Manufacturing in the digital age: the challenge of cybersecurity and IT optimization.

Mar.12.2025

Enterprise Architecture, Identity Management

The manufacturing industry is at an inflection point. With the increasing adoption of digital technologies, automation and connectivity in the supply chain, new challenges are also emerging. Cyber security and IT optimization are now essential elements to ensure operational efficiency and protection of strategic assets.

The shortage of IT talent has been a constant problem in various industries, and manufacturing is no exception. The challenge lies not only in attracting new professionals, but also in keeping existing ones motivated with cutting-edge technology. According to IDC, 65% of manufacturing companies face difficulties in recruiting qualified IT talent, which puts their ability to recruit IT professionals at risk.This jeopardizes their ability to innovate and remain competitive.

INCREASE IN CYBER-ATTACKS IN MANUFACTURING

According to a Kaspersky reportreport, in 2024 the manufacturing industry in Mexico was the most targeted sector, with 42.4 million attempted malware attacks, representing 29.7% of cyberattacks in the country.which represents 29.7% of cyberattacks in the country. This increase responds to the greater interconnectivity in production plants, where a single vulnerable point can compromise the entire operation.

Ransomware attacks have doubled in frequency in the manufacturing sector, severely affecting business continuity and information security. 93% of manufacturing companies have experienced intrusion attempts, with 78% suffering more than three attempts in the last year. (Source: CyberWar Magazine).

KEY VULNERABILITIES IN MANUFACTURING

  • Legacy systemsMany companies use old technology without security patches.
  • Lack of visibility into connected assetsWithout proper monitoring, IoT and OT devices can be entry points for attackers.
  • Dependence on third parties in the supply chainA vulnerable supplier can be the gateway for a massive attack.

Companies that have implemented IT optimization technologies have reported significant improvements in costs and security. For example, the adoption of ITSM (OpenText's Service Management Automation X) has reduced response times by 30% and improved operational efficiency by 25%. 30% and improved operational efficiency by 25% (Source: OpenText). (Source: OpenText).

KEY STRATEGIES FOR CYBERSECURITY IN MANUFACTURING:

  • Zero Trust ImplementationNo user or device should be considered secure by default.
  • Security automationUse of AI to detect threats in real time.
  • Continuous trainingEmployees must be prepared to identify risks.

The future of manufacturing will depend on the ability of companies to balance innovation and security, optimizing their operations and mitigating growing digital risks.. The question is not whether they should adopt these solutions, but how soon they can.

Companies that prioritize the security of their technology infrastructure and adopt efficient management models will be better prepared to face growing digital risks. Implementing robust IT architectures and fostering a culture of cybersecurity not only protects organizations, but also drives their long-term growth and sustainability.

Tags :
Enterprise Architecture, Identity Management