CNC program transfers with Windows 10

Last month Nucor, North America’s largest steel producer, acknowledged a cybersecurity incident involving unauthorized third-party access to certain IT systems, reported Reuters. As a precaution, Nucor temporarily halted production at multiple facilities while forensic teams and external cybersecurity experts investigated the breach and worked to contain its impact. Nucor’s incident is just one example of how cyber threats exploit aging digital infrastructure – and for many manufacturers, that infrastructure often includes Windows 10. But with Windows 10 reaching end of support on October 14, 2025, there is a deeper risk for shops that continue to rely on aging CNC infrastructure.

Aging CNC infrastructures impact cybersecurity and operational efficiency

This year, manufacturers that don’t upgrade their Windows 10 machines risk missing critical OS-level security updates and losing compatibility with third-party solutions.

The New Reality of Windows 10 End of Life on CNCs

This year Windows 10 will no longer receive critical OS-level security updates. While support for Microsoft 365 apps on Windows 10 has been extended until October 2028, it’s far from a solution for the shop floor. It still means legacy CNC systems and other production technologies running on Windows 10 will become more vulnerable, not less. Compounding the risk, third-party vendors are already phasing out software support, while next-generation manufacturing platforms – from IIoT to real-time analytics – require compatibility with newer operating systems like Windows 11 and Server 2022. The gap between resilient, future-ready IT strategies and older shop floor systems is widening. This blog post explores what manufacturers can, and must, do to close that gap before it spreads into a serious operational liability.

The USB Epidemic: When Compliance and Productivity Collide

For many manufacturers still operating CNC equipment running on Windows 2000, XP or early versions of Windows 10, network segmentation or USB-based file transfers have become the go-to workaround for such outdated systems. However, this tactic is increasingly risky.

CNC program transfers with Windows 10

Running USB-based CNC file transfers have become the go-to workaround using Windows 10 and other outdated systems. However, this tactic is increasingly risky, exposing manufacturers to ransomware events, CMMC noncompliance and operational inefficiencies.

According to Honeywell’s 2022 USB Threat Report, “52% of threats are specifically designed to utilize USB removable devices,” with the vast majority of those threats able to disrupt industrial systems. Pair these threat actors with unsupported software, says Virgina Tech associate professor Lee Vinsel in a recent BBC article, and “there are all kinds of opportunities for failure here, especially when…companies stop supporting old software. Cybersecurity is a huge worry around this issue.” The Department of Defense well understands this concern. Its Cybersecurity Maturity Model Certification (CMMC) 2.0 framework prohibits unmonitored file transfers and insecure endpoints – meaning non-compliance can result in disqualification from federal contracts.

Operational inefficiencies further intensify the risk. Poor CNC program version control and manual CNC program transfers can cost production hours and potentially lower quality output as a result of incorrect or outdated G-code files being loaded at the machine.

Closing the Gap

Rather than investing millions in full machine replacements, many manufacturers are turning to modern Distributed Numerical Control (DNC) systems to serve as their secure industrial network. Solutions like Predator Secure DNC offer targeted upgrades that align with industry compliance frameworks and cyber-hardening strategies. IT and operational leaders can isolate legacy equipment from domain threats, centralize logging across mixed-machine environments, like Fanuc, Okuma, Mazak and others, and meet NIST SP 800-171 encryption standards via FIPS 140-2 validated cryptography.

The Cost of Complacency

Doing nothing may be the most expensive option. The global average cost of a data breach soared to 4.88M, the highest total ever, according to a 2024 IBM report.

For a temporary and limited reprieve, Microsoft offers an Extended Security Updates (ESU) for Windows 10 that starts at $61 per device Year One, with pricing doubling every consecutive year for a maximum of three years after the end of support for Windows 10. Even so, there is no extended Microsoft ESU option after this time period.

