Industryweek 8367 Cyber Security1

What Manufacturers Need to Know about Cybersecurity

March 3, 2015
5 tips to protect your manufacturing firm against intellectual property theft.

Information security continues to be one of the hottest topics in business. From the Justice Department issued indictments for five Chinese military officers to the nearly daily reports of data breaches, you simply can’t escape the increasing threats to data.

Each company and industry varies in the type of information it has that is most important—in retail, its’ payment card information and for the healthcare industry it is patient personal health information. For manufacturers with complex supply chains, the data that is of most value includes intellectual property on patents, designs and formulas.

I’ve compiled a list of important tips companies can follow to prioritize data security to ensure that your most valuable asset isn’t compromised:

1. Put Intellectual Property (IP) & Trade Secret Protection at the Top of the List

This may seem like a no-brainer, but despite all of the chatter in the C-Suite about cybersecurity, very few companies have meaningful data protection programs in place today. They often cite the need to preserve the free flow of information as to not impede worker productivity. But the truth is, there are solutions and approaches that balance the need to protect data with the need to drive rapid innovation. IP and trade secret protection has to be an executive priority or it won’t get done.

2. Identify Your Most Valuable Data Assets

Organizations must have knowledge of their IP and trade secrets if they want to prevent them from being stolen. All too often organizations have no idea where this valuable data is stored and who has access to it. Simply identifying the crown jewels can feel like a daunting task, but it doesn’t have to be — you don’t have to boil the ocean. Start with your most critical IP — the stuff you know hackers are after. For example, manufacturers would do well to start protecting engineering and R&D documents such as design files. Get that identified first and then move to the next organizational function.

3. Protect Those Data Assets

This is going to sound very basic, but once sensitive data is identified… label it. Literally mark all critical assets as “internal only” or “confidential.” Whether the document is digital or paper-based, this is the quickest and easiest protection method. It provides employees a visual cue to treat the document with care, and those employees are often the ones that are targets for hackers. There are also much more sophisticated approaches and technology that ensure your trade secrets stay that way. From encryption to digital rights management and persistent document tagging, to policy-driven data protection, there are numerous approaches to ensure data flows freely, but only on a need-to-know basis.

4. Think Like the Cyber Criminals 

Take a look at all of your business processes to determine where data theft might occur. Assess your data from an outsider’s standpoint — what would you want to steal and how would you do it? And, go about the work to plug those holes. The security pros call it “threat modeling” and it’s one of the most effective ways to ensure security.

5. Improve Employee Awareness  

The weakest link in data defense is the employee — from the C-level executive to the receptionist. Add data protection to manuals and employment agreements, and train them on your policies regarding the use of confidential data. It also helps to perform regular security awareness training and invite your contractors, vendors and partners to participate, as they should be subject to your data protection policies as well.

6. Bonus Tip  Be Prepared if Your IP is Stolen

Have an incident response plan at the ready. Even the organizations that do data protection very well can still become victims of breaches. Today, cyber criminals are more nimble and financially motivated than ever before, so it pays to be prepared.

Salo Fajer drives Digital Guardian’s strategic vision and core innovation efforts while also overseeing product management, product marketing and product content development.

Sponsored Recommendations

Voice your opinion!

To join the conversation, and become an exclusive member of IndustryWeek, create an account today!