January 6, 2016 By Dave McMillen 2 min read

The manufacturing industry — including, but not limited to, automotive, electronics, food and beverage, textile and pharmaceutical companies — depends on production processes running at optimum efficiency to satisfy market demand. What happens when these processes are altered unintentionally or maliciously? The consequences could range from financial loss due to lower productivity to employees being subjected to dangerous work conditions.

Industrial control systems (ICS) consisting of servers that could appear on any network are key to keeping production lines running smoothly. Security gaps exist in many ICS networks because their focus has been primarily on performance and safety, not necessarily cybersecurity.

These systems have also been growing in complexity over the last several years, resulting in large, specialized network infrastructures. Typically, there isn’t a consistent security policy across all systems, which adds to the challenge of managing these complicated environments.

Multiple Layers of Risk in Manufacturing

Manufacturers are also at risk of being the target of industrial and economic espionage, with intellectual property as the prime prize, along with internal operational information. Both offer the potential for significant financial reward to threat actors targeting the industry. Trade secret theft appears to be escalating, and the potential points of entry are multiplied by extensive networks of supply chain partners.

The supply chain can also be the weak point for attacks on the products themselves. For example, the firmware for a vehicle electronic control unit (ECU) could be maliciously modified to malfunction, or an attacker could install a Trojan in the software for an in-vehicle entertainment system. It is important that supply chain managers understand how their suppliers’ cybersecurity practices could affect them and take steps to mitigate those risks.

Prevalent Attack Types

Although running industrial control systems can pose certain security challenges, the manufacturing industry is also affected by the same mainstream attack vectors that most other industries experience. Phishing, drive-by downloads, SQL injection attempts and distributed denial-of-service (DDoS) attacks are all plausible choices on the attack vector menu.

Manufacturers strive to keep their cost footprint down in order to make the highest profit on their products. The challenges of the modern production environment, coupled with the expense required to keep infrastructure secure, can put a strain on competitiveness.

A new IBM research paper focuses on the top attacks detected against this industry in 2015, along with a geographical representation of their origins and targets. We also take a look at how to reduce the attack surface in production ICS environments as well as some general manufacturing best practices to strengthen network controls and policies.

Read the complete research report: Security trends in the manufacturing industry

More from Mainframe

How dangerous is the cyberattack risk to transportation?

4 min read - If an attacker breaches a transit agency’s systems, the impact could reach far beyond server downtime or leaked emails. Imagine an attack against a transportation authority that manages train and subway routes. The results could be terrible. Between June of 2020 and June of 2021, the transportation industry witnessed a 186% increase in weekly ransomware attacks. In one event, attackers breached the New York Metropolitan Transportation Authority (MTA) systems. Thankfully, no one was harmed, but incidents like these are cause…

Low-code is easy, but is it secure?

4 min read - Low-code and no-code solutions are awesome. Why? With limited or no programming experience, you can quickly create software using a visual dashboard. This amounts to huge time and money savings. But with all this software out there, security experts worry about the risks. The global low-code platform market revenue was valued at nearly $13 billion in 2020. The market is forecast to reach over $47 billion in 2025 and $65 billion in 2027 with a CAGR of 26.1%. Very few,…

Starting From Scratch: How to Build a Small Business Cybersecurity Program

4 min read - When you run a small business, outsourcing for services like IT and security makes a lot of sense. While you might not have the budget for a full-time professional on staff to do these jobs, you still need the services.However, while it might be helpful to have a managed service provider handle your software and computing issues, cybersecurity for small and medium businesses (SMBs) also requires a personal, hands-on approach. While you can continue to outsource some areas of cybersecurity,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today