

After the public and finance sectors, the manufacturing industry is the third most targeted by cyber-attacks, as the threat from malicious hackers, cybercriminals and corporate espionage escalate.

The fact that industrial processes are increasingly connected – via the Internet of Things (IoT) – which makes their software and advanced automation vulnerable to a security breach. This can result in a loss of sensitive corporate and intellectual information, which could compromise your profitability, damage your brand and worse.

This is why you have to actively manage the security risks by:

Being password smart

The first step is the most obvious: Change default passwords. The number of production manufacturing and process control systems that still use the factory-assigned passwords is staggering. These passwords tend to be readily available via a Google search, so continuing to use them is the electronic equivalent of leaving the key in the lock of your front door.

Default names

Step two is similar: Change the default names of devices and networks. This is another very, very basic step, but one that far too many manufacturers fail to take when deploying control systems.

Ring-fencing your networks

Treat your process control network like you treat your business network – and keep the two separate. Each of these is important, but many manufacturers treat one as more important than the other. In actuality, the two are related in what they do for the business and why they can be critical for safe manufacturing.

Treating the process control network like the business network means ring-fencing your manufacturing network, in the same way you secure the financial and IP portions of your business. Separating the process and business networks is important because it is too easy for a vulnerability in one of the networks to introduce malware for the other.

Business-side users, for example, may be more likely to use USB thumb drives that could carry malware targeting industrial controllers. And a poorly defended manufacturing line might provide an easy attack vector for malware that could move into critical databases.

Taking a layered approach to security

Taking a layered approach to security is the most secure option for any operation, no matter the scale or size. Here you need to employ a wide range of tools and techniques from firewalls and intrusion detection systems, to anti-virus systems and 24/7 network monitoring tools. Firewall and IPS (Intrusion Prevention System) or a UTM (Unified Threat Management) control traffic in and out of your network, and will pick up unusual traffic and ensure any intrusion is detected.

It is up to manufacturers to ensure that have systems and procedures in place to protect sensitive data, and mitigate against any active threats to their networks and IT infrastructure. Fail to do this and they risk their brand reputation and profitability – something no operation can afford in this digital era.

If you need assistance with your business cybersecurity needs, from assessments to security awareness training, and a comprehensive suite of managed security services, give EnhancedTECH a call at 714-970-9330 or contact us at [email protected]

Samantha Keller

Samantha Keller

Director of Marketing and PR at EnhancedTECH
Samantha Keller (AKA Sam) is a published author, tech-blogger, event-planner and mother of three fabulous humans. Samantha has worked in the IT field for the last fifteen years, intertwining a freelance writing career along with technology sales, events and marketing. She began working for EnhancedTECH ten years ago after earning her Bachelor’s degree from UCLA and attending Fuller Seminary. She is a lover of kickboxing, extra-strong coffee, and Wolfpack football.Her regular blog columns feature upcoming tech trends, cybersecurity tips, and practical solutions geared towards enhancing your business through technology.
Samantha Keller

Latest posts by Samantha Keller (see all)

Leave a Comment
Read previous post:
security
Why You Need a Multi-layered Cyber Security Approach

With a new year ahead, it’s wise to look ahead at some of the new cyber-security laws impacting your business.  ...

Close