19 April 2026

Cybersecurity Mistakes That New Zealand Manufacturers Overlook

Hidden Cyber Threats Lurking in NZ Manufacturing

Cybersecurity in NZ manufacturing is no longer just an IT problem; it is a core business risk. Production lines, export schedules, supplier relationships, and hard-won intellectual property all depend on systems staying up and staying secure. When those systems are hit, everything from raw material intake to finished goods dispatch can grind to a halt.

New Zealand manufacturers are being targeted for simple reasons: you hold valuable designs and recipes; you are a link in global supply chains; and attackers know that even a few hours of downtime hurts. Many plants run lean teams, old equipment and tight margins, so cyber risk often ends up below maintenance, hiring and capital projects on the priority list. That gap is exactly where attackers operate.

We see the impact when things go wrong. Incidents can lead to halted production, missed export deadlines, stressful MPI or customer audits, reputational damage with large buyers and unplanned costs to recover systems. Many manufacturers still assume they are too small or not interesting, but attackers run automated scans across the internet and target any weak link they find.

As a security first, Microsoft-focused managed service provider based in New Zealand, we spend a lot of time in local manufacturing environments. The same avoidable mistakes appear again and again. Fixing them does not always mean big projects; it starts with seeing where the real risk sits.

Underestimating the Value of Manufacturing Data

Many manufacturers focus on uptime of machines, not protection of information. Yet your data is often the main prize. Production data, recipes, CAD files, machine configurations, supplier pricing and test results are all attractive targets for cybercriminals and competitors.

Common blind spots include:

  • Treating production systems as “just operational”, not as holders of valuable IP
  • Keeping design files in shared folders with wide access
  • Storing supplier and pricing information in unprotected spreadsheets
  • Leaving backups on a device sitting in the same building

If that data is stolen or changed, the impact is far more than a minor annoyance. For example, copied designs or formulations can quietly appear offshore. If a malicious change slips into machine parameters, whole batches can be faulty. That can lead to quality issues, warranty claims or even product recalls. When export partners, auditors or large customers start asking security questions, weak controls around data become a commercial problem.

Expectations around cybersecurity in NZ supply chains are increasing. Larger corporates and overseas buyers are asking how their suppliers protect information, not only in the office but on the factory floor. Regulations and industry standards also point to better data protection.

Practical first steps include:

  • Classifying data so you know what is sensitive and who really needs access
  • Controlling access to design and production files using accounts, not shared logins
  • Using Microsoft tools to set permissions, rather than relying on “IT knows where it is”
  • Keeping proper backups stored securely offsite or in the cloud, not just on a single local device

When data is treated as a business asset, decisions about cyber controls become easier to justify.

Forgetting That Old Machines Still Need New Security

Manufacturing sites in New Zealand often mix new cloud systems with very old hardware. It is common to see legacy PCs on the shop floor, old Windows versions, unsupported PLC interfaces and machines that are kept running “until they die”. The thought is usually, “it works, do not touch it”.

Another common belief is that “it is not connected to the internet, so it is safe”. In practice, those machines are often:

  • Plugged into the same network as office PCs
  • Reached by remote support tools from machine vendors
  • Indirectly linked to cloud ERP or production planning systems

Outdated operating systems and unmanaged endpoints are easy entry points for ransomware and remote access tools. If an attacker gets on to a forgotten PC in the factory, they can often move towards your main business systems without much resistance.

You do not have to rip out every old machine to reduce risk. There are practical options that work in live plants, such as:

  • Network segmentation so factory devices are isolated from office and guest networks
  • Secure remote access for vendors, with logging and strict controls
  • Monitoring for unusual activity on operational technology so odd behaviour is spotted early
  • Planning a staged upgrade for the most exposed or critical systems

A managed service provider with manufacturing experience can help build a realistic roadmap that fits around production windows, maintenance shutdowns and budget cycles.

Relying on Basic IT Hygiene and Hope

Many manufacturers think they are reasonably covered because they have an antivirus product, a basic firewall from the internet provider and backups that “should be fine”. Leaders often assume that this is good enough protection.

The reality is that attackers rarely need to break down the door if the keys are left out. Common gaps we see include:

  • No multi-factor authentication on Microsoft 365, ERP or remote access
  • Shared admin passwords written in notebooks or passed around on email
  • Unmanaged mobile devices accessing company email and files
  • Irregular software patching, especially for servers and line-of-business systems

Weak identity controls are a big risk. When attackers can log into Microsoft 365 or ERP with stolen passwords, they can quietly read email, change bank details, create fake invoices or pull down sensitive files. Often this happens without any loud alert or obvious outage.

Some practical, high-impact measures are:

  • Enforcing multi-factor authentication on all cloud services, for all staff
  • Using role-based access for production, finance and management systems
  • Keeping tested backups that are immutable so they cannot be changed by ransomware
  • Setting a simple patching plan, so updates do not fall through the cracks

Security monitoring and an agreed incident response plan are also key. Relying on a single in-house “techie” or a general IT helper to spot and handle every modern threat is unfair on them and risky for the business.

Overlooking People, Process and Third-Party Risk

Technology is only one part of cybersecurity in NZ manufacturing. People and partners can either support or weaken your defences.

Staff in production planning, operations and finance are prime targets for social engineering and phishing. Attackers send emails that look like freight updates, supplier price changes or requests from senior leaders. Without basic security awareness, it is easy for someone to:

  • Click a bad link that steals their login
  • Plug in an unknown USB drive on a shop floor PC
  • Install unapproved apps to “get the job done”
  • Approve a fraudulent change to supplier bank details

Third parties also add risk. Overseas machine vendors often request remote access. Logistics partners, contract engineers and service techs may plug into your network without strong controls. If their systems are weak, their access into your environment can be used by attackers.

Helpful steps include:

  • Clear policies for remote access and external support connections
  • Vendor security expectations written into contracts and onboarding
  • Regular staff training, tailored to manufacturing roles and real local examples
  • Simple processes for reporting something that “looks odd” without blame

At CorIT Tech, we align security processes with recognised control frameworks and Microsoft Best Practice, then translate them into simple, practical procedures that front-line staff can actually follow.

Turning Cyber Risk Into a Competitive Advantage

Stronger cybersecurity does not just reduce bad outcomes, it can support growth. Manufacturers who take this seriously are better placed to win larger contracts, pass supplier security checks, keep production running smoothly and protect the IP that underpins export success.

A pragmatic first 90-day plan can include a focused security assessment, a shortlist of high-risk issues to fix quickly and foundational Microsoft 365 and cloud security hardening. From there, it is about steady, planned improvements rather than big, disruptive changes.

New Zealand manufacturers do not need enterprise budgets to make meaningful progress. What they need is clear visibility of their real risks, practical steps that fit operations and a security-first partner that understands both Microsoft technology and factory floors. With that in place, cyber risk becomes something you manage with confidence, not something you hope never lands on your doorstep.

Protect Your New Zealand Business With Proactive Cybersecurity Support

If you are ready to strengthen your security posture, our specialists at CorIT Tech can help you assess your current risks and build a tailored roadmap for improvement. Explore how our cybersecurity in NZ services can secure your data, systems, and people with practical, business-focused solutions. To discuss your specific challenges or arrange a consultation, simply contact us and we will respond promptly with clear next steps.