17 Measures Manufacturing Companies Should Consider To Reduce The Risk Of Cyber-Intrusions

Computers are integral throughout the manufacturing process. At every step in the supply chain, there are computers collecting and acting on thousands of data points. As a result, cybersecurity has become a vital consideration throughout the manufacturing industry. Whether it's protecting data and privacy in the increasingly connected products being manufactured, or replacing vulnerable legacy systems that are prone to attack, businesses need to keep cybersecurity top of mind. With that, we wanted to provide manufacturers with a list of concrete steps to consider to help minimize the risk of, and prepare for, cyber-intrusions.

Below is our list of 17 measures every manufacturing company should consider to reduce the risk of cyber-intrusions.

Conduct internal compliance and risk assessments, to determine your organization's vulnerability to cyber-attacks. Develop and implement corporate policies and procedures required for compliance with federal and state privacy and security laws. Develop quick-response teams to handle potential cyber-attacks, using pre-formulated decision trees and procedures so that you don't have to develop them while under the fire of an ongoing attack. Establish secure data backup protocols to ensure that, even if your company is under attack, important company records are secure. Establish protocols to deal with common forms of cyber-attacks (denial of service, etc.). Line up outside experts, if necessary based upon the risk profile of your company, to swing into action if company processes are overwhelmed by a cyber-attack. Perform periodic audits of cybersecurity practices against industry norms, accepted best practices, and the risk profile of your organization. Implement information security best practices, reflect them in information security policies, records retention and management policies, and in internal controls/standard operating procedures. Make certain the CEO and executive leadership are properly informed about the cyber risks to your company and that they're involved in oversight and the decision-making process related both to cyber-attacks and proactive cybersecurity measures. Review funding of all electronic security measures to ensure they are adequate to cover not only...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT