{"id":10630,"date":"2021-04-09T13:57:28","date_gmt":"2021-04-09T11:57:28","guid":{"rendered":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/?p=10630"},"modified":"2021-04-09T13:57:28","modified_gmt":"2021-04-09T11:57:28","slug":"cybersecurity-2","status":"publish","type":"post","link":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/2021\/04\/09\/cybersecurity-2\/","title":{"rendered":"Taking Stock of Cybersecurity with Carrier Logistics\u2019 Kevin Linardic"},"content":{"rendered":"<p style=\"text-align: justify;\"><i>Photo: Wikimedia Commons<\/i><\/p>\n<p style=\"text-align: justify;\"><b>Trucking companies can be targets for cyberattacks.<\/b><\/p>\n<p style=\"text-align: justify;\">Living and working in an online world means being painfully aware that electronic doorways we want sealed can be blown open. But stopping hackers is no easy feat, not when they are determined to breach every security protocol thrown up to thwart them.<\/p>\n<h2 style=\"text-align: justify;\"><strong>What Do Hackers Want?<\/strong><\/h2>\n<p style=\"text-align: justify;\">Countering cyberattacks starts with understanding what hackers may want with your trucking operation. Two takeaways to keep in mind: They may not be after only you and, in this case anyway, your size simply does not matter.<\/p>\n<p style=\"text-align: justify;\">\u201cIt might not even be your data that they want access to,\u201d Linardic explained. \u201cThey want to see what\u2019s there because they\u2019re data-hungry. They might just \u2018mine\u2019 your data so they can jump to your customer list and then start attacking <strong>them<\/strong>. You might think you&#8217;re just too small of a fish for somebody to care about. But you&#8217;re a prime target for them,\u201d so they can attack elsewhere.<\/p>\n<p style=\"text-align: justify;\">To get a real-world take on how trucking companies can battle those cyber menaces, we spoke with Kevin Linardic, chief technology officer and board member of <a href=\"https:\/\/carrierlogistics.com\/\">Carrier Logistics Inc.<\/a> CLI, as it\u2019s known is based in Elmsford, New York, and specializes in developing freight-transportation software, primarily for less-than-truckload fleets but also for other segments of trucking.<\/p>\n<p style=\"text-align: justify;\">\u201cEverything we deploy out to our customers, we need to make sure it&#8217;s safe and secure,\u201d Linardic told HDT Talks Trucking podcast host Jim Park. \u201cAnd we&#8217;re following up continuously, all of the latest protocols, again to keep our customers safe.\u201d<\/p>\n<p style=\"text-align: justify;\">Asked about the most likely threats that fleets face from hackers, he said the answer is \u201call of the above,\u201d meaning it could be theft of data, or a ransomware play, or another line of attack.<\/p>\n<p style=\"text-align: justify;\">Linardic noted that direct threats against enterprise software can greatly affect the ability to do business.<\/p>\n<p style=\"text-align: justify;\">\u201cWhen your website is down, and you can&#8217;t move your freight or a customer of yours can&#8217;t find where their freight is, that\u2019s a serious problem.<\/p>\n<p style=\"text-align: justify;\">\u201cThen there\u2019s the other side of the fence \u2013 the data that&#8217;s external to your system that you&#8217;re putting out over the Internet, all over the world. That\u2019s data going to your telematics platforms. It&#8217;s all out there. And all ripe for being captured.\u201d<\/p>\n<h2 style=\"text-align: justify;\"><strong>What Can You Do?<\/strong><\/h2>\n<p style=\"text-align: justify;\">But even if fleets know of these cyber threats, are they doing enough about them?<\/p>\n<p style=\"text-align: justify;\">\u201cFrom what we&#8217;ve clearly seen out there, the answer is no,\u201d said Linardic. \u201cWe try to nudge customers, and they say, \u2018Well, I&#8217;m fine. I don&#8217;t need to spend money on that. What&#8217;s going to happen to me?\u2019 But it does happen.<\/p>\n<div class=\"widget-digdeeper\" style=\"text-align: justify;\">\n<p><a href=\"https:\/\/www.truckinginfo.com\/352987\/dont-let-your-trucking-data-be-held-hostage\" target=\"_blank\" rel=\"noopener noreferrer\">Don\u2019t Let Your Trucking Data Be Held Hostage<\/a><\/p>\n<\/div>\n<p style=\"text-align: justify;\">\u201cWe&#8217;ve done our due diligence, we&#8217;re technically savvy, and we know we do a good job,\u201d he added, \u201cbut it can happen. To anybody. We&#8217;ve been in the SAS [software as a service] world forever, and in our old days we kind of did everything ourselves. It&#8217;s just like that with transportation companies.\u201d<\/p>\n<p style=\"text-align: justify;\">But a couple of years ago, meeting a new cloud-hosting provider at a trade show was enlightening.<\/p>\n<p style=\"text-align: justify;\">\u201cTalking with them, we quickly realized their expertise in hosting applications, to keep them running smoothly and safe, was above our level. And really that opened our eyes, as a trend-protection provider, that there are things we should be doing, and we should be partnering with them. And that&#8217;s what we did. They\u2019re now doing our heavy lifting. As a side benefit, we actually now can concentrate more on what we do best, which is developing great software for the transportation industry.\u201d<\/p>\n<hr \/>\n<p><strong><em>Listen to this HDT Talks Trucking podcast episode and others on your favorite podcast platform or at\u00a0<\/em><\/strong><a href=\"https:\/\/www.truckinginfo.com\/podcasts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong><em>www.truckinginfo.com\/podcasts<\/em><\/strong><\/a><\/p>\n<div class=\"g-cols wpb_row type_default valign_top vc_inner  vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<p class=\"p-16-gray\">by <a href=\"https:\/\/www.truckinginfo.com\/authors\/3276\/david-cullen\">David Cullen<\/a><\/p>\n<div class=\"widget-see-also\">\n<div class=\"byline\">\n<p><span class=\"posted-by\">Source: <a href=\"https:\/\/www.truckinginfo.com\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.truckinginfo.com<\/a><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CUT COTS OF THE FLEET WITH OUR AUDIT PROGRAM<\/strong><\/a><\/h3>\n<p><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\"><img loading=\"lazy\" class=\"aligncenter wp-image-5377\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria.jpg\" sizes=\"(max-width: 858px) 100vw, 858px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria.jpg 2000w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria-300x200.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria-1024x682.jpg 1024w\" alt=\"\" width=\"858\" height=\"572\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The audit is a key tool to know the overall status and provide the analysis, the assessment, the advice, the suggestions and the actions to take in order to cut costs and increase the efficiency and efficacy of the fleet. We propose the following fleet management audit.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FLEET MANAGEMENT AUDIT<\/strong><\/a><\/h3>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Photo: Wikimedia Commons Trucking companies can be targets for cyberattacks. Living and working in an online world means being painfully aware that electronic doorways we want sealed can be blown open. But stopping hackers is no easy feat, not when they are determined to breach every security protocol thrown up to thwart them. What Do&#8230;<\/p>\n","protected":false},"author":3,"featured_media":10631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[361],"_links":{"self":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/10630"}],"collection":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/comments?post=10630"}],"version-history":[{"count":1,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/10630\/revisions"}],"predecessor-version":[{"id":10632,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/10630\/revisions\/10632"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media\/10631"}],"wp:attachment":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media?parent=10630"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/categories?post=10630"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/tags?post=10630"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}