> industry.report —— sector: UK Manufacturing —— incidents_12_months: 78% —— six_figure_losses: 52% —— downtime: 1-7_DAYS —— message: YOU_ARE_A_TARGET<span class="cursor-blink">_</span>_
New research published by ESET in April 2026 paints a stark picture of the cyber threat facing UK manufacturing. Based on a survey of 500 senior manufacturing decision-makers, the findings confirm what the JLR attack demonstrated at catastrophic scale: manufacturing is now one of the most targeted and most vulnerable sectors in the UK.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallThe ESET findings land in the shadow of the Jaguar Land Rover attack — the most economically damaging cyber event in UK history, which halted production for five weeks and cost the wider economy an estimated £1.9 billion. JLR demonstrated the catastrophic end of the spectrum; the ESET data shows that smaller-scale incidents are affecting the overwhelming majority of the sector.
The convergence of IT and OT in modern manufacturing means that a cyber attack is no longer confined to data theft or email disruption — it can halt production lines, freeze supply chains, and cause physical-world consequences measured in lost vehicles, missed deliveries, and unemployed workers. The ESET finding that 95% of incidents resulted in business disruption confirms that cyber attacks on manufacturers are operational events, not merely IT events.
| Priority | Action |
|---|---|
| 1. Defend the IT/OT boundary | Segment your IT and OT environments. Ensure that a compromise in email, ERP, or office systems cannot cascade to production line controllers, SCADA systems, or robotics. The JLR attack showed what happens when this boundary fails. Test it through penetration testing. |
| 2. Implement phishing-resistant MFA | The Scattered Spider methodology — 'log in, not hack in' — relies on stolen credentials. Phishing-resistant MFA (hardware keys, passkeys) makes stolen passwords useless. Standard SMS or app-based MFA is better than nothing but can be bypassed by determined attackers. |
| 3. Achieve Cyber Essentials Plus | CE+ provides a verified baseline of the five core controls — patch management, secure configuration, access control, malware protection, and firewalls — that address the most common attack vectors. For manufacturers, CE+ is increasingly expected by customers, insurers, and (soon) regulators. |
| 4. Plan for operational disruption | Develop and test an incident response plan that specifically addresses production shutdown scenarios. How will you communicate with suppliers? How long can you sustain operations without IT systems? What manual workarounds exist? Test this through tabletop exercises. |
| 5. Secure your supply chain | Assess the cyber security posture of your critical suppliers. A breach at a key component supplier can halt your production as effectively as a breach at your own facility. Include security requirements in contracts and verify compliance. |
Our manufacturing security assessments cover the full attack surface — from IT/OT boundary testing to social engineering assessments to supply chain security reviews. We help manufacturers build the operational resilience that the current threat landscape demands.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call