{"id":9679,"date":"2024-06-27T10:22:40","date_gmt":"2024-06-27T15:22:40","guid":{"rendered":"https:\/\/www.bbrown.com\/?post_type=insight&#038;p=9679"},"modified":"2024-06-27T10:22:40","modified_gmt":"2024-06-27T15:22:40","slug":"manufacturing-giant-faces-cyberattack","status":"publish","type":"insight","link":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/","title":{"rendered":"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column]\n\t<div class=\"hero hero--wrap    \">\n\n\t\t<div class=\"hero--background-image hero--background-image-blur\">\n\t\t\t<div class=\"hero--overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"hero-background\" style=\"background: url(https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg) center center no-repeat; background-size: cover;\"><\/div>\n\t\t\t\t\t<\/div>\n\n\t\t<div class=\"hero--container\">\n\t\t\t<div class=\"container\">\n\t\t\t\t<div class=\"hero--inner width-100\">\n\n\t\t\t\t\t\n  <div class='content-heading  100%  '>\n    <p class='text-white subheading'>Property &amp; Casualty<\/p>\n    <h1 class='text-white    '>\n      Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations\n    <\/h1>\n\t\n  <\/div>\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\n\t<\/div>\n\n\t\n[\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;]\n  <div class='content-heading  100% content-heading--ruled '>\n    \n    <h1 class='text-brand-dark-blue    h2'>\n      Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations\n    <\/h1>\n\t\n  <\/div>[vc_column_text]In today\u2019s digital age, even industry giants are vulnerable to cyberattacks. In 2023, a major household goods manufacturer faced a cybersecurity incident that disrupted operations, highlighting the critical need for robust digital infrastructure protection, especially within manufacturing and operational technology (OT) systems.<\/p>\n<p>Company X isn\u2019t alone. These ongoing attacks serve as a reminder of the heightened vulnerability of manufacturing and OT systems. From toy companies, travel organizations and major household names, what makes manufacturers such attractive targets for cybercriminals?<\/p>\n<ul>\n<li><strong>Interconnected systems:<\/strong> Modern factories rely on a mix of old and new machinery, often with interconnected IT and OT systems. This complexity creates vulnerabilities attackers can exploit, potentially halting production.<\/li>\n<li><strong>Valuable data:<\/strong> From product designs and blueprints to customer information and supply chain details, manufacturers hold a wealth of valuable data. This data can be stolen for industrial espionage or held for ransom, creating a significant financial burden.<\/li>\n<li><strong>Global economic impact:<\/strong> Cybercriminals know that disrupting production for even a short period can have a ripple effect throughout the supply chain.<\/li>\n<\/ul>\n<p>In the aftermath of the attack, Company X reacted swiftly, isolating affected systems to prevent further damage. Recognizing the severity, they engaged law enforcement and activated business continuity plans. This likely involved a shift to manual administration and communication processes, which was a necessary sacrifice to help mitigate the fallout.<\/p>\n<p>Reports suggest the attack might have involved ransomware, potentially explaining the significant financial impact. Early estimates indicate losses exceeding $400 million, with a large portion likely attributed to the following factors:<\/p>\n<ul>\n<li><strong>Production slowdowns:<\/strong> compromised systems likely impact production scheduling, leading to delays and hindering output<\/li>\n<li><strong>Supply chain disruptions:<\/strong> disruptions in OT systems could affect communication and coordination with suppliers, impacting the flow of raw materials and finished goods<\/li>\n<li><strong>Inventory management issues:<\/strong> inefficiencies could hamper inventory control, potentially leading to stock inconsistencies and shortages<\/li>\n<\/ul>\n<p>Company X reportedly incurred nearly $50 million in breach-related costs by the end of 2023 and expects additional costs in 2024. Below is a potential breakdown of the breach-related Company X might have faced:<\/p>\n<ul>\n<li>Direct Costs:\n<ul>\n<li>Remediation efforts (IT restoration, forensics)<\/li>\n<li>Third-party consultant fees<\/li>\n<li>Legal and compliance expenses<\/li>\n<\/ul>\n<\/li>\n<li>Indirect Costs:\n<ul>\n<li>Lost sales due to production slowdowns and product shortages<\/li>\n<li>Reputational damage<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Like fortifying a complex machine, there are ways to make your manufacturing operations less vulnerable. Below are some key components of a robust cybersecurity strategy.<\/p>\n<ul>\n<li><strong>Regular security assessments:<\/strong> These are like routine maintenance checks, identifying system weaknesses before attackers exploit them.<\/li>\n<li><strong>Network segmentation:<\/strong> Separate your IT and OT systems, creating firewalls to isolate potential breaches and prevent widespread disruption.<\/li>\n<li><strong>Employee training:<\/strong> Educate your employees on cybersecurity best practices, making them aware of phishing attempts and suspicious activity. They are your frontline defense against social engineering attacks.<\/li>\n<\/ul>\n<p>In the fast-paced manufacturing world, even a minor security breach can be a catastrophic system failure. By taking a proactive approach to cybersecurity, manufacturers can help their operations run smoothly, protect their data, and avoid production delays.<\/p>\n<p>At Brown &amp; Brown, we understand the unique challenges manufacturers face in the cyber world. Our Advanced Risk Quantification process, utilizing Cyber In-Site\u2122, helps companies model potential cyber breaches and their financial impact. Think of it as a stress test for your complex machine, identifying potential weak points before they cause a breakdown.