Be secure, vigilant & resilient: Top 7 steps to reduce the chances of cyber attacks

Posted by Angela Messenger on August 1, 2018

To capture the business value from emerging technologies and reduce the chances of cyber attacks, manufacturers need to remain secure, vigilant and resilient.

If a cyber breach occurs, are you prepared? With manufacturing facing such a dynamic cyber risk landscape, the following seven steps are crucial:

1. Set the tone at the top

Employees need to be supported from the top to have a real impact.

Emphasising both the importance and consequences of cyber threats in the boardroom will ensure it’s respected company-wide.

The investments you’re making in emerging manufacturing technologies and connected products should all sit tightly within your cyber risk programme. But you don’t necessarily need to rely on your in-house team to drive this all forward.

2. Perform a broad cyber risk assessment

Risks change over time, so performing regular reviews and assessments can help identify areas of weakness in your IT estate.

3. Share the results

If the results of your cyber risk assessment are filed away, you’re missing a huge opportunity to create a visible, security-first culture within the business.

Share the results of the assessment - and the strategy it has inspired. Discuss with teams the impact of cyber risk on their work and how preventative measures can help the organisation be more resilient to attacks.

4. Think data

Data is an asset. It’s essential to make sure you know where valuable data resides in your business, and how its risk profile changes as it makes its way through the organisation from the supply chain, into business systems, the shop floor and out towards third-parties.

5. Consider third-party risk

When working closely with third-parties, you potentially expose yourself to any cyber risk they have within their organisation.

Look at the critical relationships you have and how vulnerabilities within the ecosystem might impact your risk profile.

6. Monitor constantly

To determine when and how a cyber breach could take place in key areas of the business, you’ll need to be vigilant with monitoring. Cyber attackers exploit vulnerabilities, such as unpatched software or default passwords

Implementing vulnerability scanning can reduce the opportunities for attackers to access your systems.

7. Get employees on board

The best cyber risk programme you could imagine is next to useless if it doesn’t gain buy-in company-wide. Everyone has their part to play in a company’s cyber risk strategy, but do individuals and teams in your organisation know their responsibilities? Make it clear where the responsibilities lie for the crucial components of the cyber risk programme.

Drive awareness of your cyber strategies and make people aware of their responsibilities. This approach will mitigate phishing and social engineering risks, protect your IP and keep sensitive data out of harm’s way.

Most importantly, ensure there are appropriate escalation paths in place that enable the reporting of unusual activity or areas of concern.

To find out more, download Cyber Security Protection: 3 Key Questions to Ask in Boardroom:

Download the Cyber Security Protection