• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

6 Proven Hacker-Repelling Ways for Manufacturers to Secure an ICS

Even though they don’t provide the same immediate financial payoff as businesses in other industries, manufacturers remain a favorite target of cyber criminals. Rather than directly stealing money, attacks may focus on disabling systems and causing damage to critical infrastructure. Criminals may also have their eyes on intellectual property or internal operational information as part of a corporate espionage campaign. Motivation aside, the aftermath is no less painful.

To reach their targeted data, cyber criminals leverage a variety of attack vectors. One avenue that is particularly enticing is a manufacturer’s Industrial Control Systems (ICS). This computer-based network, which orchestrates the industrial processes of a facility, tends to be deployed on older hardware. The critical nature of the equipment also makes it hard to take time to patch – and harder still to take offline and replace. Should criminals gain control over it, the damage can be catastrophic.

A recent example of an ICS attack that earned headlines globally concerned an unnamed German steel mill. Attackers initially gained access to the mill’s network by way of a spear-phishing campaign directed at the business side of the house. Once inside, they were able to dig around, eventually gaining access to the production environment. At that point, they were free to meddle with control systems to the point where one of the mill’s blast furnaces was unable to be properly shut down, resulting in massive damage. The attackers’ motives, whether it was to purposefully inflict damage or if that was an unintended consequence of some other design, remain unclear.

Keys to tightening your company’s Industrial Control Systems

What took place at that German steel mill is a worst case scenario. However, it serves to underscore the importance of securing ICS against cyber attacks and accidents. Here are six ways modern manufacturers can do just that:

  • Perform regular assessments. Cyber threats are always evolving. Defenses that don’t follow suit will be little help should they be placed in the crosshairs. Security teams should review their security environment at the very least annually to make sure everything is up-to-date and operating at the highest level. These assessments should include critical infrastructure, user access, and more to protect against incidents stemming from internal and external sources.
  • Regularly monitor system events. IT has enough to worry about in terms of active threats without having to add in those which have already been neutralized. However, there’s a lot that can be learned from security event logs, even those concerning incidents that were prevented. They can help you spot trends relating to risky user behavior or organizational security weak points.
  • Deploy reliable perimeter defenses. IBM’s Threat Intelligence Report is clear – the perimeter is a major risk factor for businesses. Roughly 91% of attacks on manufacturers occurring in 2016 were launched by outsiders. Defenses such as advanced firewalls and intrusion prevention systems must be deployed to harden the business against exterior assault. As mobility becomes more ingrained, businesses must also consider user identities to be part of the perimeter and defend them as such.
  • Deploy endpoint security. The same push for enterprise mobility that has shifted user identities to the security perimeter has also necessitated tighter defenses around endpoints. Employees want to work from a variety of devices and it’s up to IT to leverage antivirus software, mobile device management, whitelisting, etc. to ensure they can do so without putting corporate systems at risk.
  • Commit to patches and updates. There’s too much riding on manufacturers’ ICS to fall behind on patches. It’s no small feat to put together a patching calendar that acknowledges both production goals as well as security needs. However, the risks of failing to do so are too great to overlook.
  • Manage and audit changes. Changes should be tracked across an organization’s IT environment. However, it’s of paramount importance when it comes to ICS. Any configuration adjustments should be documented and backed up. This can reduce downtime during maintenance and, in the event of tampering incidents – it can make the root cause of issues easier to find.

Don’t face today’s cyber threats alone

Arraya’s Cyber Security Practice can help ensure your ICS is up to the challenge presented by today’s cyber criminals. They can provide the strategic advice and the tactical solutions needed to keep data safe and criminals at bay. Our Cyber Security Practice can be reached by visiting: https://www.arrayasolutions.com//contact-us/.

Visit us on social media – LinkedIn, Twitter, and Facebook – to leave us a comment or a question on this post. While there, follow us to keep up with our latest industry insights, company blogs, and exclusive special events.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}