Skip to main content

Specialist Cyber Protection: For Manufacturing Firms

Manufacturing firms not a cyber risk? Think again.

The Key Exposures Facing Manufacturing Firms

Convergence of IT and OT security

Routine IT procedures, such as antivirus updates and software patching, can lead to significant production disruptions and have the potential to temporarily shut down entire production lines. To further complicate the already challenging task, software updates are not always available for Operational Technology (OT) assets, leaving critical operational and production assets susceptible to security vulnerabilities.

Interconnected risks from new technology

While new technologies have the benefit of increasing productivity, the complexity of such advancements also poses significant supply chain risks. Global malware events that impact supply chains may cause devastating widespread disruption and delay, often derailing the critical manufacturing processes.

Business interruption and domino impact

While the Internet of Things improves efficiency in manufacturing with network-connected devices, it also provides increased exposure to attacks that can cripple ICS or supervisory control and data acquisition (SCADA) systems. Such disruptions can grind ordinary business to a halt and force manufacturers to incur significant costs to get back online and resume operations.

How our Specialist Coverages Respond to the Threats Facing Manufacturing Firms:

We protect manufacturing firms against cyber threats by building resilience and minimising risk

  1. Broad definition of Dependent Business as a third-party entity that provides necessary products and services to the Insured Organisation pursuant to a written contract, including supply chain-related interruptions.
  2. Incorporates a qualifying period approach to business interruption coverage instead of a waiting period.
  3. Computer System definition includes technology such as Industrial Control Systems (ICS), Programmable Logic Controllers (PLCs) and Supervisory Control and Data Acquisition (SCADA).
  4. Third party liability coverage for bodily injury claims arising from cyber incidents, available up to $250,000 sub-limit.
  5. “Bricking” coverage to replace computer devices or equipment stemming from a security breach related incident.

Claims examples

How our policy supports clients for the duration of the claim

For more on suggestions to reduce risk and our appetite for Manufacturing firms, download the PDF.