-->

Cybersecurity: 4 things OEMs should do to protect themselves

cybersecurityIn today’s increasingly connected world cybersecurity is a real concern for businesses. Recent high-profile cases of cyber attacks, such as the ransomware that hit the NHS, have exposed the vulnerabilities in our systems, and analysts stress that attacks are becoming increasingly sophisticated and more frequent. 

For manufacturers there is a heightened cause for concern – manufacturing has been declared one of the top three most targeted industries for cyber attacks. And while Industrie 4.0 and expansion into Cyber-Physical Systems (CPS) will have a positive impact on the industry in terms of increasing efficiency, they open the door to even more security risks such as a hacker taking over production, or changing the output of the manufacturing process.

The effects of cyber attacks can be catastrophic for manufacturers; personal and corporate data can be compromised, company reputation damaged, and disrupted or lost productivity is guaranteed to have a major hit on revenue.

Cybersecurity will certainly be a priority for most Original Electronics Manufacturers (OEMs). So, what are the things they should be doing to protect themselves?

1. Start with the workforce

Making IT security a part of work culture is a vital starting point. You may argue that in the digital world of today everyone is already aware of nefarious ‘phishing’ scams and how to handle them. It’s likely that each of your employees will have received at least one suspicious email in the last week or month. But the sophistication of these e-mails is increasing which means educating staff on the latest tactics needs to be on-going.   

OEMs therefore have a responsibility to ensure that everyone in their organisation is aware of the risks and equipped with the right information on how to mitigate against them. OEMs should train staff to ensure they are aware of ‘do’s and don’ts’ (e.g. not opening unexpected email attachments, clicking on links, best practice for passwords, etc.), and implementing formal company-wide standards that hold employees accountable. 

2. Keep safeguards up to date

OEMs will want to ensure they have preventative measures in place to minimise the risk of an attack being successful. There are many software solutions available that can spot and block malware and other potential threats, as well as more enhanced software tools that ‘listen’ to all the activity on a computer network and detect anything unusual.

But these systems and, indeed, many of the software solutions all businesses use will regularly release updates or ‘patches’ to fix vulnerabilities that can be exploited by cyber attackers to install ransomware. The NHS case is a prime example of how key this is – the attack could have been avoided by the proper application of a new patch for Windows that had been released two months earlier. Being vigilant and proactive in ensuring patches are up to date on all software systems will help guard against the latest threats.

3. Make sure data is securely backed up

Aggressive malware or viruses can corrupt files and disable computers, causing significant downtime and a substantial loss of revenue. OEMs will need to invest time and money into developing a comprehensive backup strategy to avoid disruption to production schedules. A three-tier approach to this may be considered; daily file syncing, regular backups of user machines on easily accessible storage devices isolated from the rest of the network, and long-term backups where everything your company needs to recover in case of an emergency is physically isolated in heavily secured centres.

4. Establish an incident-response (IR) plan

The harsh reality is that if a hacker is set on finding a way into your system, there’s not much you can do to stop them. Therefore OEMs should invest in developing an incident-response (IR) plan to manage breaches in the event of an incident. An effective IR plan will limit damage and reduce recovery time and costs.

McKinsey have developed a list of 9 guiding principles that should be reflected in any IR plan. They include assigning an executive to have ongoing responsibility for the plan, developing a taxonomy of risks, and in the event of an incident; having an established process for making major decisions and ensuring everyone knows what to do.

It’s clear that cybersecurity is not just an IT issue – it’s much bigger than that. It’s a business management issue; reliant on rigorous planning and analysis, a consistent focus, and internal communication and training. And the threat to cybersecurity is not static; it’s critical that OEMs keep a finger on the pulse of the latest risks, and where appropriate communicate these internally.

Developing an effective strategy is a big investment (in terms of both time and costs), but the increasing prevalence and advancing complexity of cyber attacks is a genuine threat that OEMs need to be ready for.

Process Instrumentation and Control: Your guide to implementing a successful outsourcing strategy

Written by Neil Sharp

Neil has over 25 years’ experience in Electronics Manufacturing Services and Component Distribution. During his career, Neil has held a range of leadership positions in sales, marketing, and customer service. Neil is currently part of the ESCATEC Senior Management Team and is responsible for setting and delivering the overall Group Marketing strategy. Neil heads up the marketing department and is responsible for both the strategy and the implementation of innovative marketing campaigns designed to deliver high quality content to those seeking outsourcing solutions.