Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementCybersecurity NewsHospitals & Medical Centers

Manufacturing is the most targeted sector by cyber criminals

By Jordyn Alger, Managing Editor
Clean factory

Image via Unsplash

August 22, 2024

Critical Start has released its biannual Cyber Threat Intelligence Report, detailing the top threat trends observed in the first half of 2024. This includes emerging cybersecurity threats impacting industries such as manufacturing, technology, healthcare, engineering and construction, and professional services. Key findings from the report include: 

  • Manufacturing is the top targeted industry by malicious actors, with 377 verified reports of ransomware and database leaks. 
  • Technology saw a 12.75% decrease in ransomware attacks and data leaks. 
  • Healthcare and life sciences ransomware and data exposure incidents increased by 180% in February 2024 when compared to February 2023. 
  • Engineering and construction experienced a 46.15% increase in cyberattacks.
  • Professional services saw a 15% increase in ransomware attacks and data leaks. 

Security leaders weigh in

Darren Guccione, CEO and Co-Founder at Keeper Security:

“The growing adoption of digital technologies in sectors like manufacturing and construction has led to the integration of Information Technology (IT) and Operational Technology (OT) systems in many organizations. While enhancing efficiency, this move presents heightened cybersecurity risks. To mitigate these risks, maintaining network segmentation, as well as a clear separation between IT and OT networks is vital. This separation limits the attack surface, protects infrastructure and ensures business continuity by preventing IT breaches from disrupting essential OT processes, such as operational controls and safety systems.  

“To better prepare for future attacks, organizations must focus on building resilience through a zero-trust security model, which limits access based on strict verification protocols, and by enforcing the principle of least-privilege access. Additionally, the integration of real-time threat intelligence and continuous monitoring can help identify vulnerabilities and potential threats before they escalate into full-blown incidents. Another lesson is the importance of maintaining robust backup and recovery protocols. In the face of a ransomware attack, having isolated and regularly updated backups can make the difference between a quick recovery and prolonged operational downtime.”

Stephen Kowski, Field CTO SlashNext Email Security+:

“I expect breaches and ransomware attacks to continue increasing throughout the rest of 2024, especially targeting healthcare, critical infrastructure and supply chains. Recent high-profile incidents in these industries highlight the ongoing vulnerabilities. To combat this, organizations need to focus on strengthening email security, implementing zero trust architectures, and improving threat detection and response capabilities.

“Manufacturing and construction sectors should prioritize securing operational technology networks and implementing zero-trust architectures. Organizations should deploy AI-based anomaly detection to identify unusual patterns in industrial control systems. Implement comprehensive email and collaboration security to prevent phishing and social engineering attacks targeting employees. Organizations should also implement behavioral analytics and machine learning to detect subtle indicators of compromise. Finally, regularly test incident response plans and conduct tabletop exercises to prepare for large-scale attacks on critical systems.

“As we move towards 2025, major ransomware trends will likely continue to include more targeted attacks on critical infrastructure, increased use of AI for evasion, and expansion of double extortion tactics. Security teams should prepare by implementing adaptive AI defenses, focusing on protecting sensitive data and enhancing resilience through robust backup and recovery processes.”

Marcus Fowler, CEO of Darktrace Federal:

“Due to the diversity of devices and bespoke protocols often used in industrial control systems, many critical infrastructure organizations struggle to maintain an accurate and up-to-date catalogue of all their assets. It is crucial that organizations have visibility into all their assets, not just those identified as critical — you cannot protect what you cannot see. This is especially critical as multi-stage and multi-domain attacks are now widely used by adversaries, who take advantage of a lack of visibility and siloes to move undetected between systems.

“Sophisticated cyber-attacks, fueled by the advent of AI together with automation, and as-a-service offensive tools, are outpacing current incident preparation, response, and management processes. Security teams often rely on outdated response strategies — like static pre-defined playbooks and tabletop exercises — that fail to deliver efficient and comprehensive situational awareness and recovery. Incident response playbooks are often created in a vacuum in a one-size-fits-all format for general attack types — for example, an organization might have one for ransomware and one for DDoS attacks, etc. While these playbooks may satisfy compliance requirements, their efficacy in a real-life incident is limited as the reality of an attack never quite aligns with the generic parameters outlined in a static playbook. 

“Organizations need to focus on collaborative integration of security solutions across the incident response program and can use both AI and machine learning to automate incident response. There is often a massive amount of incoming data pertaining to ongoing incidents that security teams and incident response teams alike must analyze to keep their networks secure. Automating this analysis makes the process of identifying and triaging ongoing incidents much more efficient, thus freeing up valuable resources. Organizations can configure this automation to ensure that only relevant events are alerted, but potentially malicious events are not missed. AI-augmented tools can also help with more rapid reporting capabilities by creating reports during and after an incident, freeing up security teams to focus on critical remediation tasks. 

“It is critical that organizations practice and drill incident response plans in real time in their bespoke environments to optimize procedures and ensure key players are ready. If a plan is never tested, it is impossible to know where gaps exist — until an incident occurs.”

KEYWORDS: cyber threats healthcare cybersecurity industry manufacturing security sector-specific security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jordynalger

Jordyn Alger is the managing editor for Security magazine. Alger writes for topics such as physical security and cyber security and publishes online news stories about leaders in the security industry. She is also responsible for multimedia content and social media posts. Alger graduated in 2021 with a BA in English – Specialization in Writing from the University of Michigan. Image courtesy of Alger

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Chinese flag

    Security Firm Targeted by China-Linked Hackers

    See More
  • Gmail on computer

    Gmail, Yahoo targeted by a new two-factor authentication phishing kit

    See More
  • Various pills

    FDA Urges Secure Cyber Practices for Medical Product Manufacturing

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing