Inbound Logistics | January 2022

Many warehouses and DCs protect their facilities using security systems such as Kisi, which provides workers cloud-based keyless entry.

where cybercriminals encrypt sensitive data and then demand

VIRTUAL THREATS ON THE RISE In addition to physical security, threats are becoming increasingly common in the virtual world. Cybersecurity breaches are on the rise, and logistics rms are not an exception to that trend. Cybercriminals use malware and bots to exploit security weak spots and gain access to a company’s condential data. In addition to nancial harm, cyberattacks can compromise the security of any vendor or partner that a rm works with. “As long as a company has information that is valuable to hackers, they will be a target,” notes Pierluigi Stella, chief technology ofcer of Network Box, a cybersecurity service provider in Houston, Texas. “Sometimes a logistics rm isn’t even the target, but hackers use it as a vehicle to target somebody else.” These attacks are often facilitated through email phishing scams. Hackers gain access to company information when an employee accidentally downloads malware through an email attachment or link. Many attacks involve ransomware,

payment (a ransom) for its return. Companies on the receiving end of this extortion may even nd that a hacker has sold their information on the internet. Ransomware incidents rose by 715% in 2020, nds a BitDefender report. But even truck equipment can potentially be hacked.

In June 2020, the FBI circulated an advisory warning that cybercriminals could breach electronic logging devices to access company networks or gain control of the truck engine itself. CYBERSECURITY FROM THE TOP DOWN These types of attacks can be mitigated through company-wide awareness, starting from the top down. “Cybersecurity needs to be a boardroom conversation that is addressed on day one,” says Vijaya Rao, founder and CEO of Techvio, an IT solutions platform in Philadelphia. “Companies need to take a

30,000-foot view and decide what their cybersecurity goals are. “If you have a security operations protocol determining how data is handled within the company, decide what protections are needed, and who has access to what,” he adds. “That is how you maintain a strong cybersecurity posture.” Firms don’t have to be sitting ducks, waiting for an attack to happen. “Some small or mid-sized businesses might be reluctant to invest in these measures,” says Ratzki. “But business owners can feel good knowing that their company is protected.” n

Q3 2021

Electronics

Household Food and Beverage

Vehicles and Accessories

Other Apparel and Accessories

Building Materials

Pharma & Medical

Commercial / Industrial

Metals PersonalCare &Beauty

62

43 42

38

34

33 32

31

31

24

21

19

16

15 15

12 12 12

11

11

10 10

9

9

7

7

6

6 7

5

5

4

2

Source: Cargo Theft Trends Review, CargoNet, a Verisk business

January 2022 • Inbound Logistics 203

Powered by