Manufacturing Magazine January 2020 | Page 42

OPEN TO EXPLOITATION
TECHNOLOGY
42 digital technology to some extent , more than a third said concerns over cyber security prevented them from investing fully .
Such fears are not unfounded . After all , the efficiency and productivity benefits that digital technology can offer a manufacturer can easily be undone as the result of a single cyberattack . Attackers tend to have one of three primary objectives in mind – to steal data , to gain business intelligence , or to disrupt systems or operations . And any one of these can have a negative impact on a manufacturing organisation ’ s productivity , its bottom line , or its reputation .
It ’ s imperative , therefore , that manufacturers consider the state of the threat landscape , where their own vulnerabilities may lie , and how they can best defend their business against attack .
OPEN TO EXPLOITATION
To illustrate the extent to which manufacturers are vulnerable to attack , consider the growth of the IIoT . In basic terms , IIoT refers to a network of connected sensors , instruments and
JANUARY 2020