1. Are our backups safe from ransomware?
Only if they are offline or immutable, separated from production,
protected by MFA, and tested regularly. If attackers can reach the
backups, they'll encrypt or delete them first.
2. How would we know if we've been hacked?
Without monitoring, you often won't – attackers can sit quietly for
weeks. Warning signs: odd logins, password resets, suspicious emails
from internal accounts, unexpected admin users, or unstable systems.
3. What are our biggest risks right now?
For most manufacturers: phishing, weak or reused passwords, lack of
MFA, unpatched systems, exposed remote access, and human error. These
basics cause far more incidents than exotic "zero-day" attacks.
4. Is antivirus enough?
No. Antivirus is one tool. You still need MFA, email security, EDR,
patching, segmentation, backups, and monitoring to handle modern attacks.
5. What's the minimum we should have in place?
For most SMB manufacturers: MFA, secure email, EDR, patch management,
ransomware-safe backups, segmentation, phishing training, monitoring,
and a documented incident response plan.