Your company is too small to be targeted for a cyberattack, right? That’s what Cincinnati Crane and Hoist (CCH) thought too. Like many small and medium-sized manufacturers (SMMs), it was busy with other things in its business and didn’t see itself as worthy of a cybercriminal’s time. The company thought it was too small to attract that kind of attention.

Wrong. CCH learned the hard way – it suffered a cyberattack that forced it to lay off employees. Between its customers and suppliers, this single breach affected at least 100 other companies. When the spear phishing attack happened, CCH President and CEO Tony Strobl said he and his leadership team really didn’t know what to do.

Four Things You Can Do

  • Think before you click: If a link looks a little off, think before you click. It could be an attempt to get sensitive information or install malware.
  • Update your software: Don’t delay – if you see a software update notification, act promptly. Better yet, turn on automatic updates.
  • Use strong passwords: Use passwords that are long, unique and randomly generated. Use password managers to generate and remember different, complex passwords for each of your accounts. A password manager will encrypt passwords, securing them for you.
  • Enable multifactor authentication: You need more than a password to protect your online accounts, and enabling multifactor authentication makes you significantly less likely to get hacked.

Cybersecurity for Smaller Firms

SMMs are often less prepared for a cyberattack than larger companies. Their information may not be well protected, their employees not aware of potential risks. Vulnerabilities increase and cyberattacks become more costly as manufacturers adopt new technologies.

The good news is that SMMs often have less complex operational needs than larger firms and may be able to quickly take basic measures to defend their information and systems. Start with the Manufacturers Guide to Cybersecurity for Small and Medium-Sized Manufacturers for easy steps to quickly and cost effectively address cybersecurity risk. This guide is based on the Cybersecurity Framework and generally accepted cyber hygiene best practices. It is broken down into five steps: identify, protect, detect, respond and recover. It also has some basic practices you and your employees can take immediately to protect your data.

Taking steps now will protect your business and make you more attractive to potential customers. Don’t wait until it’s too late! The sooner you start managing these risks, the better able your company will be to adapt and comply with customer or industry requirements and respond if an incident does happen. Beyond your bottom line, cybersecurity strengthens supply chains. It’s vital to the U.S. economy and national security that every company takes cybersecurity seriously.

ITAC Can Help You

CCH’s Tony Strobl said, “Find an expert, find somebody with the expertise that can help you firm up your defenses in cybersecurity. This is no longer something you can opt to do. This is a part of doing business today.” ITAC and our partners offers a range of cybersecurity resources for manufacturers, and can help with cybersecurity – and any other challenges your company faces. No matter what the issue is, give us a call and let us be part of that solution.