{"id":15241,"date":"2019-05-22T00:00:00","date_gmt":"2019-05-21T23:00:00","guid":{"rendered":"https:\/\/identifi-global.eu.applyflow.com\/logistics-digital-transformation-and-cybersecurity-the-way-forward\/"},"modified":"2022-12-09T06:16:40","modified_gmt":"2022-12-09T06:16:40","slug":"logistics-digital-transformation-and-cybersecurity-the-way-forward","status":"publish","type":"post","link":"https:\/\/www.identifiglobal.com\/news\/logistics-digital-transformation-and-cybersecurity-the-way-forward\/","title":{"rendered":"Logistics, digital transformation and cybersecurity: the way forward"},"content":{"rendered":"<figure>\n<p style=\"text-align: center\">\n\t\t<img decoding=\"async\" alt=\"\" src=\"https:\/\/cdn-01.cms-eu-v2i.applyflow.com\/identifi-global\/wp-content\/uploads\/2022\/03\/LogisticsCybersecurity.jpeg\" style=\"width: 600px; height: 342px\"><\/p>\n<\/figure>\n<p dir=\"ltr\">\n\t<span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Cybersecurity is a growing concern for logistics firms. In June 2017, a <\/span><\/span><a href=\"https:\/\/www.reuters.com\/article\/us-cyber-attack-maersk-idUSKBN19I1NO\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">ransomware attack on shipping giant<\/span><\/a><span style=\"color: #000000\"> A.P. Moller-Maersk brought eighty ports and terminals around the world to a standstill. The attack affected not just them, but their complex supply chain of truckers, shippers, consignees, banks and border authorities, too. It cost the company $300 million.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">During the same year, British shipbroker Clarksons <\/span><\/span><a href=\"https:\/\/www.zdnet.com\/article\/clarkson-says-single-user-account-to-blame-for-data-breach\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">refused to pay a ransom to cyber blackmailers<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">, and saw seven months of stolen user data released by cybercriminals. From the biggest global operations to small-to-mid sized operators, everyone in the industry is at risk.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Why are logistics firms particularly vulnerable? What specific vulnerabilities exist in the logistics industry? And what, once we know the threats, can we do to stop them?<\/span><\/p>\n<h2>\n\t<span style=\"color: rgb(0, 0, 0)\">Why is logistics a target for cybercrime?<\/span><\/h2>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">As a report by law firm Holland and Knight explains, cyber attacks can come from a variety of directions &#8211; and <\/span><\/span><a href=\"http:\/\/www.mondaq.com\/unitedstates\/x\/560124\/Marine+Shipping\/Global+Cybersecurity+Threats+To+The+Maritime+Sector.\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">theft is not always the goal<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">. Nation-states, non-state actors, hacktivists and organised criminals all take their shot at the logistics industry for their own ends, sometimes as a byproduct of operations elsewhere. Even <\/span><a href=\"https:\/\/www.cyren.com\/blog\/articles\/cyber-pirates-targeting-logistics-and-transportation-companies\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">Maersk might have been caught in the crossfire<\/span><\/a><span style=\"color: rgb(0, 0, 0)\"> of a state-sponsored attack on the Ukraine &#8211; merely collateral damage.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Logistics networks are vulnerable to two kinds of attacks. In an untargeted attack, malicious software is let loose to target any vulnerability it can find, accessing or paralysing any system it can, and often spreading through simple apps for operations like accounting or tracking. Then there are targeted attacks, aimed at a particular company\u2019s data, like the Clarksons hack. This specific attack came through one compromised user account which was used to actively collect poorly secured data from the rest of the system.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><a href=\"https:\/\/www.identifiglobal.com\/blog\/2018\/01\/case-study-from-candidate-to-client-neil-cook-head-of-it-at-autoglass-r\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/d3jh33bzyw1wep.cloudfront.net\/s3\/W1siZiIsIjIwMTgvMTAvMjkvMTUvNDcvMTUvNjkwL2lkZW50aWZpIGdsb2JhbCBOZWlsIENvb2sgY2FzZSBzdHVkeS5wbmciXV0\"><\/a><\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Jerry R. Scott (Head of Security Operations at DB Schenker) points out that increased connectivity will make cybersecurity a bigger challenge than ever for the logistics industry. \u201cCyberhackers\u201d, he explains, \u201csee <\/span><\/span><a href=\"https:\/\/nowthatslogistics.com\/take-3-three-things-every-shipper-should-know-about-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">over-the-road trucks as computers on wheels<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">\u201d &#8211; especially now that those trucks are wired to connectivity technologies that link them to entire fleets. Your IoT truck could be completely disabled by a well-timed hack, stranding driver and goods until the ransom is paid.<\/span><\/p>\n<h2>\n\t<span style=\"color: rgb(0, 0, 0)\">What are the cybersecurity challenges for logistics?