What We Do
How we do it
Resources
SECURITY ADVISORIES
Jul 26, 2021
PetitPotam NTLM Relay Attack
THE THREAT PetitPotam is a variant of NTLM Relay attacks discovered by security researcher Gilles Lionel. Proof of Concept code released last week [1] relies on the Encrypting File System Remote (EFSRPC) protocol to provoke a Windows host into performing an NTLM authentication request against an attacker-controlled server, exposing NTLM authentication details or authentication certificates.…
Read More
View all Advisories →
Company
ABOUT eSENTIRE
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1000+ organizations in 70+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
LATEST PRESS RELEASE
Jul 12, 2021
Tecala and eSentire Partner to Protect Enterprises across APAC from Business-Disrupting Cyber Attacks
Sydney, 12 July, 2021 - Tecala, Australia’s award-winning technology services and IT consulting provider, today announced it has chosen eSentire, the global Authority in Managed Detection and Response (MDR) cybersecurity services, as their exclusive MDR solution provider in Australia and New Zealand. This partnership will enable Tecala to augment its cybersecurity practice and offer enterprises…
Read More
Partners
PARTNER PROGRAM
Partners
Our award-winning partner program offers financial rewards, sales and marketing tools and personalized training. Accelerate your business and grow your revenue by offering our world-class Managed Detection and Response (MDR) services.
Learn about our Partner Program
Resources
Blog — Apr 23, 2019

How manufacturers can thwart modern cybersecurity threats

3 min read

As orginally published on SmartIndustry

By Mark Sangster, VP & industry security strategist, eSentire

Joe Nocera, cybersecurity & privacy principal, PwC

David R. Brousell, executive director, Manufacturing Leadership Council

When people talk of protecting critical national infrastructure, there’s a sector that the public should not forget: manufacturing. According to research from eSentire, it is especially vulnerable to cyberattacks. In the company’s Cybersecurity FutureWatch 2018 report, which surveyed 1,250 IT decision-makers, manufacturers self-ranked above financial institutions when it came to cyberattacks.

The economic prowess of our country is measured by the strength of its manufacturers. This makes the manufacturing sector a top target.

Attackers and motivations

Attackers have different motives; some may wish to gain a market advantage for a competitor. Stealing IP is just one way to do it. It can involve a breach of systems, likely by a nation state that then chooses to disrupt production operations.

Other attackers seek financial gain using ransomware, such as the March 2019 attack on the global aluminum and renewable energy company Norsk Hydro, which cost it at least $40m. This risk ranked highest in the Manufacturing Leadership Council survey.

Another risk worrying survey respondents is malware, affecting laptops, email servers and mobile devices. Malware is often delivered via phishing attacks that persuade unwitting employees to click on malicious links.

In spite of these risks, the same survey found that 64% have no formal cybersecurity strategy in place. What is responsible for this gap between awareness and action?

A fundamental misalignment

Manufacturers’ heavy dependence on the supply chain opens them up to third-party risk. Another eSentire survey of 600 IT and security decision-makers, called Third-party risk to the nth degree, found that 44% of them had experienced a data breach due to third-party security problems, while only 15% were notified.

Another hinderance is an internal cultural mismatch. Manufacturers have historically grappled with not one technology team, but two. Many manufacturing companies struggle to bring together their IT and OT teams. These teams are out of step. IT teams deal with quickly-changing administrative networks, while OT networks take years to change. A lack of communication between the two creates confusion over who is responsible for cybersecurity, leaving manufacturers ill-prepared for attacks. If an attack necessitates shutting down a production line, who should make that call?

A way forward

Manufacturing companies must respond to these risks by making cybersecurity a strategic board-level issue, which helps them focus on best practices and policies. A strategic view lets manufacturers take a risk-management approach to cybersecurity. IT and OT teams can identify and rank risks based on their likelihood and their potential impact to mission-critical assets.

Manufacturers should also factor supply chain cybersecurity into that risk-management process by holding suppliers to account. They should identify the risk associated with the supply chain and contractually obligate those supply chain elements to specific security standards.

Today’s manufacturing industry understands the importance of cybersecurity as it prepares to embrace a rapidly evolving digital environment. They must make it as important as physical safety in their culture. Manufacturers must ask themselves: Are we prepared to take on the challenge?

Mark Sangster
Mark Sangster Vice President and Industry Security Strategist

Mark is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors influencing the way that legal firms integrate cybersecurity into their day-to-day operations.