A small manufacturer I knew lost three days of production after a ransomware event. The attacker did not get to the shop floor, but they did get the ERP database server. The schedule was in there. The work-order routing was in there. The bill-of-materials for every active job was in there. For three days the foreman ran the floor from a printout that was already two days stale, and the company shipped late on six orders.
The recovery cost about $80,000 between consultant fees, lost production, and an emergency ERP-vendor restore. The ransom was not paid. The firm had separated backups and a documented restore procedure. Without those two things the cost would have been larger by an order of magnitude.
That is the threat picture for a small manufacturer in 2026. Most of the time the production equipment itself is not the target; the office systems are. But the production line cannot run without those office systems. Below is what a small manufacturer should expect from a managed IT provider, what the threats actually look like, and what changes when your office shares a building with a shop floor.
The Compliance Floor for Non-Defense Small Manufacturers
A small manufacturer that is not in the defense supply chain has a meaningfully lighter compliance picture than a precision-metals supplier facing CMMC. Specific items still apply.
OCIPA (Oregon Consumer Information Protection Act). Any business holding personal information about an Oregon resident is subject to OCIPA. Reasonable safeguards and breach notification. "Reasonable" is undefined in statute, which means you are measured against industry baselines. The MSP-implemented baseline (MFA, EDR, backup, IR plan) usually suffices.
PCI DSS if you take card payments for orders, dealer payments, or anything else. Most small manufacturers route payments through a processor and never store card data; the MSP confirms the segmentation that keeps PCI scope minimal.
FTC Safeguards Rule if you offer consumer financing, run an in-house credit program, or handle consumer credit applications. Most small manufacturers do not, but the edge cases (a manufacturer of high-end consumer goods who offers financing through their website) are worth checking.
Export controls if you ship internationally. The Export Administration Regulations (EAR) cover most commercial items; ITAR covers defense items. Even commercial items can be subject to license requirements depending on the destination country and the item's Export Control Classification Number (ECCN). The MSP role is supporting the export-classification recordkeeping and the encryption of any technology export records.
OSHA recordkeeping. OSHA 300, 300A, 301 logs, retained for five years past the calendar year. The MSP supports storage, access controls (these have employee-medical sensitivity), and audit-log retention.
State employment law. Standard payroll, employee data privacy, retention requirements. Same picture as any other small business.
The good news for non-defense manufacturers: you are not running a NIST 800-171 environment, you are not maintaining a System Security Plan, and you are not preparing for a third-party assessment. The same baseline that protects a small accounting firm or a small engineering office is the right place to start. The manufacturing-specific items are operational, not compliance-driven.
What "Managed IT for a Small Manufacturer" Actually Includes in 2026
The general managed-services scope (helpdesk, monitoring, patching, EDR, backup, Microsoft 365) we covered in the pricing guide. The manufacturing vertical adds about a dozen specific items.
ERP support. Sage 100, Sage 300, NetSuite, Acumatica, Epicor Kinetic, Microsoft Dynamics 365 Business Central, or SYSPRO. The MSP handles the database administration, the user provisioning, the integration to accounting and shipping, and the upgrade and patch cycle. The ERP is the single most important system in the company; the MSP needs to know it cold.
Shop-floor mobile and rugged devices. Production technicians using rugged tablets to record work-order completion, scan parts, or pick materials. Honeywell, Zebra, or Panasonic Toughbook hardware. The MSP handles the MDM, the wireless infrastructure design (the shop floor RF environment is brutal), and the field-friendly support process.
Inventory management and barcode infrastructure. Label printers (Zebra is the dominant brand), handheld scanners, the integration between ERP inventory and the physical hardware. When a label printer goes down at the receiving dock, production stops. The MSP designs the redundancy and runs the operational support.
E-commerce and dealer-portal integration. A wholesale distribution business runs B2B order entry through a dealer portal; a direct-to-consumer manufacturer runs a Shopify or BigCommerce site. The MSP supports the integration to ERP, the order-fulfillment flow, and the security of the customer- or dealer-facing surface.
CAD and design file storage. SolidWorks, AutoCAD, Inventor, Fusion 360, Rhino. Large files, version control matters, sometimes external collaboration with vendors or customers. The architecture is usually an on-premises file server with cloud-tiered backup, or a cloud-native solution like Autodesk Vault or GrabCAD Workbench. The MSP supports the choice and the operational backup.
OT/IT segmentation. Production equipment (CNC, PLCs, CAM systems, finishing equipment) on one network, office systems on another, with controlled paths between them where they need to talk. Default credentials on production equipment changed where vendor agreements allow. Vintage equipment with unpatchable firmware put behind a firewall and not exposed to the office network. The MSP designs and maintains the segmentation.
