Under attack: How manufacturing can stay cybersecure in 2025

Following the recent cyberattack on Jaguar Land Rover, we explore how manufacturers can shore up their digital defences in an industry under increasing threat.

Having halted production for over a month following a critical and widespread cyberattack, causing massive disruption to its global supply chain, Jaguar Land Rover has now announced plans to resume production thanks to government intervention.

The scale of the attack shines a critical light on the state of cybersecurity in the manufacturing industry, demonstrating the catastrophic impact of a single security breach. Paused production, intense financial impact (the attack is costing JLR millions per week), and reputational damage are just the beginning for Jaguar Land Rover. The effects will be felt by entire economies for months, maybe years, to come.

The need for watertight cybersecurity has never been more urgent. In this article, we explore best practices manufacturers should adopt to strengthen their defences – covering everything from secure-by-design principles to Zero Trust processes – and demonstrate how you can build digital resilience into your business operations.  

Manufacturing under attack 

According to a recent report by Cowbell, supply chain cyberattacks surged by an unprecedented 431% between 2021 and 2023, with this trend continuing to escalate in 2025. As the backbone of global supply chains, the manufacturing sector is among the most vulnerable to attack, accounting for 22% of cyberattacks this year alone, and as many as 54% of large organisations identify supply chain challenges as the biggest barrier to achieving cyber resilience, according to the World Economic forum.   

As we enter an era of digital transformation in manufacturing, integrated cloud-based systems are becoming the central nervous system for business operations – but with vast interconnectivity comes increased security risk.

Automotive factory worker

Manufacturing’s unique security challenges 

As an implementation partner working with leading UK manufacturers, we’re witnessing a perfect storm of risk factors when it comes to cybersecurity, including:

  • Legacy system blind spots: Many manufacturers still run outdated legacy systems that lack modern security protocols, leaving their systems vulnerable to sophisticated attacks.
  • Complex third-party supply chains: Modern ERP systems don’t operate in isolation – they integrate with dozens of suppliers and third-party services, introducing weak links and easy entry points.
  • The hidden fourth tier: While most companies focus on first- and second-tier supplier security, visibility drops to nearly zero when it comes to the fourth tier.
  • IT/OT convergence creating vulnerabilities: Legacy OT systems weren’t built to withstand modern cybersecurity threats – connecting these systems exposes vulnerabilities and compromises security.
  • 24/7 operations requiring constant uptime: Continuous production leaves little time for vital patching and updates that keep systems watertight.
  • Valuable intellectual property: Proprietary designs and processes make manufacturers prime targets for data theft.
  • Multiple regulatory requirements: Complex and overlapping cybersecurity standards increase compliance risks across global operations.

 

Engineer inputting data in a smart factory

Cybersecurity best practice for manufacturers 

As manufacturing becomes increasingly digital and connected, a robust approach to cybersecurity is essential to protect operations, data, and reputation. At Columbus, we recommend the following best practices to form the foundations of a resilient and secure smart factory.

Build a security-first architecture 

Embed secure-by-design principles into every layer of operations, and make cybersecurity a critical priority when implementing new systems or integrating new suppliers. Build security into the foundations of your digital operations – don’t make it an afterthought.

Secure IT and OT environments  

Implement robust cybersecurity measures to safeguard critical assets and prevent unauthorized access between IT and OT system.

Adopt a Zero Trust mindset 

Assume every connection could be a threat: verify identities, control access, and monitor activity across all networks. If you can’t see it, you can’t secure it. 

Keep systems updated and monitored 

Regularly patch software, monitor for anomalies, and use automated alerts to detect threats early. Working with an implementation partner can ensure secure installation of legitimate updates, even in 24/7 production environments. 

Implement strong access controls 

Strengthen security with multi-factor authentication, restrict access where required, and secure remote access through VPNs. Employee training in is essential, along with clearly defined response procedures in the event of a security breach.

Ensure back-up and recovery resilience  

The question isn’t if you’ll face a supply chain cyber incident, but when. Ensure you have a backup system and disaster recovery plans in place to restore operations quickly after an incident.

Secure the supply chain 

Evaluate third-party cybersecurity and set clear security standards for all digital and data connections.

Build a culture of cyber resilience 

Treat cybersecurity as part of operational excellence, not just an IT function. Employees should be able to follow security processes with ease, and understand why they are critical to business operations every single day.  

 

While the risk of cyberattack remains unprecedented in 2025, a resilient security strategy can strengthen your defences against attack by providing better visibility and control over your entire supply chain. But manufacturers need to act now – attackers target the industry daily for IP, ransom, or disruption, and every day without proper security is an unnecessary risk.

Industrial Engineers, computer

How Microsoft security fights manufacturing cyberattacks 

At Columbus, we help manufacturers strengthen their cyber defences in many areas, for instance using Microsoft’s four-layer defence system which delivers intelligent, end-to-end protection designed for today’s complex digital environments.

Microsoft security helps manufacturers detect, respond to, and prevent cyber threats before they disrupt production. From Zero Trust access management to AI-driven threat protection, these technologies enable businesses to innovate, safe in the knowledge their operations are fully secure. 

  1. Intelligent access control: Microsoft Entra ID is an access-management solution based on Zero Trust – evaluating every access attempt using identity, device, location and risk signals. Secure, multi-factor authentication means stolen passwords alone won’t grant access. 
     
  2. AI threat detection: Microsoft Sentinel monitors your entire ecosystem 24/7, combining AI, automation, and threat intelligence to spot threats and visualise attack paths before damage occurs.  
     
  3. Unified protection: Microsoft Defender XDR protects email and collaboration tools, endpoints, cloud apps, and IoT/OT devices. Threats such as ransomware are automatically disrupted, giving your team time and full control to investigate and prevent advanced attacks.  
     
  4. Just-in-time privileges: Privileged Identity Management provides time- and approval-based role activation, enabling you to control and monitor access to critical operations. This reduces unnecessary and misused access that could pose a threat to your security.
Professionals having a discussion

Transform security with expert partnership

Having the tools to secure your business isn’t always enough – proper implementation, monitoring and maintenance is critical to shoring up your defences in the long-term. That’s where expert partnership becomes essential.  

The right partner provides a thorough assessment of your current security measures and works with you to develop a security roadmap that aligns with your business operations. You’ll receive tailored implementation with minimal disruption, managed protection and rapid incident response, and continuous improvement to build a culture of cyber awareness.

Find out more about our cybersecurity services here.

The devastating cost of a single security breach far outweighs ongoing security investment. Prevention isn’t just cheaper – as proven by the devastating attack on Jaguar Land Rover, it’s essential. 

Working with Columbus 

Columbus takes a practical approach to your cybersecurity. Our expert team delivers tailored solutions that address real-world threats, enabling your business to confidently navigate the digital transformation of the manufacturing industry.  

Whether you’re seeking support with an ERP implementation or need a certified Microsoft consultant to embed security into your operations, we have deep manufacturing knowledge and integration experience to support your secure transformation.

Take a look at some of our manufacturing customer success stories here.

 

 

Contact Columbus today to discuss your cybersecurity needs.

chris profile
Chris Clifford Principal Security Architect
Kevin Bull 2
Kevin Bull Product Strategy Director
Related manufacturing insights