search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
FEATURE Cybersecurity


It only takes one weak link for a cyber threat to


bypass the factory doors and infect connected devices with disastrous results. So manufacturers need to pre-empt the next cyberattack with effective cybersecurity measures


Shockingly, three-quarters of organisations


across the UK, France, and Germany were ill- prepared for the NIS2 implementation date in October 2024. Failure to comply with NIS2  or 2% of an organisation’s global annual revenue, so it’s important that manufacturers assess how well existing cyber measures will comply with the legislation. As NIS2 aims to address the security of supply chains, companies will need to manage the cybersecurity risks associated with suppliers and ensure that appropriate security measures are in place throughout the supply chain.


4. Control access to lock down weak links The connectivity between OT and IT


environments allows employees to work across interfaces but it also creates new risks for workstations. An infected work terminal can become a stepping stone to the production environment through lateral


movement. This is why manufacturers need to control access to operational technology and monitor network interfaces. Access management can help manufacturers introduce new authorisation measures, such as multi-factor authentication, that ensure employees only access what they need, when they need it, and from approved locations. With more people working remotely and on their personal devices, it’s also important to consider the security implications of non- compliant devices. This is where stronger access controls and authentication methods can keep sensitive data and systems safe from potential threats.


5. Strengthen the frontline to create a 


According to IBM’s X-Force Threat Intelligence Index report, embedded scripts   are the most popular methods used by threat actors. All signs indicate that cyber threats are more likely to come through a company’s   Comprehensive training programmes can help prepare employees with the knowledge and skills to adapt and excel with  programmes, employees will only carry out proper cybersecurity practices if they are able to do so with ease. Robust access  tools can reduce delays and frustration for employees while helping manufacturers maintain security standards.


Columbus www.columbusglobal.com/en-gb/


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40