Today’s supply chains are digital ecosystems, and one weak link can bring hundreds of partners down. The Jaguar Land Rover (JLR) attack proved that. While the automaker absorbed millions in direct losses, its tier 2 and tier 3 suppliers were locked out of systems, unable to fulfill orders; some were even forced to shut down operations.
In this second article in our Cybersecurity Awareness Month series, we shift focus from the shop floor to the broader supply chain, exploring how interconnected digital platforms create new vulnerabilities, why mid-market manufacturers are increasingly in the crosshairs, and what can be done to build a more resilient, cyber-aware ecosystem.
Modern manufacturing doesn’t live in a vacuum. Your operations depend on suppliers, logistics providers, software partners, and a network of systems that extend well beyond your own facility. That means your cybersecurity perimeter is no longer just your factory. It's your entire supply chain.
The August 2025 Jaguar Land Rover (JLR) cyberattack offers a stark example. Not only did it cripple JLR’s production lines, but it also locked downstream suppliers out of critical systems: ordering, inventory, logistics. Some suppliers warned of their potential inability to survive prolonged disruption. The UK government even pledged a £1.5 billion (~$2 billion USD) loan guarantee to prop up the supply chain.
If JLR can be taken down, imagine the impact on a medium-sized manufacturer with tighter margins and fewer buffers.
Download Protecting Manufacturers from Cyberthreats eBook
Attackers often bypass hardened defenses by targeting vendors, component suppliers, or software providers with weaker security. Once inside a vendor system, they gain trusted access into downstream networks.
The result: attackers can reach hundreds of companies through a single compromised part of the supply chain.
Look ahead, and the complexity only deepens. In 2025, AI models are being integrated into supply forecasting, logistics routing, and production planning. But AI without oversight is a new point of vulnerability.
IBM’s 2025 Cost of a Data Breach Report warns that 97% of organizations experiencing AI-related breaches lacked proper AI access controls. That means attackers could seed bad forecasts, manipulate logistics, or inject malicious inputs to disrupt the chain downstream, not just breach data upstream.
Your supply chain security must incorporate AI governance, monitoring, and control — not as a future concern, but as a current requirement
Data I/O & Unimicron Technology Corporation (U.S. & China, 2025)
Ransomware attacks forced shutdowns of manufacturing operations at two major electronics producers. Unimicron’s incident disrupted PCB supply chains globally. Data I/O was forced to shut down its global IT infrastructure, halting production and shipping operations and triggering an SEC disclosure.
Miljödata (Sweden, Sept 2025)
A ransomware attack on this HR software vendor cascaded downstream to affect Volvo Group, exposing sensitive employee data and disrupting critical services for a large number of Swedish municipalities.
United Natural Foods Inc. (U.S., June 2025)
A cyberattack crippled UNFI’s ordering systems, causing nationwide grocery shortages and logistics delays. Attacks on logistics and distribution can trigger immediate public and economic fallout.
Key takeaway: Attacks on supply chain partners, OT systems, and logistics can ripple through entire industries, bringing production, distribution, and critical services to a halt.
Watch Preventing Cybercrime in a Time of Digital Transformation
For many mid-market manufacturers and suppliers, resources are tight, and security teams are small, but the risks are just as big. Here are some pragmatic steps you can take, without a Fortune 500 cybersecurity budget.
You shouldn’t need to manage an enterprise-sized SOC to defend your supply chain. Epicor builds security into your ecosystem so you can protect operations without extra IT overhead:
This includes secure connectors with logging, identity controls, and segmentation; partner assessments baked into onboarding; and shared threat intelligence and monitoring across the ecosystem.
Evaluate your business security with a few quick questions: Assess the Risk
The most resilient manufacturing operations see supply chain cyber risk as a front line concern, not a vendor footnote. In a world where Jaguar Land Rover’s breach made global headlines and suppliers faced real financial consequences, mid-market manufacturers must act now.
Next steps you should take today:
Securing your digital supply chain isn’t optional; after all it’s your first line of defense. Start with what you can control today: visibility, access, and partner accountability.
This is just the beginning. In our next post, we’ll explore how to safeguard your business as you implement AI into operations and how to build trust into every intelligent decision.