Plotting Your Path

To mitigate the risk of your manufacturing operations, IT and operations should take the following steps to prepare for the end of Windows 10 support:

Windows End of Life on CNCs

  1. Conduct a CNC Operating System (OS) and network audit before Q3 2025, identifying all legacy systems still running Windows 10 or earlier.
  2. Prioritize upgrades for machines processing sensitive IP or DoD-controlled projects.
  3. Implement secure DNC options along with Microsoft’s ESU to support phased migrations and DNC retrofits while maintaining compliance and uptime.

Maximizing Grace Periods

Microsoft’s 365 extension for Windows 10 is not a pardon, it’s simply a grace period. Manufacturers who fail to act may find themselves next in line for a costly ransomware event or compliance failure.

Manufacturing integrator Shop Floor Automations (SFA) has worked with hundreds of manufacturers to navigate such transitions securely and efficiently. The path to a resilient, connected shop floor doesn’t begin with rip-and-replace – it starts with informed decisions and trusted partners.

To receive technical guidance for your manufacturing operations, contact the experts at SFA now.

DoD contract manufacturing

In an effort to ensure defense contractors are following best practices to protect sensitive data, Cybersecurity Maturity Model Certification Program (CMMC) rulemaking is inching closer and closer to finalization, with rules proposed by the U.S. Defense Department (DoD) on December 26, 2023. While these rules are published for comment, the codified version isn’t expected to change too drastically, however, DNC software upgrades may be something to consider, and Shop Floor Automations can help.

Townsend Bourne, partner at Sheppard Mullin, noted during an interview with Federal News Network. “Personally, I don’t know that we’re going to see significant changes from the proposed rule that came out at the end of December and the way the final rule is drafted,” said Bourne. “Most importantly, because DoD has been working on this program for so long, and I think they’re at the point where they think it’s pretty close to final.”

CMMC 2.0 Level 1 Sneak Preview

USB CNC program transfer cybersecurity

Transferring CNC programs via USB can not only require hefty management of manual user authorizations, device logs and documentation, but they can risk USB CNC program transfer attacks and noncompliance with CMMC 2.0.

The progression of this rulemaking process is quickly advancing the impact of CMMC 2.0 to manufacturers of all sizes, especially small-to-medium sized businesses (SMBs) that will need to carefully manage finite resources to absorb added costs, personnel and training to meet and maintain compliance.

One aspect of CMMC 2.0 that will deliver a layer of complexity is the proper storage and control of removable media, like USBs and CDs, which many defense contract manufacturers utilize today to transfer CNC programs, images and other Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) to and from computers and machines. Let’s review a few aspects of the Level 1 requirements clause of 52.204-21, Basic Safeguarding of Covered Contractor Information Systems, to illustrate some of the necessary steps to store and control sensitive data appropriately on these devices.

  • Limit information system access to authorized users, processes acting on behalf of authorized users, or devices (including other information systems).

There should be a clear set of procedures regarding who is permitted access to removable media, their accountabilities related to this access, and how often these procedures are reviewed, validated and updated. Programmers, engineers and others involved in the CNC program transfer process should have unique credentials and the correct identity or role-based permissions across devices and systems.

Credentials and keys should be properly managed and rotated to enhance the security of sensitive information. If you’re manually managing user security and authorization related to CNC program transfers via paper or spreadsheets, for example, it can be a time-consuming and involved endeavor that may be prone to errors and noncompliance.

  • Limit information system access to the types of transactions and functions that authorized users are permitted to execute.

It’s necessary to have documentation of the transactions roles and personnel who are authorized to execute, so that sensitive data is not processed by those lacking permissions to do so. But do you also have the safeguards to block unauthorized transactions and track those attempts? Again, a manual means to meet this requirement can not only be labor-intensive and riddled with inaccuracies, but near impossible for some DoD contract manufacturers with complex operations.

USB CNC program transfer attacks

  • Verify and control/limit connections to and use of external information systems.

Even limiting the use of removable media can still leave data susceptible, as USBs are re-gaining popularity in cyberattacks. Daniel Wiley, the head of threat management at Check Point, relayed an instance in which a power company employee received a sealed USB device from an Amazon package, complete with Amazon tape. “He thought his wife ordered it. So he opened it up, plugged it in. Everything else was a chain reaction. It was able to break in across their VPN. Let’s just say the power company was not in a good place.”