Backup of the ERP and design environment. A backup that an attacker who compromises the primary database server cannot delete. Documented restore tests. The cost of three days of production down is high enough to justify a real backup architecture.
Email security tuned for manufacturing fraud patterns. Microsoft Defender for Office 365, Mimecast, or Proofpoint, with aggressive impersonation protection of supplier and customer domains. Banner injection on external mail. The wire-fraud-during-PO-payment pattern is the single highest-impact threat.
Identity hardening across office and shop floor. MFA enforced uniformly. The shop-floor "shared login at the workstation" pattern is a real problem when an incident requires forensic attribution. Better architecture: short-lived sessions, badge readers, or smart-card login that ties back to a real identity.
Print server and labeling reliability. Receiving dock label printer down at 7am means receiving cannot put parts away. The MSP runs the print queues, the firmware updates, and the spare-printer protocol.
Cyber-liability attestation. Carriers underwriting manufacturers ask for MFA, EDR, backup, IR procedures, and supply-chain security. The MSP fills these in.
Five Threats Specific to Small Manufacturers
Local Considerations for the Pacific Northwest
The PNW manufacturing belt runs from Vancouver, Washington through Portland, Tualatin, Sherwood, Newberg, and down through the Willamette Valley. The cluster is unusually diverse: precision metals feeding aerospace and medical-device customers, food and beverage production, wood products, recreational gear, semiconductor support, and a long tail of specialty product manufacturers.
Oregon Manufacturing Extension Partnership (OMEP). The state's MEP affiliate, a useful free resource for small manufacturers on operations and increasingly on cybersecurity baseline assessments. Worth knowing.
The proximity to the defense supply chain. Some small manufacturers in the PNW that today serve commercial customers are one acquisition or one new contract away from being in CMMC scope. The IT architecture you build today should be one that can be tightened later without ripping it out and starting over. The CMMC and NIST 800-171 article covers what that future state looks like.
On-site response. Production downtime cost is high enough that a Sherwood-based MSP responding within hours across the Portland metro is worth real money compared to a national vendor's same-day-flight scheduling.
How to Vet a Managed IT Provider for Your Manufacturing Business
Ten questions.
How Cascade Data Approaches Small-Manufacturer IT
Cascade Data is veteran-owned and based in Sherwood, Oregon. Adam Messick spent twenty years in three different MSPs before founding Cascade Data, with direct exposure to the small-manufacturer threat pattern across the Portland metro. Our managed-services scope for manufacturers includes the items above as standard inclusions: ERP support, shop-floor mobile and MDM, OT/IT segmentation, encrypted backup with tested restore, BEC-specific incident response, IP-protection-aware access controls, and identity hardening across office and production users.
If you would like a one-page gap analysis of your current IT against the small-manufacturer threat profile and a typical cyber-liability questionnaire, we offer a 60-minute assessment call.
The short version of this article, with the specific scope inclusions and a direct CTA, lives at our Managed IT for Small Manufacturers page.
Frequently Asked Questions
Does the FTC Safeguards Rule apply to my small manufacturer? Often no. The Rule applies to "financial institutions" handling nonpublic personal financial information of consumers. Most small manufacturers do not qualify. The edge cases are consumer financing programs and in-house credit. PCI DSS applies separately if you take card payments. OCIPA applies regardless when a breach affects Oregon residents.
What ERP systems are common for small manufacturers in 2026? Sage 100/300, NetSuite, Acumatica, Epicor Kinetic, Microsoft Dynamics 365 Business Central, and SYSPRO. The right choice depends on production type, inventory complexity, and integration needs.
What is the difference between OT and IT in manufacturing? IT covers office systems (laptops, servers, email, ERP). OT covers production equipment (CNC, PLCs, CAM, finishing). They have different security profiles. Convergence between them requires segmentation.
What is the most common cybersecurity threat to small manufacturers? BEC during purchase-order or vendor-payment cycles, and ransomware encrypting the ERP database. Both are addressable with MFA, email impersonation protection, EDR, and tested separated backups.
Should small manufacturers have separate networks for production and office? Yes, in nearly every case. The shop floor and the office should live on segmented networks. The segmentation does not need to be elaborate at small scale, but it does need to exist and be documented.
Sources & Further Reading
Need help with your IT?
We're here to answer questions and help your business make smart technology decisions.
Get in TouchGet the Cascade Data Letter
Periodic notes on small-business IT, security, and AI from the work we do. No spam.