Transport and Logistics Operators: The cybersecurity is as necessary as filling the truck tank

Barcelona, ​​April 26, 2018.-  We remember the dentist, when a tooth hurts. And maybe, we remember security on the Internet, when it’s too late. Just as the best improvisation is the one that does not exist, cybersecurity protocols are a great need. The management of routes of a transport company can not be attacked by a virus that could paralyze a fleet of trucks. The billing of a logistics operator can not be stopped by an ambitious hacker either.

AndSoft, as a manufacturer of software for the management of transport companies (e-TMS), we are very sensitive to all the necessary security measures to avoid digital discomfort, not planned. Cybersecurity is not a fad, a wonderful trend, it is as necessary as filling the tank of the truck. 

2018.03.07-How-to-Manage-Shipping-Technology-and-Negate-Cyber-Security-Risks-in-Maritime-Transportation-Systems-900x600

Today we go to the Consumer Technology Association (CTA) to learn about a new approach to Cybersecurity, its risks and possible solutions. The Consumer Technology Association (CTA) ™ is committed to educating consumers on how to get the most out of their products.

Cybersecurity risks are escalating, threatening businesses, governments and consumers. In a world that revolves around the internet, security breaches, hacked elections, hacked medical devices, cyberwarfare, cryptocurrency heists, and other cyber threats are just a keystroke away. Some speculate that cybercriminal activity will represent the greatest transfer of economic wealth in history.

U.S. consumers lost $19.4 billion to cybercriminals last year, according to Symantec’s 2017 Norton Cyber Security Insights Report, and then spent almost 24 hours each dealing with the impact of cybercrime. That amount jumps to $172 billion when you take the rest of the world into account. Cybersecurity incidents now rank as number two on the Allianz (Insurance) Risk Barometer, a report that identifies the most important risk factors for companies. This annual report is based on insight from 1,911 risk experts from 80 countries. The nature of cyber threats is evolving and business interruption is a worldwide concern.

At the recent annual World Economic Forum (WEF) in Davos, cybersecurity was a top concern by business and government leaders. There was pressing anxiety about cryptocurrency ecosystems, election security, cyberwarfare, airline computer systems and chips.

images

And connected products and services are increasing and creating more questions. Researchers forecast that as many as 300 billion items will be connected by 2020 and 500 billion devices by 2030. Innovations including augmented reality, artificial intelligence, and the Internet of Things (IoT) are transforming the global landscape in unprecedented ways.

At CES 2018, companies showcased amazing implementations based on IoT — from smart cities and smart/digital health to smart homes and self-driving vehicles — but how secure are these devices that eat excessive amounts of personal data? Every app and connected device is a potential entry point for cyber-attackers.

As the number of IoT devices balloons, hackers will find new ways to uncover secrets and protocols to access backend services and bypass access controls in data centers; hijack nodes to deny services, demand ransoms, steal data or forge transactions; run unauthorized transactions that could affect patient safety; and new schemes that have not been discovered yet.

 “Cyberattacks are perceived as the global risk of highest concern to business leaders in advanced economies,” reports WEF in its Global Risks Report 2018. “Cyber is also viewed by the wider risk community as the risk most likely to intensify in 2018.” New risks require new tools and models to help manage and mitigate the impact of a breach before data is stolen or nefarious activities are played out.

A new model for a global security platform is needed that combines governmental and private collaborations to counter these challenges. In January, WEF launched the Global Centre for Cybersecurity to facilitate this public-private cooperation.

jnpt-kD0C--621x414@LiveMint

How can businesses bake rigorous security into the DNA of their products from the beginning? When it comes to cyber warfare, do we engage in “active defense”? As we work through these issues, ourcommon goal is to continue to confidently harness innovation to impact people, society, and the planet for the greater good.


 

Get to know the AndSoft Security Protocols in your TMS for Transport and Logistics:

Nueva identidad corporativa AndSoft 2016

 

 

 

 

Madrid
Zurbano,45-1ª
28010- Madrid – Espana
Teléfono : +(34) 911 853 129
Fax : +(34) 911 853 111      Email: info@andsoft.com                                                                                                                                                                          

Barcelona
World Trade Center – Muelle de Barcelona, Ed. Sur, 2ª Planta
08039 – Barcelona – Espana
Teléfono : +34 933 443 343
Fax : +34 933 443 299                                                                                                                                                                        

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s