It is imperative for defense contractors to have the proper controls set up to protect your CUI against USB CNC program transfer attacks – but no controls will be completely failsafe.

Roll Credits

It’s estimated that a CMMC Level 1 self-assessment will cost a small entity about $6,000, according to DefenseScoop. For SMBs, this cost could be significantly more depending upon the existing IT infrastructure, processes and know-how of your staff.

An ideal DNC software, which is a system that leverages Industrial Internet of Things (IIoT) and connects your shop floor equipment on one network, could be hugely beneficial. An upgraded DNC system can reduce or eliminate manual user authorizations, device logs and documentation for more streamlined CMMC 2.0 compliance and the prevention of USB CNC program transfer attacks.

 

Not only does this allow for CMMC 2.0 compliance, but DNC software upgrades also can streamline your entire operation. For instance, with Predator DNC software, you can network all CNCs, EDMs, PLCs and robots with a singular DNC package. At Shop Floor Automations (SFA), we have been the top Predator reseller for 20 years, and we also are a top provider of proven software from Scytec and Ascendant Technologies.

 

The team at SFA can provide you with DNC solutions for any brand, connection type or age of CNC machine. Additionally, we offer hardware solutions that can revolutionize your shop floor. To learn more about our machine monitoring solutions or how DNC software can aid your CMMC 2.0 compliance, contact an SFA representative today.

Manufacturing Forecasts 2024

At Shop Floor Automations, the top provider of DNC software in the United States, we find it crucial to stay on top of all of the latest manufacturing trends and predictions as these may affect your goals, plans and budgets for the year ahead. As 2023 winds down, it’s an ideal time to peer into the manufacturing crystal ball for 2024.

Overall, there’s an expectation that interest rates will fall in the middle of 2024, fueling more consistent economic growth and acceleration by the end of the year, reports Dodge Construction Network chief economist Richard Branch in Engineering News-Record.

Escalating tensions in the Middle East, Russia and Ukraine may present difficulties, however, as will continued labor issues. Alan Beaulieu, president of ITR Economics, recently told the Association for Manufacturing Technology (AMT) that, “The good news is manufacturers will gain economic strength in this country and secure our economic wellbeing for generations to come. But for the individual manufacturer, there will be higher competition for workers in an already labor-scarce market, and that problem will persist for years. The only hope for companies to survive is to drive efficiencies by adopting automation and other advanced technologies.”

CNC Machine Operator worker productivity

Automating for Worker Productivity and Efficiency

For manufacturers feeling the continued pressures of the labor market, they’ve been heeding Beaulieu’s advice and turning toward technology to increase worker productivity while minimizing costs. There’s many examples of this occurring on the shop floor; let’s dive into three:

  1. “I’m trying to upgrade the machines in my shop to a more modern way of communicating with add-ons to keep costs low.” This manufacturer knows it can’t afford to upgrade its machines altogether. DNC software from manufacturing integrator Shop Floor Automations (SFA) was recommended by a user, sharing their experience that “all machines had their serial to WiFi and it was flawless sending from the DNC computer.” That same user leaned on SFA for machine monitoring software as well, noting that management loved knowing when night shift “truly ran great” based on progress reports from the software.
  2. Generative Artificial Intelligence (AI) is everywhere, says Bernard Marr in Forbes. Use cases are often described within enterprise organizations, such as Hitachi’s AI-generated training videos to ramp up new workers in maintenance and manufacturing. But that doesn’t mean small-to-mid-sized manufacturers can’t leverage this technology in 2024. CGTech’s CNC machine simulation solution VERICUT 9.1, for example, uses AI to learn from cutting while simulation occurs to automatically set up tools for optimization and then auto-optimizes NC programs after learning.
  3. From the outset, Cybersecurity Maturity Model Certification (CMMC) compliance would seem to decrease worker productivity as the control of removable media, including PCMCIA cards and USB drives typically used to transfer CNC programs, is significantly tightened, if not prohibited altogether.

