Cyber Security


Why Cyber Security Matters

Small manufacturers are a vital part of our nation’s economic and cyber infrastructure. There are over 289,000 small manufacturers in the U.S. In 2015, the average cost of a data breach for small companies was $38,000. It has been estimated that more than half of the companies go out of business within six months of a cyber attack3. For most small manufacturers, the security of your information, systems, and networks is not the highest priority given everything else you’re faced with. But an information security or cyber security incident can be detrimental to the business, your customers, partners, or suppliers. It’s important that manufacturers understand and manage the risk and establish a cyber security protocol to protect your most critical assets.

Five Steps to Reduce Cyber Risks

This resource is for small manufacturers to quickly and cost effectively address cyber security threats. These simple, low cost steps are based on the official NIST guidance from the Cyber security Framework and have been tailored to meet the needs of small companies so they can identify, assess and manage cyber security risks.

Cybersecurity Framework Steps for Manufacturers

Tools & Steps to Get Started with Cyber Security

Catalyst Connection’s Cyber Security team has designed a comprehensive four-step cyber security program. We will help gauge your current situation for a manufacturing client and tailor a plan specifically for the internal capabilities, budget and time sensitivity. Here’s how it works:

  • Step 1: Discovery – the professional assessment of a company’s practices related to the new standard. If necessary, a gap analysis will be completed to document the scope to be remediated.
  • Step 2: Remediate to Meet New Standard – supports all necessary fixes to ensure compliance. This may include updates to firewalls, patches, policy development, employee training, physical security, network configuration, etc.
  • Step 3: Test and Validate – verifies that all technology and physical security aspects are working properly. A penetration test may be necessary.
  • Step 4: Monitoring/Reporting – establishes ongoing monitoring and scanning of the required enterprise network. Creates a working process to log, remediate and report (as required) cyberattacks.