CIO Influence
CIO Influence News Cloud Security

The Manufacturing Sector Experiences More Attacks in the Cloud than Any Other Industry

The Manufacturing Sector Experiences More Attacks in the Cloud than Any Other Industry

Phishing, user account compromise and data theft were the most common security incidents in the cloud for manufacturing companies in 2023.

Netwrix, a cybersecurity vendor that makes data security easy, revealed additional findings for the manufacturing sector from its survey of 1,610 IT and security professionals across more than 100 countries.

PREDICTIONS SERIES 2024 - CIO Influence

CIO INFLUENCE News: Sevilla FC Transforms the Player Recruitment Process with the Power of IBM watsonx Generative AI

According to the survey, 64% of companies in the manufacturing sector suffered a cyberattack during the preceding 12 months, which is similar to the finding among organizations overall (68%). However, it turned out that the manufacturing sector experiences more cloud infrastructure attacks than any other industry surveyed. Among manufacturing companies that detected an attack, 85% spotted phishing in the cloud compared to only 58% across all verticals; 43% faced user account compromise in the cloud as opposed to 27% among all industries; and 25% dealt with data theft by hackers in the cloud compared to 15% for organizations overall.

“The manufacturing sector relies heavily on the cloud to work with their supply chain in real time. This makes their cloud infrastructure a lucrative target for attackers — infiltrating it enables them to move laterally and potentially compromise other linked organizations, as happened to one the world’s top meat processing companies. Credential compromise or malware deployed via a phishing email is just the beginning of the attack,” says Dirk Schrader, VP of Security Research at Netwrix.

Read More : CIO Influence Interview with Devin Ertel, CISO at Menlo Security

“The attack surface in the cloud is always expanding, so it’s critical for manufacturing companies to adopt a defense-in-depth approach,” adds Ilia Sotnikov, Security Strategist at Netwrix. “First, they must rigorously enforce the principle of least privilege to limit access to sensitive data, which ideally includes just-in-time access to eliminate unnecessary entry points for adversaries. They also need to gain deep visibility into when and how critical data in the cloud is being used so that IT teams can promptly spot potential threats. Finally, they need to be prepared to minimize the damage from incidents by having a comprehensive response strategy that is regularly exercised and updated.”

CIO INFLUENCE News: SAP Security Response Names SecurityBridge’s Research Lab As Top-3 Worldwide; Joris Van De Vis Appointed Lab’s Director

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

Keysight Secures First 5G RedCap Test Case Validations

Business Wire

Noetic Cyber Launches with $20M in Funding

CIO Influence News Desk

LogDNA Introduces Logging Usage Quotas

CIO Influence News Desk