<\/span><\/h2>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Understanding the challenges starts with <\/span><\/span><a href=\"https:\/\/www.acs365.co.uk\/2018\/09\/12\/6-cyber-security-logistics-vulnerabilities\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">understanding the cyberthreats themselves<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">. Logistics firms are particularly at risk from:<\/span><\/p>\n<ul style=\"list-style-type: disc\">\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\">Embedded malware and network vulnerabilities from connected device<\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Poor cyber security awareness in the company<\/span><\/span> <\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Poor cyber security practice by suppliers and partners<\/span><\/span> <\/span> <\/span> <\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Unpatched systems across long supply chains with multiple devices involved<\/span><\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Specific pieces of crimeware: ransomware, remote admin tools and keyloggers<\/span><\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span><\/li>\n<\/ul>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Ransomware literally holds your devices to ransom &#8211; \u201cpay up, or we use your phone to leak this data you\u2019ve left unsecured\u201d. Remote Admin Tools are based on a legitimate tool for using a device you can\u2019t physically access &#8211; but those tools can be used to access and edit files on that machine. Keyloggers are simple, silent apps that record every key you press or touch you make on a device &#8211; the same principle that trains predictive text apps on your smartphone.<\/span><\/p>\n<h4 style=\"text-align: center\">\n\t<strong><span style=\"color: rgb(0, 0, 0)\">&#8220;<\/span><span style=\"color: rgb(0, 0, 0)\">People leave loopholes for cybercriminals.&#8221;<\/span><\/strong><\/h4>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">The main thing to understand about these vulnerabilities is this: most of them exist between humans and machines, not in the machines themselves. If a person chooses to connect an unsecured, unscanned smartphone to the company network, they create a network vulnerability. If a person puts off patching their computer and updating their software, they leave room for crimeware to operate. People leave loopholes for cybercriminals; training people to close those loopholes is the cornerstone of good cybersecurity practice.<\/span><\/p>\n<h2>\n\t<span style=\"color: rgb(0, 0, 0)\">What should logistics firms do to meet cybersecurity challenges?<\/span><\/h2>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Most cybercrime targets the weak link in any system. The majority of the time, that weak link is people. For that reason, <\/span><\/span><a href=\"http:\/\/www.maritime-executive.com\/article\/shipping-industrys-own-cyber-security-guidelines-released\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">the best cyber defence starts with people<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">, too. Education, culture and great people management are the key elements of cybersecurity right now.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">That\u2019s where a CISO is invaluable. While a CIO is vital for keeping a firm\u2019s operational IT requirements on track, employing a CISO means that a business can maintain a specific focus on the ever-increasing burden of cybersecurity.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Hiring in a C-level role with a sole focus on safeguarding company data and information highlights that your business takes cybersecurity seriously. It\u2019ll not only ensure that you\u2019re adequately protected against the risk of attack, but will demonstrate to clients, to third party partners and to potential new hires alike that security is paramount.<\/span><\/p>\n<ul>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><b>You may like: <\/b><\/span><a href=\"https:\/\/www.identifiglobal.com\/blog\/2019\/02\/5-big-challenges-for-cybersecurity-in-the-next-5-years\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">5 big challenges for cybersecurity in the next 5 years<\/span><\/a><\/li>\n<\/ul>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Not only is a CISO\u2019s task to put security protocols in place, but also to define and set the culture of security within a business. In this way, your employees\u2019 desire to keep business data secure will become second nature, instilled in the very heart of what the company is all about.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">So what sorts of things might a CISO suggest to keep cyber attacks at bay?<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Staff may need to connect their own devices to the company network, but those devices need scanning and screening, and staff need to work through multi-device management software that keeps track of everything happening on the network.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">IT teams need to keep systems patched, up to date, and regularly scanned and secured &#8211; if there is a monitoring tool, it needs to be used, and notifications from the tool need acting upon.