MHI Solutions

Industry Trends

Truck Takeovers?

Cybersecurity concerns roll into the roadways as transportation vehicles become more high-tech and computerized.

* By Fiona Soltes *

As the journey toward connectivity, mobility, new technology and the Internet of Things continues to gather speed, it can be tempting to accelerate the search for solutions at the same time. This especially can be the case when it comes to the increasing risks of cybersecurity. Much has been made of how increased tech in transportation trucks and autos can equate to increased vulnerabilities for companies and drivers.

But hit those brakes before rushing in blindly and incorporating a “solution” to a perceived and/or anticipated transportation cybersecurity threat: Though the risks of hacking are real, the threat can be mitigated in a variety of ways. Finding and installing the right platform or software can help, but so can working toward a greater understanding of what such solutions actually do, how behavior can be modified, and what hacking might really entail.

“I think there is still a misconception out there that when you get into your car to drive home from work later today you might fall prey to a massive and coordinated vehicle cyberattack, in which a rogue state threatens to hold you and your vehicle ransom unless you meet their demands,” said Adam Boulton, chief technology officer, BlackBerry Technology Solutions. “While an instance such as this could, in theory, happen, its plausibility of occurring is much weaker.”

So let’s separate fiction from reality. Hollywood movies, Boulton noted, are good at exaggerating what’s possible; imagine, for example, an “instant and entire compromise of fleets that undermines all safety systems in cars.”

The biggest threats, however, may be much more simple.

Ryan Webber, global director of enterprise mobility for integrated mobility and Internet of Things solutions provider and MHI member SOTI, said it’s increasingly common for vehicles in the transportation and logistics space to have mounted tablets; with slim industry margins, the goal is to ensure drivers are as efficient as possible.

“The challenge we’ve found is that a lot of times, people are investing in the technology, but they don’t really have a clear understanding of its intended use,” Webber said. “That in itself offers up some security risks.”

These tablets, he said, often include sensitive corporate content. In addition, because of the nature of the job, the drivers may move in and out of more Wi-Fi access areas—and one in three networks is either insecure or carries some sort of security risk.

On the other hand, he noted—citing a report from TrendMicro—roughly 41 percent of data breaches overall are caused by a lost or stolen device. Hacking and malware accounts for just 25 percent.

Read More….


Leading manufacturing and supply chain executives agree that technology is the key to future success. As they digitize their supply chains they are generating more data than ever before, giving them the power to leverage that data to see their businesses in new ways and to make better decisions. These early adopters are creating real and measurable competitive advantage. When it comes to technology investment start small but think big. Build on your successes and learn from your failures. By investing wisely, you’ll create additional value in your supply chain and widen your advantage over the competition.

Industry Headlines

MHISolutionsmag.com-In the current tight labor market, facilities are seeking ways to streamline man [...]

Bookmark MHIsolutionsmag.com to gain quick access to any and all MHI media and news information. MHI [...]

SupplyChainBrain-Experts weigh in on how companies can make better data-driven decisions in their su [...]

Material Handling & Logistics-Though there are some benefits to using blockchain, supply chain p [...]

Visit NewsWire to see more industry headlines

Latest Tweets