Manufacturing cybersecurity to step up in response to threats of cyberattacks

Recent manufacturing crises such as the baby formula shortage and the global chip shortage demonstrate the profound impact of downtime and production issues. From the global pandemic to lockdowns in China, manufacturers are now being warned about the risk of cyberattacks from Russia.  

Manufacturing is an emerging target for cyberattacks; production floors that were once protected by legacy or closed-network systems are now digitized and open to greater access—and risk. As a result of this, manufacturing organizations are starting to take a more aggressive stance on securing their informational technology (IT) and operational technology (OT) environments to ensure access to critical data and systems, but also to protect the integrity of intellectual property (IP), product parts and the software supply chain. Without these measures, manufacturers face the risk of an average data breach cost of $4.24 million—though that’s still pennies compared to the cost of unplanned downtime, which is now up to $50 billion per year.

A recent manufacturing cybersecurity survey revealed that 75% of cyberattacks result in a production outage. In 43% of the outage cases, production stopped for more than four days—to say nothing of the impact of cyberattacks on any of the downstream supply chain partners. 

In response to the increased risk landscape, in 2021, federal regulators released Executive Order 14028 which urged the public sector and federal agencies to harden security and adopt MFA. The Office of Management and Budget (OMB) Memo M-22-09 followed suit in 2022, offering guidelines for the implementation of Zero Trust security and phishing-resistant MFA, in order to protect against the evolving cyberattacks on critical infrastructure and the software supply chain.

As  these organizations place more emphasis on resilience and product quality in their supply chains, it’s time to up-level the manufacturing cybersecurity game and consider what practical steps can be taken to secure the IT and OT environments and all the critical points and people along the supply chain.

“Proactively securing our global supply chain was an important step as properly tested and approved products are counted on by our customers who buy and deploy them.” – Chad Lloyd, Director of Cybersecurity Architecture for Energy Management, Schneider Electric. Read the case study.

For more on how to implement phishing-resistant MFA, secure third-party access, and safeguard the supply chain, read our latest whitepaper: Protecting manufacturing with highest-assurance security.

Talk to our teamTalk to our team

Share this article:


  • Mission matters – my reflections on winning the EY World Entrepreneur of the Year “This is the biggest mission any of the entrepreneurs have presented in this competition.”  I heard these words a few weeks ago from one of the judges for the EY World Entrepreneur of the Year award program – whom I had the honor to meet during the final step of the world’s largest entrepreneur competition.  […]Read moreawardsFounderStina Ehrensvard
  • Yubico recognized by TrustRadius 2025 Award for top customer reviewsAs AI-driven cyber threats like credential phishing evolve and grow in complexity, phishing-resistant YubiKeys are an important component toward cyber resilience — and our mission to make the internet more secure has never been more critical. To support this, customer feedback is something we take very seriously and is an invaluable tool to ensure we’re […]Read moreawardsTrustRadius
  • CEO Corner: Maintaining stable growth while navigating global uncertaintyAs we officially close out the first quarter of 2025,  I am pleased we saw a quarter with solid growth and profitability along with ongoing demand for phishing-resistant authentication. We continue to see new types of high-profile cyber attacks appearing regularly, and a major reason for the success of phishing attacks is stolen credentials. As […]Read moreCEOCEO CornerEarningsMattias Danielsson
  • Introducing the Yubico Academy: Enabling partners for a phishing-resistant futureAt Yubico, strong partnerships are fundamental to a more secure digital world. Our commitment goes beyond providing leading security keys; it’s about actively fostering the growth of our valued partners through impactful enablement programs. A cornerstone is the Yubico Academy, featuring our comprehensive certification program.  This program enables our partners’ teams to become Yubico experts, […]Read more