






FOR TRANSPORT & LOGISTICS
Whether your organization is large or small, cyber attackers are looking at you. It might surprise you, but Transport now ranks third in cybersecurity vulnerability, with the average data breach costing over $1 million due to lost income, reductions in fees, downtime, and regulatory and delivery fines.
Cyber criminals are leveraging the digitization of transport networks, the growing reliance on IT and automation for scheduling and planning, and increasingly complex supply chains. Not to mention a heavily dispersed mobile workforce. Especially with the rise in BYOD. Most of our personal devices do not have the level of security that a business requires to remain secure and compliant, making light work for hackers.
Cyber criminals are leveraging the digitization of transport networks, the growing reliance on IT and automation for scheduling and planning, and increasingly complex supply chains. Not to mention a heavily dispersed mobile workforce. Especially with the rise in BYOD. Most of our personal devices do not have the level of security that a business requires to remain secure and compliant, making light work for hackers.
There is an enormous range of data flowing across multiple systems, and more data means more vulnerabilities and potential damage to both the data and physical assets too. It only takes one employee plugging in an infected USB to destroy logistics schedules, delay deliveries and shut down systems and ports. Threats targeting Transport and Logistics can come from:
- Insider threats – industrial espionage
- Competitors
- Disgruntled or ex– employees
- Nation states
- Or just an innocent mistake…
58% of the time, a smaller business is the target. However, cyber attacks can ripple through entire supply chains. You do not want your organization to be at the epicenter. The infamous 2017 NotPetya cyber attack on A.P. Moller– Maersk – the world’s largest container ship and supply vessel operator – left millions of tons of cargo in limbo, brought almost 80 ports and terminals around the globe to a standstill, and cost the company an estimated $300 million, including rebuilding damaged IT infrastructure.
By sharing the KUB between different sites, you can easily reduce the risks of third–party data breaches and BYOD, educate your workforce in cyber security, and make regular cleaning of USB devices an ingrained part of your organization.