Automation and digitalisation do, however, also pose new challenges for the logistics industry. Reports and dashboards that render the business processes and financial flows transparent provide for more efficient business operations. However, this business-sensitive information is not meant for everyone, certainly not for people outside your business. Links with systems of third parties, e.g. customs systems, ensure that many data are exchanged, often on the basis of automated processes. How do you make sure that your business data and information do not end up with third parties?
Over 40% of the businesses in the logistics industry have already dealt with a form of cyber-criminality or hacking
Cyber-criminals, too, have noted that the automation in the industry is in full swing and they try to conveniently exploit that. This can clearly be seen from the number of logistics service providers, distribution centres, shipping companies, and ports that become the victim of cyber-criminality. These businesses run an increased risk due to their dependence on information technology. Think about the connectivity between the various systems that are operational within the business as well as the connection with the systems of third parties.
It is important to realise that these data can also be of interest to cyber-criminals. That is why securing these data is of utmost importance. After all, the electronic re-routing of a container makes theft along the way a lot easier. Access to, for instance, loading and unloading data, scheduled customs inspections, and clearance data can also be very valuable to criminals.
Also inquire with your suppliers and buyers about their cyber-security measures
A segment of the businesses in the transport and logistics industry, namely shipping and aviation, is qualified as part of the vital infrastructure. This implies that when businesses in this segment are affected, the impact is considerable. Non-vital businesses can also be attractive to attack and to be used as a springboard to vital targets because they are in the same logistics chain. The National Cyber-security Centre endorses this in its “Cyber-security Overview Netherlands 2020”. This requires of the entire industry that its cyber-security is in good shape.
In many instances of cyber-criminality, humans appear to be the weakest link. In most of those instances, it regards incidents where an employee received a malicious email, text, or WhatsApp message and clicked on a link in the message. Through this method, known as phishing, a cyber-criminal tries to steal your login details or other sensitive information.
The use of ransomware is also increasing. Ransomware ensures that you can no longer access (a part of) your files. After payment of the requested ransom, these files are, if all goes well, decrypted again. However, the (partial) unavailability of data usually results in considerable costs.
Tesorion Immunity
A good night’s rest for all, because Immunity detects and isolates automatically
Digitalisation, automation, and new forms of services therefore bring about various challenges in the area of cyber-security. One of the things that should be in order in this respect is the security of the business network. Tackle the risk of malware that originates from outside the organisation in the same manner as the risk of an infected device present on the network. In both instances, immediate and automated actions are necessary.
A solution is needed that detects the various threats automatically, classifies them on the basis of policy rules, and then isolates the relevant systems.
Tesorion Immunity does not allow anyone who represents a threat to your data to gain access. Even in case of already trusted devices, Tesorion Immunity pays attention to deviating behaviour and immediately reacts to threats by isolating an infected device. That is how security of your most precious assets should be organised.