How Vulnerable Are You To a Cyber Attack? A Self-Assessment Tool for Manufacturers
Home 9 Manufacturing Operations 9 Technology 9 How Vulnerable Are You To a Cyber Attack? A Self-Assessment Tool for Manufacturers

This post was originally featured on the Manufacturing Innovation Blog and was authored by Pat Toth


It’s important for everyone — manufacturers and others — to recognize the threat of cyber attacks and how to prevent them. The vulnerabilities exploited by cybercriminals can shut down your operations, requiring your company to spend thousands of dollars on enhancing security measures and reassuring customers you’re still trustworthy.

One of the challenges manufacturers often face regarding cyber threats is that they’re not sure how vulnerable they really are. Have you ever thought about how you can assess your company’s vulnerability level? Wouldn’t it be great to be able to better understand where your company lands in meeting its cybersecurity needs?

Fortunately, it’s easier than you may think. You can get started by using the MEP National NetworkTM Cybersecurity Assessment Tool to self-assess  the level of cyber risk to your business.

A Walk through of the Cybersecurity Assessment Tool

As you may know, the National Institute of Standards and Technology (NIST) released the five-part Cybersecurity Framework, which has become the standard for cybersecurity in the manufacturing and many other industries. MEP’s self-assessment tool is based on the Framework and follows its five categories: Identify, Detect, Protect, Respond, and Recover.

cybersecurity framework graphic

Identify

After you’ve provided some basic information about your company including the state of residence, you can begin to use the assessment tool. Keep in mind that NIST and the MEP National Network do not retain any information about your company, other than its location. Your score for each step of the Framework will not be recorded. You may want to take note of your score in order to track your progress when you use the tool again for a re-assessment.

The first part of the self-assessment tool relates to the existing structures and practices that help identify cyber threats to your company.

Topics covered in this section include:

  • Whether you’ve identified the confidential data your company holds and which devices contain it
  • Employee phishing training and their access to sensitive data
  • Whether the devices that store sensitive information are up to date and do not include nonessential business applications
  • Your understanding of the legal and regulatory requirements your company must follow regarding cybersecurity
  • Organizational risk tolerance determination and expression
  • Whether you share and receive information about threats and vulnerabilities from internal and external sources
  • How your company manages passwords
  • The strength and complexity of the passwords you use
  • How often your company changes passwords

The answer choices are straightforward; most require only “yes,” “no” or short answers.

Protect

Next, the tool goes into the Protect category of the NIST Cybersecurity Framework and discusses system protection. Be prepared to give answers about matters such as:

  • Automatic timeouts
  • Firewalls
  • Data retention and destruction policies
  • How often employees receive cybersecurity training
  • Whether workers can access company data remotely
  • Access management for physical assets
  • Data encryption
  • Disaster recovery policies
  • Physical asset management and protection
  • Whether your human resources department assists with cybersecurity practices by doing things like locking a person’s account when they leave the company

Detect

The Detect category of the NIST Cybersecurity Framework assesses how well you are equipped to detect malicious threats to your systems. You’ll answer questions related to matters like:

  • Anti-virus and anti-malware protection installed on devices
  • The frequency of malware checks
  • How your business monitors for cybersecurity events
  • Whether you track network security events and correlate them with log files

Respond

The Respond portion of the Framework checks to see how well your business is prepared to take action after detecting a cybersecurity threat or incident. The questions cover topics such as:

  • Whether parties in your organization have assigned roles and responsibilities and know how to carry them out when needed
  • Details about the response plan your company has in place to use after an incident
  • Whether you’ve made changes after past cybersecurity issues to stop problems from happening again
  • Whether there is a person or group assigned to keep cybersecurity events under control and discover when and where they occurred
  • Whether your business has a plan in place to notify customers about compromised sensitive information

Recover

The Recover category deals with the practices you have in place to help your business recover after a cybersecurity incident. The section covers:

  • How often you back up your data
  • Whether you have contact details for parties that could help with the recovery process as needed — such as law enforcement personnel, internet service providers, public relations agencies and lawyers that specialize in cybercrime
  • Whether your recovery plan has actions you and your employees will take to restore normalcy after a cybersecurity event
  • Whether there is someone at the organization responsible for managing the recovery
  • Whether your recovery strategies incorporate lessons learned and get updated as your technologies or plans change
  • Whether you have insurance coverage associated with cybersecurity

After you finish with the questions within the Recover section, the tool shares a few recommended resources before it generates your score.


If you have questions about cybersecurity, reach out to Shane at OMEP for guidance.

More Related Posts

LEVERAGING DEFENSE & SECURITY MARKETS

LEVERAGING DEFENSE & SECURITY MARKETS

Announcing a 12-month initiative funded by the U.S. Economic Development Administration, in partnership with Business Oregon and Pacific Northwest Defense Coalition (PNDC), to develop new markets and sales channels for Oregon manufacturers to offset the impacts of...

Author

  • Shane Steinke

    Shane is an executive leader with more than twenty-three years of operations and planning experience, skilled at managing dynamic and complex environments while balancing personnel, budgets, and customer requirements. As a Principal Consultant at OMEP, Shane delivers results by utilizing his extensive experience with risk mitigation and problem analysis to evaluate alternative options for manufacturers and by helping them to implement change successfully. Before OMEP, Shane served in the United States Air Force. During his military career, he led process analysis to improve efficiencies, driving a 67% performance increase. As a change management expert, Shane specializes in leading complex organizations. He draws on his Military experience to connect manufacturers with opportunities in the Department of Defense (DOD) supply chain.

    View all posts

OMEP Recommends

To jumpstart your continuous learning initiatives, we are creating a curated list of our recommended materials. You will find these listed on our blog page, and we will add to this list in every newsletter.

Here are three recommendations to kick this off!