Two Key Areas of Cybersecurity Vulnerability in Manufacturing

By better understanding operational weaknesses, manufacturers can guard against future threats. Read about two key areas that require assessment.

Getty Images 869287090

According to “2021 Cybersecurity: Assess Your Risk,” a new report from PMMI Business Intelligence, the first and most important step a manufacturer can take to improve their cybersecurity preparedness is to gain a thorough understanding of their operation’s vulnerabilities, and how those vulnerabilities can be exploited.

Modern manufacturing’s expanding scope of integrated technology is a ripe target for cybercriminals, as is the widespread adoption of cloud and edge computing.

Integrated Technology

Integrated production lines using smart sensors and actuators to collect data digitally has driven more flexible production and increased the rapid adoption of new technologies over the past decade. The desire for increased data collection continues to gain momentum and has spread across processing and packaging operations, with most companies moving toward an IIoT model of manufacturing.

79% of companies have implemented smart technologies on their processing lines, 64% on their assembly lines, and 60% at end-of-line packaging, according to recent survey data.

This move beyond just automated machine functionality and towards integrated machine communications, adopting digital data exchange, and allowing some level of secure remote access, means that every company must assess their network-connected operations to determine the potential threat of a cyberattack.

Industry 4.0 and IIoT technologies provide the opportunity for manufacturing companies to utilize the power of smart machines and real-time data analysis. Each wirelessly connected I/O (input/output) point creates new vulnerabilities of entry for cybercriminals.

The scope of data collection and monitoring schemes has also significantly expanded. It is estimated that there will be 58.1 billion IIoT connections in the industrial sector by 2024, and many plants already have a network of sensors and components tasked with monitoring and collecting data from all corners of the operation. Sensors connected to a network represent a potential point of intrusion for a cyberattack, and because individual components and sensors have limited processing capacity, they lack any internal cybersecurity safety features of their own. One analysis found that it took an average of only five minutes for newly connected devices/sensors to be targeted with a cyberattack.