The consequences of a cyberattack on a manufacturing operation can be severe, leading to costly downtime, intellectual property theft, reputational damage, and significant financial loss. Recent data underscores the urgency of this threat.
In a recent webinar, ‘From Vulnerable to Vigilant’, Codestone indicated that a staggering 88% of all UK companies suffered a cyber security breach in the past 12 months, with a vast majority originating from a simple click on a malicious link or website by an employee. This highlights a critical vulnerability: the human element. Beyond this, the manufacturing sector faces specific and evolving threats. They include:
- Business Email Compromise (BEC) is the most common attack vector, accounting for 91% of incidents.
- Supply chain attacks with nearly one-fifth of breaches originating from vulnerabilities within the supply chain.
- Ransomware, which can cripple operations by encrypting critical data and can take months to identify and contain, leading to extended downtime and significant recovery costs.
- Weak passwords and patch management that create unnecessary openings for attackers to exploit known vulnerabilities.
- Insider threats from employees or partners with legitimate access who can intentionally or unintentionally cause breaches.
Building a Resilient Defense
During the webinar, Louise Arthur-Brown, Solutions Partner at Codestone, noted that protecting against these threats “doesn’t require an impenetrable fortress overnight, but rather a focus on fundamental, yet critical, security practices.” He outlined a blueprint for bolstering the cybersecurity posture for manufacturers with these essential tasks:
- Establish a Security Policy and Strategy: A clearly defined policy provides the framework for all security efforts, outlining procedures for patching, user training, and incident response. This strategy should be integrated with overall business objectives.
- Prioritize User Training and Awareness: As the statistics on email-based attacks show, employees are the first line of defence. Regular training helps them identify and report suspicious activity, fostering a culture of healthy skepticism.
- Implement Multi-Factor Authentication (MFA) and Conditional Access: MFA thwarts 92% of cyberattacks by requiring a second form of verification beyond a password. Conditional access adds further layers of security by setting rules around login attempts based on location, device, and user role.
- Secure Infrastructure Through Regular Updates and Patching: Updating software and firmware on servers, firewalls, switches, and endpoints closes known security gaps that attackers actively probe.
Codestone: Your Partner in Cybersecurity Vigilance
Implementing and maintaining a robust cybersecurity posture can be challenging, especially for manufacturers focused on production and operations. However, ERP solutions providers like Codestone offer comprehensive services designed to help manufacturers navigate the complex cybersecurity landscape.
According to Arthur-Brown, Codestone helps organizations assess their security measures, identify vulnerabilities across their IT and cloud infrastructure, and recommend tailored improvements. Moreover, for businesses heavily invested in the Microsoft ecosystem, Codestone offers targeted assessments to evaluate and strengthen their Microsoft security posture.
Codestone’s “CyberCare” service provides accessible Security Operations Center (SOC) services on an OPEX model. It offers 24/7 monitoring and response to threats. It also assists with essential proactive steps like vulnerability assessments and phishing simulations to test defenses and educate employees.
Finally, navigating cybersecurity standards and regulations can be complex. Codestone prepares manufacturers for certifications like Cyber Essentials by helping them source the assessments and documentation needed for such certifications.
What This Means for ERP Insiders
An ERP system is the heart of your operations, containing critical data and processes. Thus, implementing strong access controls like MFA and conditional access, coupled with regular patching and user training, is paramount to protecting this core business system from compromise. Codestone’s expertise in ERP, such as SAP and Microsoft Dynamics 365 Business Central, and cybersecurity allows for a holistic approach to securing these vital platforms.
Cybersecurity is not static. The rise of AI is significantly augmenting the capabilities of cyber attackers, enabling more sophisticated and large-scale attacks, particularly through phishing. This, coupled with a significant skills gap in the cybersecurity workforce, means manufacturers must be proactive and consider leveraging external expertise to stay ahead of emerging threats.
Codestone provides Cybersecurity expertise for manufacturers. With over 27 years in business and serving over 1,000 mid-market and large enterprises across the UK and Ireland, Codestone understands the complex digital landscapes inherent in organizations of this size and scope within the manufacturing sector. These larger, interconnected environments, often incorporating sophisticated ERP systems, cloud infrastructure, and extensive supply chains, present a significant and attractive target for cybercriminals. Codestone’s deep experience across ERP, data, and comprehensive managed IT and security services makes them well-equipped to address the specific, multifaceted cybersecurity challenges faced by manufacturers.