Cyber Resilience The Underestimated Risks in Cyber Security

A guest article by Marc Dönges | Translated by AI 5 min Reading Time

Related Vendors

Cyber threats are constantly evolving—especially for industry. Prevention is essential. However, given limited resources, a key question arises: where can the most effective measures be taken?

According to a VDMA survey, companies expect cybersecurity incidents to increase in the coming years.(Picture: © valerybrozhinsky - stock.adobe.com)
According to a VDMA survey, companies expect cybersecurity incidents to increase in the coming years.
(Picture: © valerybrozhinsky - stock.adobe.com)

Around 54% of the companies surveyed in the VDMA "Industrial Security" study anticipate an increase in security incidents in their own company in the coming years. This assessment is also reflected in other studies and is supported by developments in recent years. The trend is pointing steadily upwards. Cyber attacks are on the rise and are becoming increasingly sophisticated.

For companies, this in turn means that the threat is not only increasing, but is also becoming increasingly difficult to detect. In addition, attacks are increasingly targeting small and medium-sized companies, whose resources in the area of cyber security are often limited.

However, preventive IT security measures are not a question of "if", but of "how many". Even small, low-threshold actions can make a decisive contribution to better securing your own company and protecting it from hacker attacks.

The Domino Effect of A Cyberattack

If a cyberattack occurs, an affected company often has to deal with the security incident for several days or even weeks. The consequences for industrial companies in particular, where technology, supply chains and partner companies are often affected in the event of an attack, are serious in most cases. According to the VDMA study, the affected companies mostly suffer capital losses (32%) and production losses (29%).

Two examples illustrate these risks. The turbine manufacturer Wiegert & Bähr was the victim of a hacker attack. The fraudsters gained access to an employee's email account and changed the bank details on two invoices. The money, totaling almost half a million US dollars, was then transferred to an account in Spain. It was only by chance that the fraud was discovered through the deceptively genuine-looking invoices and the payments were stopped in time.

The situation is much more drastic following a hacker attack at plant manufacturer Kreisel GmbH & Co. KG. The company with 140 employees was attacked by hackers in 2024 and was paralyzed for several weeks. The plant manufacturer had to file for insolvency at the beginning of 2025. The financial imbalance responsible for this resulted, among other things, from the security incident in the previous year.

The examples show impressively what effects a hacked email inbox, for example, can have on the entire company structure. Processes, machines and relationships with employees and partners are put to the test during cyber attacks or, in the worst case, can even be compromised. Production downtimes and delivery difficulties are then consequences that can quickly threaten the existence of small and medium-sized companies in particular.

Only the Weak Link is Safe: Cyber Threats for Industrial Companies

A cyberattack can have many faces. Due to the increased use of artificial intelligence by hackers, incidents are becoming increasingly difficult for companies to recognize as such. The VDMA study identifies "social engineering and phishing" (1st place), "human error and sabotage" (2nd place) and "software and hardware vulnerabilities in the supply chain" (3rd place) as the threats with the highest risk assessment on the part of the companies surveyed.

This picture is consistent with current developments in the field of cyber security. Phishing attacks in particular have been successful for years in sabotaging companies and their data. Attackers attempt to steal sensitive information such as usernames, passwords or credit card details by posing as trustworthy institutions and tapping into confidential data through fake emails, websites or messages.

The human factor has also become increasingly relevant for hackers in recent years in order to gain access to sensitive information. This is precisely where social engineering comes in and specifically uses the human factor to obtain passwords, for example.

In addition to the aforementioned supply chain security, OT (operational technology) security is also an important factor in protecting industrial companies. While cyber criminals target the weakest link in an attack on the supply chain in order to compromise the entire supply chain, attacks on OT systems use the systems themselves as door openers and give cyber criminals access to data and networks.

Subscribe to the newsletter now

Don't Miss out on Our Best Content

By clicking on „Subscribe to Newsletter“ I agree to the processing and use of my data according to the consent form (please expand for details) and accept the Terms of Use. For more information, please see our Privacy Policy. The consent declaration relates, among other things, to the sending of editorial newsletters by email and to data matching for marketing purposes with selected advertising partners (e.g., LinkedIn, Google, Meta)

Unfold for details of your consent

Proactivity Instead of Waiting

The security situation for industrial companies is coming to a head. Waiting to take preventive measures will have consequences sooner or later. Even the first steps in the area of cyber security can have a major impact and better protect a company and its data from cyber attacks.

This includes measures in the areas of password security, backup structure and employee sensitization. Companies must ensure that their team uses complex passwords and, ideally, two-factor or even multi-factor authentication should be used. This method confirms the identity of employees with an additional security measure. Unauthorized access to systems and data is thus prevented.

Many companies are often negligent when it comes to backups. However, backups are a decisive factor when it comes to restoring data or a system. In addition to the continuous creation of backups, it is important that the backups are regularly checked and updated.

Furthermore, in addition to two physical copies, one should also be stored in the cloud. This backup process should be recorded transparently, communicated within the company and, above all, adhered to. This is the only way a backup can really help in an emergency and avoid lengthy process restrictions.

Employee sensitization is becoming increasingly important. As the threats have shown, the human factor is increasingly at the center of hacker attacks. Cybersecurity training courses that convey the topic in a practical way and are tailored to the company ensure that the fear of misconduct is allayed and that staff react correctly in the event of a security incident.

Securely Positioned for A Digital Future

Cyber resilience is not just a trending topic, but a key factor for companies to remain future-proof and competitive. Industrial companies need to take a close look at their processes and supply chains and minimize cyber risks as much as possible. This is the only way to mitigate the impact of cyber attacks.

In addition to mandatory measures that arise for affected companies as a result of directives such as the NIS2 Directive or the Cyber Resilience Act, small and medium-sized enterprises in particular should evaluate cyber security in their company in detail and derive concrete actions. Only companies that strategically anchor the topic within the company will remain on an equal footing in digital competition.

Marc Dönges is project manager at the cyber security transfer office for SMEs