Human Risk Management

Closing the 19-day security awareness training gap in the manufacturing sector

5 May 2026 · 5 min read

At 6:18 am, just before a line starts, a maintenance supervisor gets a message about an urgent software update for a production asset. The timing feels believable. The wording sounds technical enough. The request looks like one more task to clear before the shift begins. By the time anyone questions whether the update is real, the attacker may already have reached a workstation, a remote-access path, or an engineer’s credentials.

According to SoSafe’s 2026 study, 67% of surveyed EU security professionals reported an increase in the number of AI-engineered attacks over the last 12 months and 71% reported an increased scope of AI attacks. 

The  same study found out that 19 days is the average time organisations take to update overall defences, refresh the guidance and training employees rely on, and measure whether the update actually changed behaviour after a new threat appears. Manufacturing made up 10% of respondents. 

In this sector, that delay can multiply operational risk because the same social engineering tactic can move from corporate systems into plant operations before the organisation has translated one incident into changed controls, changed guidance, and changed behaviour.

TL;DR

This article explains why the 19-day gap is especially risky in manufacturing, where social engineering often targets remote access, software updates, shared devices, vendors, and frontline workflows. It also shows how security leaders can shrink that gap by connecting faster reporting, role-based reinforcement, and behavioural proof into one adaptive human risk management loop.

Why the gap creates different risks in manufacturing

Manufacturing attracts attackers because even a routine-looking request can lead to downtime, access loss, or operational disruption if it slips through.

A remote support request, a maintenance update, a supplier document, or a help desk reset can all look routine while still opening a path to credentials, remote access, or production disruption. In Verizon’s 2025 snapshot, use of stolen credentials appeared in 34% of manufacturing breaches, phishing in 19%, and ransomware in 47%. At the same time, ENISA’s Threat Landscape 2024 says industrial and manufacturing sectors were the most frequently targeted by ransomware.

The social engineering side is getting sharper too. Kaspersky ICS CERT’s report describes campaigns targeting manufacturing with personalised spear-phishing lures that impersonated legitimate software updates and sensitive internal documents. Dragos’s industrial ransomware analysis adds the wider context: manufacturing remained the most impacted industrial sector, while attackers kept exploiting supply-chain and remote-access weaknesses.

Where the 19 days disappear in manufacturing operations

One alert has to cross IT, OT, engineering, and site leadership

A suspicious message may be spotted quickly. The slowdown usually starts after that. In the manufacturing industry, the control change often sits with one team, the site communication with another, the shift brief with a supervisor, and the training update somewhere else again. The delay builds in the handoffs.

That is why manufacturing leaders often feel behind even when detection was not the real problem. One incident has to become one decision across identity, remote access, engineering workstations, plant leadership, and frontline communication. If those paths are disconnected, the organisation learns slowly.

Digital-only training misses the people closest to the line

This is where manufacturing differs sharply from office-heavy sectors. The people closest to operational risk are often not sitting in a learning portal all day. Cigref notes that the training needs to be adapted to the context of the organisation and the work environment, and it warns that the reality of the environment on the ground and the digital divide can block adoption. 

According to a Unisys and ISG frontline worker survey, among the industries surveyed, manufacturing frontline workers were the most likely to rely on paper-based communication for information sharing, and many organisations still depend on shared or non-portable devices. 

That is why digital-only awareness often becomes background noise on the plant floor. It reaches the inboxes that are easiest to reach, not always the people making decisions around machines, maintenance, quality, or vendor access.

Sending the warning is easier than proving it worked

Most teams can issue a warning faster than they can show whether it changed anything. Did reporting improve on the line? Did supervisors challenge unusual vendor requests more often? Did the same lure stop working on the same site?

That is where the 19-day gap becomes a measurement problem. If the only proof is that a message was sent or a module was assigned, the next delay has already started. 

Manufacturing leaders need evidence that behaviour changed where downtime, safety, or process integrity are actually exposed.

See how security leaders are benchmarking adaptation speed and behavioural readiness against AI-driven manipulation.

Read the full report
Background dots

What manufacturing security leaders should audit first

Start with the workflows that can change plant operations quickly: remote support, engineering software updates, shared workstation logins, supplier requests, and any approval path that can alter access or production settings.

Then look at the reach. Which parts of the workforce hear about a new tactic in minutes, and which only hear about it at the next shift brief, toolbox talk, or supervisor cascade? In manufacturing, that gap is often wider than leaders think.

Finally, check for proof. If you cannot see reporting patterns, repeat exposure, or role-specific behaviour change by site or function, the organisation is still flying by completion rates.

How manufacturing security teams can close the training gap faster

The strongest response is not another annual refresher. It is a tighter loop. Catch the signal early. Turn the live tactic into current reinforcement. Push it through channels frontline teams will actually see. Then measure whether reporting, challenge behaviour, and risky actions changed.

That is where a more adaptive human risk management approach becomes useful. 

Manufacturing security teams need a way to centralise reporting and triage, mirror live lures into safe practice quickly, reinforce roles differently across plant, engineering, and corporate teams, and measure whether the organisation is becoming harder to manipulate over time. That is  SoSafe’s approach. Less manual drag, more relevant reinforcement, and clearer proof that one incident actually led to learning.

Close the manufacturing defence gap

See how to turn reporting, reinforcement, and behavioural insight into a faster response loop for plant, engineering, and frontline teams.

Read the full report

FAQs

Because one believable request can affect both corporate access and plant operations before controls and guidance have been updated. In manufacturing, the impact can spread from inboxes to downtime much faster than many programmes are designed for.

Because a large part of the workforce is not working through the same digital channels as office staff. Shared devices, shift work, paper-based communication, and the realities of the plant floor mean desktop-first awareness often reaches the easiest audience, not always the most exposed one.

Do you want to stay ahead of the cyber game?

Sign up for our newsletter to receive the latest cyber security articles, events, and resources. No spam, only content that truly matters.

Newsletter visual

Experience our products first-hand

Use our online test environment to see how our platform can help you empower your team to continuously avert cyber threats and keep your organization secure.

The Forrester Wave™ Strong Performer 2024: Human Risk Management Solutions

This page is not available in English yet.

Diese Seite ist noch nicht in Ihrer Sprache verfügbar. Sie können auf Englisch fortfahren oder zur deutschen Startseite zurückkehren.

Cette page n’est pas encore disponible dans votre langue. Vous pouvez continuer en anglais ou revenir à la page d’accueil en français.

Deze pagina is nog niet beschikbaar in uw taal. U kunt doorgaan in het Engels of terugkeren naar de Nederlandse startpagina.

Esta página aún no está disponible en español. Puedes continuar en inglés o volver a la página de inicio en español.

Questa pagina non è ancora disponibile nella tua lingua. Puoi continuare in inglese oppure tornare alla home page in italiano.