But for manufacturers still relying on such media, they know the inefficiency – and costs – of uploading programs and getting routers per part. The use of one industrial DNC software network for all your CNC machines, robots, CMMs, PLCs, 3D printers and other equipment can help streamline the CNC program transfer process as well as provide revision control. The use of a single DNC network comes just in time, too, as CMMC is expected to be included in public contracts sometime in 2024.

manufacturing speed

By partnering with a manufacturing integrator, you’ll be best positioned to address enduring workforce issues at the lightning pace of the modern digital economy.

“The only hope for companies to survive is to drive efficiencies by adopting automation and other advanced technologies.”

While manufacturers look to technology to fill the labor gap and gain a competitive edge in the marketplace, there’s no “one-size-fits-all” machine monitoring solution that will be able to address enduring workforce issues at the lightning pace of the modern digital economy. Only by partnering with a manufacturing integrator that understands your existing environment – and the direction you’re headed toward – will you be best positioned to tackle the trends and predictions awaiting you in 2024 and beyond.

 

At SFA, we are committed to providing our clients with the best DNC solutions. For 20 years, we’ve been the top reseller of Predator software, including Predator DNC, PDM and MDC software. Contact SFA today to discuss your strategic initiatives of tomorrow as well as discovering DNC software solutions that will give your business a competitive edge.

AWS GovCloud-secure DataXchange machine monitoring for CNC and other manufacturing equipment

Manufacturing integrator Shop Floor Automations (SFA) will showcase the AWS GovCloud-secure Scytec DataXchange machine monitoring solution for highly-regulated industries, including aerospace, defense and pharmaceutical, at FABTECH 2023. FABTECH is North America’s largest metal forming, fabricating, welding and finishing event and will be held September 11-14 at McCormick Place in Chicago, IL.

For manufacturers adhering to regulations like International Traffic in Arms (ITAR), Defense Federal Acquisition Regulation Supplement (DFARS) and other security and compliance requirements, the ability to monitor disparate machines, each with a unique control system and communication protocol with varying ages, can make continuous improvement initiatives challenging in the cloud. There is often limited capability to protect and restrict access to sensitive data, such as Controlled Unclassified Information (CUI) and Personally Identifiable Information (PII), while also granting the visibility needed to make timely, data-driven decisions that can impact every aspect of a manufacturer.

The DataXchange solution, available through SFA, resolves these issues by leveraging AWS GovCloud to capture real-time, Industrial Internet of Things (IIoT) data from a variety of equipment – from lasers and press brakes, to saws and robots – through universal machine connections. Leveraging automated data collection, DataXchange exposes and synthesizes equipment data to give teams full transparency on the shop floor through an architected secure cloud solution for a total smart factory transformation.

DataXchange leverages AWS GovCloud to monitor machine data in aerospace, defense and pharmaceutical manufacturing environments.

DataXchange leverages AWS GovCloud to capture real-time IIoT data from a variety of equipment – from lasers and press brakes, to saws and robots – through universal machine connections.

Results include a 62.5% decrease in machine time as a result of time-saving alerts, reported user MOGAS. The severe service ball valve manufacturer anticipates a full Return on Investment (ROI) within a year of implementing DataXchange.

Manufacturers are invited to stop by the SFA Booth, A3255, at FABTECH 2023 for a complimentary demonstration of the secure DataXchange solution and to explore the entire SFA product portfolio to help resolve the challenges of the modern shop floor.

For sales inquiries, call 619-461-4000 or visit www.shopfloorautomations.com.

 

ABOUT Shop Floor Automations

Founded in 1998, Shop Floor Automations (SFA) is a manufacturing integrator specializing in digitally transformative hardware, software and support solutions to increase the productivity, efficiency and profitability of plant facilities throughout North America. To add intelligent automation to your shop floor for better communication, control and improvement, contact Shop Floor Automations at www.shopfloorautomations.com.

