
November 6, 2025
Verizon recently unveiled their 2025 Mobile Security Index (MSI), which included some specific findings related to the manufacturing sector.
According to the report, respondents believe manufacturing's increased mobile adoption, which includes IoT and OT devices, heightens their risk of a cyberattack. Manufacturers further say their interconnected supply chains make them more vulnerable to breaches and disruptions.
- 83 percent say a security incident could disrupt their supply chain and have serious reputation implications.
- Expanded connectivity helps explain why 85 percent of manufacturers say convergence of OT and IT makes mobile device security more critical.
- Despite their heightened awareness of potential cyber risks, the manufacturing industry is behind other sectors in updating mobile security controls, implementing incident response best practices, and closing security gaps associated with genAI use.
- According to Lookout Threat Labs, 18.5 percent of employees at manufacturers were targeted by mobile phishing in Q1 of 2025.
- Manufacturing trails other vertical sectors in updating mobile security controls for the following types of threats:
- AI-assisted attacks - 91 percent of manufacturing businesses vs. 96 percent in all industries.
- Zero-day exploits - 91 percent vs. 95 percent.
- Deepfakes - 87 percent vs. 94 percent.
- Manufacturing also lags behind most other vertical industries in:
- Defined and enforced genAI policies - 37 percent vs. 50 percent.
- Audits - 40 percent vs. 54 percent.
- Comprehensive training on mobile AI tools - 39 percent vs. 45 percent.
- A disaster recovery plan - 36 percent vs. 42 percent.
- A ransomware playbook - 36 percent vs. 39 percent.
- Cybersecurity insurance - 57 percent vs. 60 percent.
- Zero trust - 35 percent vs. 43 percent.
The index also offered eight trusted mobile cybersecurity best practices:
- Mobile device management (MDM) and unified endpoint management (UEM): Using a single platform to centrally manage, secure and update all user devices, including laptops, phones and tablets.
- Mobile threat defense (MTD): Detecting and blocking mobile-specific risks such as phishing, malicious apps and device compromise in real time.
- Zero trust: Verifying every user and device before granting access to the network—regardless of location—to reduce insider and credential-based threats.
- Secure access service edge (SASE): Combining network and security services such as firewalls and secure web gateways to protect remote and hybrid workers through the cloud.
- Secure enterprise browser and secure web gateway: Enforcing security controls within the browser to protect access to cloud and web apps; ideal for zero trust and remote work environments.
- Endpoint detection and response (EDR): Monitoring mobile and endpoint activity to detect, investigate and automatically respond to threats across devices.
- Managed detection and response (MDR): 24/7 expert threat detection and incident response as a managed service, often powered by EDR tools and threat intelligence.
- Cyber risk quantification (CRQ): Translating cyberthreats into financial impact to guide investments, board conversations and cyber insurance decisions.















