Cyber security no longer an IT problem
From February issue, NZ Manufacturer magazine It’s a reputation risk manufacturers can’t ignore With corporate cyber breaches in the spotlight increasingly, NZ Manufacturer magazine advisor and Impact PR director Mark Devlin looks at how firms can protect their brand in the event of an incident. For years, cyber security sat comfortably in the IT bucket. It was treated as a technical risk to be managed through software, consultants and compliance exercises, largely removed from day-to-day operational and commercial decision-making. That separation might once have worked. It no longer does. For New Zealand manufacturers, cyber security has become a frontline business risk, one that increasingly plays out in public. When incidents occur, the damage is rarely limited to systems or data. It shows up in halted production, delayed orders, disrupted supply chains and, critically, lost trust. The reputational consequences often outlast the technical ones. That reality has been reinforced by the way cyber incidents are now covered in the media. Stories that once appeared in specialist technology columns are increasingly leading business news. Journalists are less interested in the mechanics of a breach and far more focused on impact: what stopped, who was affected and how leadership responded. In that environment, cyber security is no longer just about prevention. It is about preparedness, judgement and communication under pressure. Why cyber incidents hit manufacturers harder than most Manufacturers are particularly exposed. They operate at the intersection of physical production and digital infrastructure, where disruption in one area quickly cascades into others. Production lines, logistics platforms, inventory systems, payroll and supplier portals are deeply interconnected. A cyber incident does not just inconvenience office staff. It can shut down machinery, breach contracts and place long-standing customer relationships under strain. Unlike many service businesses, manufacturers cannot simply work around the problem while systems are restored. […]
