{"id":6127,"date":"2020-06-16T14:24:38","date_gmt":"2020-06-16T12:24:38","guid":{"rendered":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/?p=6127"},"modified":"2020-06-16T14:24:38","modified_gmt":"2020-06-16T12:24:38","slug":"fleet-data","status":"publish","type":"post","link":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/2020\/06\/16\/fleet-data\/","title":{"rendered":"Protecting Fleet Data from Security Threats"},"content":{"rendered":"<section class=\"body-content\">\n<p style=\"text-align: justify;\">Big data is revolutionizing fleet management \u2014 specifically in the form of telematics.<\/p>\n<p style=\"text-align: justify;\">From engine diagnostics that track fuel efficiency and mileage to sensors that detect aggressive driving behavior and interior vehicle activity, this information is so valuable that we\u2019re quickly approaching the point where connected technology will come standard in every vehicle.<\/p>\n<p style=\"text-align: justify;\">Telematics is an operational goldmine. Whether it is with a <a href=\"https:\/\/www.merchantsfleet.com\/services\/\" target=\"_blank\" rel=\"noopener noreferrer\">fleet management services<\/a> provider or an internal fleet management team, businesses can easily gather measurable, actionable data that can help control operating expenses, improve driver safety, and communicate with drivers in real time.<\/p>\n<p style=\"text-align: justify;\">But with great power comes great responsibility. Whenever new technology is introduced, vulnerabilities are exposed, and hacking threats become real. No business is immune.<\/p>\n<h5 style=\"text-align: justify;\"><strong>The Risks<\/strong><\/h5>\n<p style=\"text-align: justify;\">At the 2017 National Governors Association, Tesla and Space X CEO Elon Musk expressed his number one priority: preventing fleet-wide hacks. \u201cIt is my top concern from a security standpoint \u2014 that Tesla is making sure that a fleet-wide hack or any vehicle-specific hack can\u2019t occur,\u201d <a href=\"https:\/\/www.csoonline.com\/article\/3208035\/elon-musk-s-top-cybersecurity-concern-preventing-a-fleet-wide-hack-of-teslas.html\" target=\"_blank\" rel=\"noopener noreferrer\">said Musk<\/a>.<\/p>\n<p style=\"text-align: justify;\">Musk has valid reasons to be concerned. <a href=\"https:\/\/www.upstream.auto\/research\/automotive-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">Upstream.auto<\/a> reports that there has been a 94% year-over-year increase in cybersecurity attacks on vehicles since 2016. And the smarter our vehicles get, the smarter malevolent hackers become.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/\" target=\"_blank\" rel=\"noopener noreferrer\">Andy Greenberg of Wired<\/a> experienced this first-hand when hackers were able to remotely kill his Jeep on the highway while he was driving. Greenberg was a willing test subject, but that doesn\u2019t diminish the chaos the professional hackers were able to create. Through wireless access to the Jeep\u2019s software, the hackers were able to disable the brakes, take control of the steering wheel, blast the radio and air conditioning and cut the accelerator.<\/p>\n<p style=\"text-align: justify;\">This wireless carjacking was merely a test to see what level of hacking was possible \u2014 but it was a successful test. Vulnerabilities in the vehicle\u2019s telematics were easily exposed, which means fleet managers and drivers need to ensure that their vehicles are following security best practices to avoid these threats.<\/p>\n<h5 style=\"text-align: justify;\"><strong>How You Can Protect Your Fleet Data<\/strong><\/h5>\n<p style=\"text-align: justify;\">The benefits of telematics far outweigh the risks, and there are plenty of measures that can be put in place to mitigate hacking risks.<\/p>\n<h5 style=\"text-align: justify;\"><strong>Be Selective<\/strong><\/h5>\n<p style=\"text-align: justify;\">Before you install any telematics software or hardware, it is crucial to thoroughly vet the products you will be using whether it is directly with a vendor or through a fleet management company.<\/p>\n<p style=\"text-align: justify;\">Check online reviews and the product websites to find as much information possible. It also helps to know:<\/p>\n<ul style=\"text-align: justify;\">\n<li>what the encryption policies are,<\/li>\n<li>how their security is validated, and<\/li>\n<li>what type of infrastructure they maintain.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">It is advised that you enlist help from professionals within the fleet telematics field to set up and install these systems in your vehicles. This will not only ensure that the job is done right; it will also bring peace of mind to your organization.<\/p>\n<h5 style=\"text-align: justify;\"><strong>Review Internal Policies<\/strong><\/h5>\n<p style=\"text-align: justify;\">Educating your teams on the proper use of vehicles equipped with telematics can help prevent security threats. This should include employees across your organization \u2014 drivers, IT, administrators, and beyond. If everyone understands the consequences involved with vehicle misuse or neglect, they will ideally be more proactive about mitigating any risks.<\/p>\n<p style=\"text-align: justify;\">Every organization should have a detailed policy regarding the operation of their fleet. This should include information on:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Data Point Capture Fleet Telematics<\/li>\n<li>Communication Processes<\/li>\n<li>Instructions on Proper Usage of Vehicles<\/li>\n<li>Guidelines for Using Data and Updating Systems<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">Internal security policies should be reviewed often, as changes happen with your organization and as technology evolves.<\/p>\n<h5 style=\"text-align: justify;\"><strong>Restrict Access<\/strong><\/h5>\n<p style=\"text-align: justify;\">First and foremost, your fleet should be located in a controlled environment \u2014 one that has its own security system for round-the-clock monitoring. Aftermarket telematics devices should also be securely installed in order to avoid tampering.<\/p>\n<p style=\"text-align: justify;\">Then, gaining access to a vehicle should be just as secure as gaining access to the products being transported. Who is authorized to use the vehicles? This should be a very short list, ideally only consisting of the driver on duty and any necessary higher-ups. Off-duty employees and those in unrelated departments should not be granted access.