Is your fleet securely managed?

Is your fleet securely managed?

Digitalisation has revolutionised the fleet management industry and opened various doors in this sector. Unfortunately, not every connection is positive; without sufficient cybersecurity, fleets may be left exposed to nefarious parties or malware.

Telematics generates a multitude of data, including detailed vehicle, driver, and operational histories. โ€œThis data type is beneficial within an organisation for controlling fuel and maintenance costs, increasing productivity and safety, and minimising risk. Using telematics for collision reconstruction or benchmarking can generate even greater insight,โ€ says Canadian fleet and tech solutions expert, Connected Vehicles, in its piece, โ€œCybersecurity Management in Telematicsโ€.

Protecting this valuable data is essential. โ€œIf accessed by a malicious party, there could be severe consequences, potentially jeopardising customer accounts, schedules, shipments, location of assets, and personal information. Cybercrimes are committed because there is value to be gained from data, whether that data is a collection of usernames and passwords, credit card numbers, or telematics data,โ€ notes Connected Vehicles.ย 

โ€œTherefore, whether you are a small business owner, fleet manager, developer, CIO or CEO, you must understand how telematics data is handled and protected,โ€ it continues.

The telematics ecosystem includes both hardware and software responsible for collecting and analysing vehicle data.

โ€œAs businesses gravitate towards software-based systems and working in the cloud, telematics data security will become an even more significant challenge,โ€ Connected Vehicles elaborates.

โ€œTelematics systems are expansive and multi-tiered: physical hardware, radio systems, software servers, and human agents. Because there are many components involved, the potential threats are numerous and can include thefts, GPS jamming, cellular sniffing, firmware manipulation, server exploits, and phishing.โ€

Wilmar, one of North Carolinaโ€™s largest independent fleet leasing and management companies, has more than 40 yearsโ€™ experience. It highlights that hackers and other cybercriminals use multiple techniques to gain access to a companyโ€™s vehicles. โ€œFor example, they can hack into your fleetโ€™s wireless connections (Bluetooth or WiFi) or the electronic control unit. Both systems control the vehicleโ€™s ability to perform different actions, such as steering and braking,โ€ it notes, adding: โ€œAnother possible entry point where they can attack is through another device like a smartphone that is connected to a port inside the vehicle.โ€

According to Wilmar, once someone has hacked into a vehicle, they can easily gain control of the rest of your fleet. โ€œThis can give cybercriminals the power to shut off the vehicleโ€™s engine, control the steering, disable brakes, and gain access to other data,โ€ it expands.

The situation isnโ€™t hopeless, however, as Wilmar offers some guidance with four tips on how to protect a connected fleet from cybercriminals:

Be cautious about installing new or unauthorised software and systems

Wilmar recommends that you only install devices and software from a trusted brand on a secure network, and only with your company’s final approval. โ€œYou should also develop a comprehensive security policy that mentions different guidelines for the fleet,โ€ it notes. โ€œThis precaution can greatly reduce your chance of experiencingย a security breach due to aย malicious software update from unverified third parties.โ€

Control who has physical access to the companyโ€™s vehicles

Next, Wilmar advises that you store vehicles in a controlled environment where only authorised personnel can access them: โ€œThis will drastically limit the number of unauthorised people who will have access to the vehicle’s software.โ€

Educate employees about potential risks

Another way to prevent hackers from gaining control of your connected fleet is to properly educate employees about the danger and potential ramifications of cybercrime.โ€œDevelop different training security programmes, policies, and procedures,โ€ urges Wilmar. โ€œHighly trained employees will (thus) have the tools and knowledge necessary to make better decisions that can protect the fleet from malicious hackers.โ€

Always update the vehicleโ€™s software

โ€œLastly, we recommend that you frequently update the vehicle’s software and other systems. The majority of reputable software companies routinely update their software to patch up security bugs to make it safer for use,โ€ Wilmar emphasises.

โ€œYou may be tempted to ignore security updates, but they can help make your company’s vehicles more secure,โ€ it continues. โ€œEvery time one of your vehicle’s devices or software is not updated, you may be leaving your fleet vulnerable to a potential cyberattack.โ€

US- and India-based telematics provider LocoNav offers some additional tactics for safeguarding your valuable data.

โ€œPrioritise data access to reduce potential vulnerabilities and threats. To prevent unauthorised users from getting system access, restrict access to specific types and sets of data to just those who need to see it,โ€ the company advises.

โ€œLearn how and when your telematics devices will update. To guarantee that security updates take effect, study how updates happen and under what conditions they occur (such as when the vehicle is running or overnight),โ€ it adds.

LocoNav says that you should also keep your drivers anonymous whenever possible. โ€œYou will need to track data pertaining to specific drivers at times. However, if this is not the case, alter the telematics settings to generate anonymous data trails,โ€ it further explains.

Finally, Wilmar stresses the need to be vigilant and diligent: โ€œAlthough it may be tempting to look the other way, it is critical for business owners and fleet managers to be aware of potential ramifications of hackers gaining access to your companyโ€™s vehicles and proprietary information.โ€ ย 

Published by

Focus on Transport

FOCUS on Transport and Logistics is the oldest and most respected transport and logistics publication in southern Africa.
Prev Ukraine war impacts AdBlue availability
Next Tantalising tech toolsย 

Leave a comment

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.