Welcome to our monthly manufacturing security newsletter, where we bring you the latest insights on safeguarding your operations and staying ahead in the industry. |
|
In 2025, UK manufacturers face rising cyber threats targeting intellectual property and operational technology.
This blog offers a practical guide to achieving Cyber Essentials accreditation, securing supply chain contracts, and protecting high-tech environments.
Learn how to assess risks, implement controls, and build a proactive security culture with expert insights from Equilibrium Risk. |
|
|
|
Pandora Jewellery Data Breach via Salesforce Compromise |
|
|
|
Pandora A/S confirmed a major cybersecurity incident that exposed customer names, emails, phone numbers, and birthdates. The breach stemmed from a compromise of the Salesforce platform, exploited through social engineering.
Although no financial data was accessed, the incident underscores the risks of third-party platforms and the importance of employee awareness. |
|
|
|
Cyber Threat Landscape for UK Manufacturing in 2025
This analysis explores the internal and external cyber risks facing UK manufacturers, including data loss, IP theft, and supply chain vulnerabilities.
It highlights the growing need for integrated security strategies and proactive risk assessments, especially as AI-powered threats and insider risks increase.
Explore the Report Here.
|
|
| | AI-Powered Scams and Supply Chain Breaches Hit UK Businesses
From Marks & Spencer to Co-op, UK businesses have faced a wave of cyber attacks in 2025. AI-driven scams and social engineering tactics have led to widespread data breaches, affecting millions of customer records.
The manufacturing sector is particularly vulnerable due to complex supply chains and legacy systems.
Read more here. |
|
|
|
Security Tip of the Month |
|
Secure Your Supply Chain Access Points In high-tech manufacturing, supply chain partners often require access to your systems, data, or facilities. But every external connection is a potential vulnerability.
Tip: Conduct a quarterly review of all third-party access permissions—digital and physical. Ensure that:
- Access is role-based and time-limited - Credentials are revoked immediately when no longer needed - External partners meet minimum cybersecurity standards, such as Cyber Essentials - Physical access points (e.g. delivery bays, contractor entrances) are monitored and logged
Why it matters: Supply chain breaches are one of the fastest-growing threats in 2025. A single weak link can expose your IP, disrupt operations, and damage client trust.
Better Security Builds Better Businesses
|
|
|
|
UK Businesses Face Unprecedented Cyber Incident Rates |
|
|
|
A new report by Commvault and GigaOm reveals that 93% of UK businesses have experienced a business-critical cyber incident, making the UK the most exposed country globally.
Despite this, UK organisations are 21% less likely to have a dedicated recovery environment and 11% less likely to test recovery plans regularly.
The report highlights the urgent need for manufacturers to adopt robust cyber resilience strategies, including Cyber Essentials accreditation.
Read the full report here. |
|
|
|
August 2025: A Month of Unprecedented Cyber Attacks and Data Breaches |
|
August saw a surge in cyber attacks across UK industries, with threat intelligence reports indicating a rise in AI-driven scams, ransomware, and data breaches.
The manufacturing sector is particularly vulnerable due to complex supply chains and legacy systems. This reinforces the importance of proactive security assessments and Cyber Essentials certification to mitigate risks.
Read the full analysis here. |
|
|
|
? Is Your Factory Secure?
Manufacturers are under increasing threat – from physical breaches to cyberattacks. Our quick, online self-assessment helps you uncover vulnerabilities across your facility in just a few minutes.
? What You’ll Assess Our guided online tool walks you through:
- ? Physical Security – Access control, surveillance, perimeter protection - ? Cybersecurity – Network safety, backups, user access, patching - ⚙️ Operational Security – Policies, training, visitor management, compliance
? Why Take the Assessment? - ✅ Fast & Simple – Complete in under 10 minutes - ? Instant Results – See your security strengths and gaps immediately - ? Actionable Insights – Get tailored recommendations based on your answers - ? Repeatable – Use quarterly or annually to track improvements
? Why It Matters - 66% of manufacturers were hit by ransomware in 2023 - 87 million records were exposed in manufacturing breaches - Most incidents stem from avoidable oversights
Start Your Assessment Now |
|
|
|
Equilibrium Risk. 3M BIC Firth Street, Huddersfield. W Yorks. HD1 3BD. United Kingdom
|
|
|
|
|
|