Cyber threats are constantly evolving—especially for industry. Prevention is essential. However, given limited resources, a key question arises: where can the most effective measures be taken?
According to a VDMA survey, companies expect cybersecurity incidents to increase in the coming years.
Around 54% of the companies surveyed in the VDMA "Industrial Security" study anticipate an increase in security incidents in their own company in the coming years. This assessment is also reflected in other studies and is supported by developments in recent years. The trend is pointing steadily upwards. Cyber attacks are on the rise and are becoming increasingly sophisticated.
For companies, this in turn means that the threat is not only increasing, but is also becoming increasingly difficult to detect. In addition, attacks are increasingly targeting small and medium-sized companies, whose resources in the area of cyber security are often limited.
However, preventive IT security measures are not a question of "if", but of "how many". Even small, low-threshold actions can make a decisive contribution to better securing your own company and protecting it from hacker attacks.
The Domino Effect of A Cyberattack
If a cyberattack occurs, an affected company often has to deal with the security incident for several days or even weeks. The consequences for industrial companies in particular, where technology, supply chains and partner companies are often affected in the event of an attack, are serious in most cases. According to the VDMA study, the affected companies mostly suffer capital losses (32%) and production losses (29%).
Two examples illustrate these risks. The turbine manufacturer Wiegert & Bähr was the victim of a hacker attack. The fraudsters gained access to an employee's email account and changed the bank details on two invoices. The money, totaling almost half a million US dollars, was then transferred to an account in Spain. It was only by chance that the fraud was discovered through the deceptively genuine-looking invoices and the payments were stopped in time.
The situation is much more drastic following a hacker attack at plant manufacturer Kreisel GmbH & Co. KG. The company with 140 employees was attacked by hackers in 2024 and was paralyzed for several weeks. The plant manufacturer had to file for insolvency at the beginning of 2025. The financial imbalance responsible for this resulted, among other things, from the security incident in the previous year.
The examples show impressively what effects a hacked email inbox, for example, can have on the entire company structure. Processes, machines and relationships with employees and partners are put to the test during cyber attacks or, in the worst case, can even be compromised. Production downtimes and delivery difficulties are then consequences that can quickly threaten the existence of small and medium-sized companies in particular.
Only the Weak Link is Safe: Cyber Threats for Industrial Companies
A cyberattack can have many faces. Due to the increased use of artificial intelligence by hackers, incidents are becoming increasingly difficult for companies to recognize as such. The VDMA study identifies "social engineering and phishing" (1st place), "human error and sabotage" (2nd place) and "software and hardware vulnerabilities in the supply chain" (3rd place) as the threats with the highest risk assessment on the part of the companies surveyed.
This picture is consistent with current developments in the field of cyber security. Phishing attacks in particular have been successful for years in sabotaging companies and their data. Attackers attempt to steal sensitive information such as usernames, passwords or credit card details by posing as trustworthy institutions and tapping into confidential data through fake emails, websites or messages.
The human factor has also become increasingly relevant for hackers in recent years in order to gain access to sensitive information. This is precisely where social engineering comes in and specifically uses the human factor to obtain passwords, for example.
In addition to the aforementioned supply chain security, OT (operational technology) security is also an important factor in protecting industrial companies. While cyber criminals target the weakest link in an attack on the supply chain in order to compromise the entire supply chain, attacks on OT systems use the systems themselves as door openers and give cyber criminals access to data and networks.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
Proactivity Instead of Waiting
The security situation for industrial companies is coming to a head. Waiting to take preventive measures will have consequences sooner or later. Even the first steps in the area of cyber security can have a major impact and better protect a company and its data from cyber attacks.
This includes measures in the areas of password security, backup structure and employee sensitization. Companies must ensure that their team uses complex passwords and, ideally, two-factor or even multi-factor authentication should be used. This method confirms the identity of employees with an additional security measure. Unauthorized access to systems and data is thus prevented.
Many companies are often negligent when it comes to backups. However, backups are a decisive factor when it comes to restoring data or a system. In addition to the continuous creation of backups, it is important that the backups are regularly checked and updated.
Furthermore, in addition to two physical copies, one should also be stored in the cloud. This backup process should be recorded transparently, communicated within the company and, above all, adhered to. This is the only way a backup can really help in an emergency and avoid lengthy process restrictions.
Employee sensitization is becoming increasingly important. As the threats have shown, the human factor is increasingly at the center of hacker attacks. Cybersecurity training courses that convey the topic in a practical way and are tailored to the company ensure that the fear of misconduct is allayed and that staff react correctly in the event of a security incident.
Securely Positioned for A Digital Future
Cyber resilience is not just a trending topic, but a key factor for companies to remain future-proof and competitive. Industrial companies need to take a close look at their processes and supply chains and minimize cyber risks as much as possible. This is the only way to mitigate the impact of cyber attacks.
In addition to mandatory measures that arise for affected companies as a result of directives such as the NIS2 Directive or the Cyber Resilience Act, small and medium-sized enterprises in particular should evaluate cyber security in their company in detail and derive concrete actions. Only companies that strategically anchor the topic within the company will remain on an equal footing in digital competition.
Marc Dönges is project manager at the cyber security transfer office for SMEs