[\/vc_column_text]\t<div class='wpb_content_element text-left btn-container'>\n\t\t\t\t\t<a class='btn btn-brand-green  '\n\t\t\t\thref='https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External_web.pdf' target='_blank' data-toggle=''>\n\t\t\t\t<span class=\"btn-text-color--default\">Download PDF<\/span>\n\t\t\t<\/a>\n\t\t\t<\/div>\n[\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_single_image image=&#8221;6248&#8243; alignment=&#8221;center&#8221; style=&#8221;vc_box_circle_2&#8243;][vc_separator border_width=&#8221;2&#8243; el_width=&#8221;60&#8243;][vc_column_text]<\/p>\n<h6 style=\"text-align: center;\">Salman Ansari<\/h6>\n<p style=\"text-align: center;\">Managing Director<\/p>\n<p>[\/vc_column_text]\t<div class='wpb_content_element text-center btn-container'>\n\t\t\t\t\t<a class='btn btn-brand-dark-blue  '\n\t\t\t\thref='\/us\/contact\/contact-general\/' target='' data-toggle=''>\n\t\t\t\t<span class=\"btn-text-color--default\">Connect Now<\/span>\n\t\t\t<\/a>\n\t\t\t<\/div>\n[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]In today\u2019s digital age, even industry giants are vulnerable to cyberattacks. In 2023, a major household goods manufacturer faced a cybersecurity incident that disrupted operations, highlighting the [&hellip;]<\/p>\n","protected":false},"author":66,"featured_media":9692,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"insight_category":[34],"class_list":["post-9679","insight","type-insight","status-publish","has-post-thumbnail","hentry","insight_category-property-casualty"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations - Brown &amp; Brown<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations\" \/>\n<meta property=\"og:description\" content=\"[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]In today\u2019s digital age, even industry giants are vulnerable to cyberattacks. In 2023, a major household goods manufacturer faced a cybersecurity incident that disrupted operations, highlighting the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"Brown &amp; Brown\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External_linkedin-graphic.png\" \/>\n\t<meta property=\"og:image:width\" content=\"4167\" \/>\n\t<meta property=\"og:image:height\" content=\"2084\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/\",\"url\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/\",\"name\":\"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations - Brown &amp; Brown\",\"isPartOf\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg\",\"datePublished\":\"2024-06-27T15:22:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#breadcrumb\"},\"inLanguage\":\"us\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#primaryimage\",\"url\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg\",\"contentUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg\",\"width\":1000,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bbrown.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\/\/www.bbrown.com\/us\/news-events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#website\",\"url\":\"https:\/\/www.bbrown.com\/us\/\",\"name\":\"Brown &amp; Brown\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bbrown.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"us\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#organization\",\"name\":\"Brown &amp; Brown\",\"url\":\"https:\/\/www.bbrown.com\/us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png\",\"contentUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png\",\"width\":1000,\"height\":136,\"caption\":\"Brown &amp; Brown\"},\"image\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations - Brown &amp; Brown","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/","og_locale":"en_US","og_type":"article","og_title":"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations","og_description":"[vc_row row_style=&#8221;page-hero&#8221; full_width=&#8221;stretch_row_content&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;2\/3&#8243;][vc_column_text]In today\u2019s digital age, even industry giants are vulnerable to cyberattacks. In 2023, a major household goods manufacturer faced a cybersecurity incident that disrupted operations, highlighting the [&hellip;]","og_url":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/","og_site_name":"Brown &amp; Brown","og_image":[{"width":4167,"height":2084,"url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External_linkedin-graphic.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/","url":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/","name":"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations - Brown &amp; Brown","isPartOf":{"@id":"https:\/\/www.bbrown.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg","datePublished":"2024-06-27T15:22:40+00:00","breadcrumb":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#breadcrumb"},"inLanguage":"us","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#primaryimage","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2024\/06\/Manufacturing-Giant-Faces-Cyberattack-Brown-Brown-External.jpg","width":1000,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.bbrown.com\/us\/insight\/manufacturing-giant-faces-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bbrown.com\/us\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.bbrown.com\/us\/news-events\/"},{"@type":"ListItem","position":3,"name":"Manufacturing Giant Faces Cyberattack | OT Impacts and Considerations"}]},{"@type":"WebSite","@id":"https:\/\/www.bbrown.com\/us\/#website","url":"https:\/\/www.bbrown.com\/us\/","name":"Brown &amp; Brown","description":"","publisher":{"@id":"https:\/\/www.bbrown.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bbrown.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"us"},{"@type":"Organization","@id":"https:\/\/www.bbrown.com\/us\/#organization","name":"Brown &amp; Brown","url":"https:\/\/www.bbrown.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","width":1000,"height":136,"caption":"Brown &amp; Brown"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/9679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/types\/insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/users\/66"}],"version-history":[{"count":0,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/9679\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media\/9692"}],"wp:attachment":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media?parent=9679"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight_category?post=9679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}