• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Endpoint Security  /  What are the attack channels used by adversaries to target the manufacturing sector during the Coronavirus pandemic?
The manufacturing industry slain by the pandemic just when it was showing technological promise?
11 June 2020

What are the attack channels used by adversaries to target the manufacturing sector during the Coronavirus pandemic?

Written by Seqrite
Seqrite
Cybersecurity, Endpoint Security
Estimated reading time: 2 minutes

The onset of the coronavirus (COVID-19) pandemic and the resultant social distancing measures across the world has had a sobering effect on the manufacturing industry. Large-scale plants have shuttered down and with demand at a historical low, the economic side-effects have been significant. Since a large part of the workforce in this sector works on assembly lines and shop floors, work from home is not really a viable option for manufacturing companies, leading to a steady drop in revenues and cost rationalization measures.

In recent years, the sector has modernized itself, embracing digitalization and the Internet of Things (IoT). An era of smart manufacturing has emerged which enables more effective production and faster time to market. However, this digitalization has also resulted in an expansion of the attack surface for the manufacturing sector. Compared to even a decade ago, far more devices are connected which has increased the attack surface. Consequently, the sector has become one of the chief targets for cyber attackers. The ongoing pandemic has not changed this situation and adversaries are continuing to use various attack channels to target manufacturing organizations.

Gaps in the supply chain

Manufacturing is a sector which is more reliant on their supply chains than other domains. The ecosystem is characterized by various partners at different chains that regularly interact with each other during the production process. Overnight, these entire chains have had to shift to working remotely which has caused severe gaps in the chain in terms of cyber-preparedness. Cyber actors are exploiting this gap as they are aware that one breach can affect the entire supply chain of the manufacturing ecosystem.

Security gaps in a remote working system

Many companies have tried to enable business continuity by shifting workstations to employees. This is not an ideal situation as this is a sector that requires specialized software. By shifting these systems out of secure office perimeters, the security apparatus has been reduced. Organizations now have lesser controls over these systems and the prospect of employee error has increased. Employees may connect to insecure networks or click on malicious links – they could use pirated software on work devices which may lead into a collapse in security.

Lack of cybersecurity awareness

A large portion of a typical manufacturing company’s workforce is skilled or semi-skilled. The ongoing pandemic has compelled organizations to switch to a remote working model without getting the time to train such workers on cybersecurity precautions. Workers unfamiliar with digitalization are now required to download and use company-mandated apps but their unfamiliarity with the process makes them easy targets for malicious threat actors.

Seqrite’s Endpoint Security Cloud offers manufacturing organizations a comprehensive solution to keep their perimeters safe by securing endpoints, remotely. The cloud-based software enables simple and secure management remotely by integrating innovative technologies to protect from advanced threats at different levels. Requiring minimal technical expertise to set up, Seqrite Endpoint Security Cloud offers a user-friendly interface that can easily be customized to keep organizations secure during these tough times.

 Previous PostWhen will IT & ITes businesses understand the data breach da...
Next Post  Maze ransomware continues to induce maximum mayhem for the enterp...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • BEC and Ransomware attacks unsettle businesses globally.

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Increased adoption of IoT creates a brand-new attack surface.

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Recognize Hybrid Cloud’s unique security challenges.

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • RAT used by Chinese cyberspies infiltrating Indian businesses RAT used by Chinese cyberspies infiltrating Indian businesses December 18, 2020
  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • How can EdTech companies deal with rising security challenges? How can EdTech companies deal with rising security challenges? December 24, 2020

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • BEC and Ransomware attacks increase during the pandemic

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Are we prepared against risks generating from the IoT revolution?

    Are we prepared against risks generating from the IoT revolution?

    January 15, 2021
  • Proactiveness is the key to resolving hybrid cloud’s security challenges

    Proactiveness is the key to resolving hybrid cloud’s security challenges

    January 6, 2021

Stay Updated!

Topics

Antivirus For Linux (10) Antivirus For Server (9) BYOD (9) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (275) cyber security (25) Cyber threat (29) cyber threats (44) Data (10) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) incident response plan (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (55) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.