ABOUT FABTECH

North America’s largest metal forming, fabricating, welding and finishing event heads to Chicago’s McCormick Place in September 2023. FABTECH provides a convenient “one stop shop” venue where you can meet with world-class suppliers, see the latest industry products and developments, and find the tools to improve productivity, increase profits and discover new solutions to all of your metal forming, fabricating, welding and finishing needs. For more information, visit fabtechexpo.com.

An aerial view of the United States Pentagon.

Companies within the Defense Industrial Base (DIB), like machine, pharmaceutical and aerospace product manufacturers, are increasingly the subject of frequent attacks in pursuit of the billions of dollars tied up in Department of Defense (DoD) projects. The SolarWinds breach, the REvil cybergang hit on a defense contractor and others incidents making headline news are the overt evidence of these escalating targets – but it’s estimated by Black Kite that “twenty percent of America’s largest 100 defense contractors are highly susceptible to a ransomware attack.”

An aerial view of the United States Pentagon.

For manufacturers with FCI, compliance with the DoD’s CMMC 2.0 involves the control of removable media, such as PCMCIA memory cards and USB drives, and impacts the use of such media in conjunction with your CNC machinery.

The DoD is naturally taking action. The safeguard of defense-related information has been named a major priority, says the DoD, leading the agency to unveil its “enhanced” CMMC 2.0 program in November of last year. With three different levels of compliance (“Foundational,” “Advanced” and “Expert”), CMMC 2.0 will undergo implementation through the rulemaking process, which can span from nine months to two years, and then ultimately fold the program into a contractual requirement. This means that any company that processes, stores or handles Federal Contract Information (FCI) must perform a CMMC Level 1 self-assessment.

Proper Protection of CUI

For manufacturers with FCI, CMMC 2.0 compliance involves the control of removable media, such as PCMCIA memory cards and USB drives, and encrypting this media to properly protect Controlled Unclassified Information (CUI). The process of storing and transferring machine programs is already a time- and labor-consuming task: often companies set up a kiosk for programmers to peruse programs, copy the selected machine code onto a USB, trek back to the machinery and copy the program to the machine. One manufacturer estimated that it took them 10 minutes of set-up time to upload a program and get the routers – per part. The total time devoted to this process amounted to around 83 hours a month.

CNC machine programs with PCMCIA media cards and USB drives also make revision control virtually impossible. Programs that were never proven can be exported to machines, machined “not to spec” and lead to the scrapping of parts, rework, or worse, customer rejections. Companies can then find themselves scrambling to repair customer concerns and spending additional time and labor sourcing the correct program, and ultimately going through the machine program transfer process over again.

Now, with CMMC 2.0, machinery using removable storage devices can also lead to noncompliance. Solutions to achieve compliance, however, may hold even greater possible benefits for manufacturers.

DNC for Compliancy, Reliability, and Greater Productivity

A modern DNC networking solution, like Predator DNC as available through Shop Floor Automations, can work towards helping companies eliminate removable drives from CNC manufacturing equipment altogether. Serving as one industrial network for all your CNC machines, robots, CMMs, PLCs, 3D printers and other equipment, a well-designed DNC networking system ensures that only your latest files are tapped from their central location and, when changes occur, the edits are stored back on your file server.

A machinist working with a machine that is running DNC software, removing the need for physical drives and saving time between jobs.

A well-designed DNC networking solution can connect all your CNC machines, robots, CMMs, PLCs, 3D printers and other equipment on one industrial network, thereby removing or reducing the need for removable storage media, like PCMCIA media cards or USB drives.

Even more so, CNC program revisions can be controlled through a bar code or QR code reader to eliminate errors and transfer the proven/released part program every time into the CNC for complete traceability. Securing greater control of your CNC program revisions can lead to a reduction in the amount of rework and scrap that plagues companies utilizing untested programs. All in all, the implementation of a proper DNC networking solution can equate to a more productive team and a more consistent and reliable manufacturing process.

Set up your organization for CMMC 2.0 compliance while realizing significant gains in productivity and reliability – contact a DNC networking specialist at Shop Floor Automations to discuss your unique defense environment today.