<\/p>\n<p style=\"text-align: justify;\">Finally, who will be looking at your fleet data? Restricted access is just as important for the data as it is for the vehicles. If you have an internal team monitoring the data, ensure that your infrastructure is built for security and that the employees are following the security best practices as outlined in your policies.<\/p>\n<h5 style=\"text-align: justify;\"><strong>Maintain Up-to-Date Systems<\/strong><\/h5>\n<p style=\"text-align: justify;\">Software updates often include patches and features that are intended to enhance the security of your fleet. If you skip an update, your fleet could be vulnerable to an attack.<\/p>\n<p style=\"text-align: justify;\">Fortunately, many telematics systems today automatically push out software updates. While you are vetting your options, you can ask vendors about the frequency and extent of their updates to get a better idea of how regularly they are updating and improving their systems.<\/p>\n<h5 style=\"text-align: justify;\"><strong>Always Have an Eye on the Road \u2014 No Matter Where You Are<\/strong><\/h5>\n<p style=\"text-align: justify;\">Even though it can expose fleets to certain risks if not managed properly, telematics is also improving the way we secure our data and assets. Connected vehicles make it easier to detect suspicious activities or even just things that may be a bit off from normal procedures.<\/p>\n<p style=\"text-align: justify;\">For example, if a large purchase is made on a fuel card when the vehicle\u2019s GPS shows that it is nowhere near a gas station, your internal team can receive a real-time alert and act fast to prevent fraudulence.<\/p>\n<p style=\"text-align: justify;\">When it comes to securing your fleet data, being proactive is always your best bet. If this article did not convince you, maybe General Motors CEO Mary Barra will:<\/p>\n<p style=\"text-align: justify;\">\u201cA cyber incident is a problem for every automaker in the world. It is a matter of public safety.\u201d<\/p>\n<p style=\"text-align: justify;\">___<\/p>\n<p style=\"text-align: justify;\"><strong>About the Author:<\/strong><\/p>\n<p style=\"text-align: justify;\"><em><img loading=\"lazy\" class=\"wp-image-56121 size-medium alignleft\" src=\"https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-170x170.jpg\" sizes=\"(max-width: 170px) 100vw, 170px\" srcset=\"https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-170x170.jpg 170w, https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-768x768.jpg 768w, https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-450x450.jpg 450w, https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-1536x1536.jpg 1536w, https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-2048x2048.jpg 2048w, https:\/\/3b6xlt3iddqmuq5vy2w0s5d3-wpengine.netdna-ssl.com\/state-of-security\/wp-content\/uploads\/sites\/3\/Emily_Candib-1280x1280.jpg 1280w\" alt=\"Photo of Emily Candib\" width=\"170\" height=\"170\" data-lazy-loaded=\"true\" \/>Emily Candib serves as Director of Products and services for <a href=\"https:\/\/www.merchantsfleet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Merchants Fleet<\/a>, overseeing the products and services team focused on the operational setup and execution of the fuel, telematics, accident management, roadside assistance, and compliance products.\u00a0<\/em><\/p>\n<p style=\"text-align: justify;\"><em>She leads vendor management and the overall execution and delivery of these products. Emily received her bachelor\u2019s degree in advertising with a minor in marketing, as well as her master\u2019s in business administration with a concentration in social media from Southern New Hampshire University.<\/em><\/p>\n<p style=\"text-align: justify;\"><strong>Editor\u2019s Note:<\/strong>\u00a0<em>The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.<\/em><\/p>\n<\/section>\n<p>&nbsp;<\/p>\n<p><span class=\"posted-by\">Source:<a href=\"https:\/\/www.tripwire.com\" target=\"_blank\" rel=\"noopener noreferrer\"> https:\/\/www.tripwire.com<\/a><\/span><\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>CUT COTS OF THE FLEET WITH OUR AUDIT PROGRAM<\/strong><\/a><\/h3>\n<p><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\"><img loading=\"lazy\" class=\"aligncenter wp-image-5377\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria.jpg\" sizes=\"(max-width: 858px) 100vw, 858px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria.jpg 2000w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria-300x200.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2020\/04\/nueva-ley-auditoria-1024x682.jpg 1024w\" alt=\"\" width=\"858\" height=\"572\" \/><\/a><\/p>\n<p style=\"text-align: justify;\">The audit is a key tool to know the overall status and provide the analysis, the assessment, the advice, the suggestions and the actions to take in order to cut costs and increase the efficiency and efficacy of the fleet. We propose the following fleet management audit.<\/p>\n<h3 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/consultancy\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>FLEET MANAGEMENT AUDIT<\/strong><\/a><\/h3>\n","protected":false},"excerpt":{"rendered":"<p>Big data is revolutionizing fleet management \u2014 specifically in the form of telematics. From engine diagnostics that track fuel efficiency and mileage to sensors that detect aggressive driving behavior and interior vehicle activity, this information is so valuable that we\u2019re quickly approaching the point where connected technology will come standard in every vehicle. Telematics is&#8230;<\/p>\n","protected":false},"author":3,"featured_media":6128,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[18],"tags":[39],"_links":{"self":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/6127"}],"collection":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/comments?post=6127"}],"version-history":[{"count":1,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/6127\/revisions"}],"predecessor-version":[{"id":6129,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/6127\/revisions\/6129"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media\/6128"}],"wp:attachment":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media?parent=6127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/categories?post=6127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/tags?post=6127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}