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">On a supply chain level, the <\/span><\/span><a href=\"https:\/\/www.securitymagazine.com\/gdpr-policy?url=https%3A%2F%2Fwww.securitymagazine.com%2Farticles%2F87010-the-daily-challenges-of-supply-chain-security\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">key areas to focus on<\/span><\/a><span style=\"color: rgb(0, 0, 0)\"> (according to Security\u2019s Bill Zalud) are:<\/span><\/p>\n<ul style=\"list-style-type: disc\">\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\">Visibility &#8211; tracking the location and integrity of cargo in real time so anomalies can be noted at once<\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Validation &#8211; ensuring a solid chain of custody, with goods passing between trusted partners at every step<\/span><\/span> <\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Performance &#8211; estimating transit times and notifying when they\u2019ve been met, allowing late deliveries to be tracked and investigated faster<\/span><\/span> <\/span> <\/span> <\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Mitigation &#8211; awareness of why and how firms might be targeted, and co-operation with law enforcement and partners to manage attacks ASAP<\/span><\/span> <\/span> <\/span> <\/span> <\/span> <\/span><\/li>\n<li>\n\t\t<span style=\"color: rgb(0, 0, 0)\"><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span><span style=\"color: #000000\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Efficiency &#8211; balancing cost, risk and time when routing goods, and evaluating performance, treating no operation as routine<\/span><\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span> <\/span><\/li>\n<\/ul>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Professor Stuart Madnick (information technology and cybersecurity founder at MIT Sloan) recommends firms should subject any partner, contractor or service provider to a <\/span><\/span><a href=\"https:\/\/mitsloan.mit.edu\/ideas-made-to-matter\/these-are-cyberthreats-lurking-your-supply-chain\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">security audit as standard operating procedure<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">Organisations need a way to evaluate their potential partners\u2019 security and conduct stress tests on their own systems, establishing where there are points of weakness. Systems become vulnerable at the joints, where different programs and apps connect and network, or where a different organisation takes over responsibility, so those changeovers need attention.<\/span><\/p>\n<p>\n\t<br \/>\n\t<span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">The logistics sector is turning itself around, with flagship events like the <\/span><\/span><a href=\"https:\/\/www.cybersenate.com\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">Cybersenate Logistics Cybersecurity<\/span><\/a><span style=\"color: rgb(0, 0, 0)\"> show later in 2019. This event brings together veterans and survivors of the cybersecurity wars &#8211; including Andy Powell, CISO for A.P. Moller-Maersk &#8211; to share stories, strategies and best practice, establishing what\u2019s worked for them in preventing attacks and how they go about recovering.<\/span><\/p>\n<p>\n\t<span style=\"color: rgb(0, 0, 0)\">In an industry that\u2019s traditionally hands-on and hardware-focused, digital transformation means more than just bringing in new technology. It means transforming mindsets. Companies and people must understand how to use the tech safely and securely, bringing in the skill sets to lead that training &#8211; and, should the worst happen, to handle a threat in good time and good order.<\/span><\/p>\n<p>\n\t<b><i><span style=\"color: rgb(0, 0, 0)\"><span id=\"docs-internal-guid-abe199d9-7fff-0b96-6f7f-2c7002a436ba\">Looking for a role where you can put your cybersecurity skills to good use? <\/span><\/span><a href=\"https:\/\/www.identifiglobal.com\/job-search\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #0000FF\">Take a look at our current vacancies<\/span><\/a><span style=\"color: rgb(0, 0, 0)\">.<\/span><\/i><\/b><\/p>\n<p>\n\t<b><i><span style=\"color: rgb(0, 0, 0)\"><a href=\"https:\/\/www.identifiglobal.com\/contact-us\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" src=\"https:\/\/d3jh33bzyw1wep.cloudfront.net\/s3\/W1siZiIsIjIwMTgvMTEvMDIvMTMvNTEvMjUvODE3L2lkZW50aWZpIGdsb2JhbCBuZXcgam9iIHJvbGUucG5nIl1d\"><\/a><\/span><\/i><\/b><\/p>\n<p>\n\t<i><span style=\"color: rgb(0, 0, 0)\">Featured image via Adobe Stock (enanuchit)<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is a growing concern for logistics firms. In June 2017, a ransomware attack on shipping giant A.P. Moller-Maersk brought eighty ports and terminals around the world to a standstill. The attack affected not just them, but their complex supply chain of truckers, shippers, consignees, banks and border authorities, too. It cost the company $300&hellip;&nbsp;<a href=\"https:\/\/www.identifiglobal.com\/news\/logistics-digital-transformation-and-cybersecurity-the-way-forward\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Logistics, digital transformation and cybersecurity: the way forward<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":14372,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[39],"tags":[],"class_list":["post-15241","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-news-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15241","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/comments?post=15241"}],"version-history":[{"count":0,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/posts\/15241\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media\/14372"}],"wp:attachment":[{"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/media?parent=15241"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/categories?post=15241"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identifiglobal.com\/af-api\/wp\/v2\/tags?post=15241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}