Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…
Rachel Hunt
1 min read
Published September 14, 2021
Last updated January 7, 2022

Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for information to grab and sell to the highest bidder. Recent news headlines show how crippling ransomware attacks can halt assembly lines and disrupt supply chains.

Overexposed information — especially sensitive data – exponentially increases risk. This exposure is your “blast radius” — think of it as all the damage an attacker can do once inside your environment. If just one employee clicks on a phishing email, an attacker can potentially access every file an employee can touch.

To understand the extent to which the manufacturing sector is protecting its sensitive information from these evolving threats, we developed the 2021 Manufacturing Data Risk Report.

We examine the state of data security – on-premises, cloud, and hybrid environments – for industrial manufacturers and engineering firms. We analyzed a random sample of Data Risk Assessments for 50 companies—and a total of 4 billion files–to determine how data is exposed and at risk.

Here are just a few key findings:

  • Every employee can access, on average, 6 million files on their first day on the job.
  • 4 in 10 organizations have 1,000+ sensitive files open to every employee.
  • 44% of companies have more than 1,000 active “ghost user” accounts enabled.
  • More than half of companies have 500+ accounts with passwords that never expire.

Read the full report: 2021 Manufacturing Data Risk Report

👋 Want to find out if your data is putting your organization at risk?

Get a highly customized data risk assessment run by engineers who are obsessed with data security. Request yours at https://info.varonis.com/start

 

 

 

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

threat-update-46-–-ransomware-early-warning:-data-discovery
Threat Update 46 – Ransomware Early Warning: Data Discovery
Ransomware gangs are in it for the payout. To ensure maximum “conversion” rates for their victims to pay up, they often try to find as much sensitive or valuable data to steal before unleashing an attack and encrypting the victim's data.
threat-update-47-–-ransomware-early-warning:-data-exfiltration
Threat Update 47 – Ransomware Early Warning: Data Exfiltration
Thought ransomware couldn’t get any worse? Ransomware gangs are now stealing victim’s data before unleashing ransomware – forcing victims to pay up or deal with the fallout when attackers post…
threat-update-28-–-re-ryuk’ed-&-exchange-zero-day
Threat Update 28 – Re-Ryuk’ed & Exchange Zero-Day
Is it too soon for a 2020 throwback? The Ryuk ransomware gang certainly doesn’t think so! It looks like one of the premiere ransomware-as-a-service groups was not content to rest on their laurels, and it appears they’ve added self-spreading capabilities.
threat-update-#14---post-ransomware-recovery
Threat Update #14 - Post-Ransomware Recovery
To stop ransomware, every second counts. But once the threat is contained, the race is on to get back up and running after a ransomware incident. Click to watch Kilian Englert...