Enterprise security tips for manufacturers Part 2