Trucks at Work

New data defenses may be needed

Nothing stays static very long in the digital world, especially when it comes to the nefarious activities of hackers and cyber criminals.

So even if you think your electronic network defenses are good and strong today, they could very well be compromised tomorrow, simply because efforts to breach them never cease.

That’s one of the findings from a new report dubbed Defending Data: An Inside Look at How Corporate Security Officials Are Navigating a Constantly Shifting Information Landscape, penned by Ari Kaplan Advisors (AKA) and sponsored by technology firm Nuix (click here to download a copy of it.)

Those worries are especially true in trucking as the successful and safe movement of freight increasingly relies on the transference of accurate and secure data.

Ari Kaplan, the report’s author and principal researcher, noted that companies are now focusing on ways to “balance” data breach prevention with post-breach remediation.

“We also noted increasing collaboration between security specialists and data owners, and a growing tension between enhancing productivity and strengthening security,” he said. “We also found that there is a strong consensus among security professionals and experts that perimeter defense is no longer a sufficient information security strategy.”

Here are some more findings from AKA and Nuix’s report:

  • Nearly three-quarters (73%) of respondents said their cybersecurity needs had changed in the past 12 months and 69% said they expected them to change again in the next year.
  • As a result, 27% of respondents said they formally reassessed their cybersecurity needs quarterly, and a further 31% did so annually.
  • Information security officers and data custodians would need to share responsibility for knowing where different pieces of sensitive information were kept and ensuring that they were stored securely. Such collaboration was a daily event for 23% of survey participants, and at least monthly for 54%.
  • The increasing use of mobile and personal devices to access corporate systems are “expanding” the digital security perimeter beyond what any corporation can control, introducing threats that firms cannot fully monitor, the study found
  • Yet while 96% of respondents said their companies allowed remote access to systems, only 69% had formal “bring your own device” or BYOD policies in place, with the remainder allowing such activity to go unmanaged.

“This report confirms and clarifies what we’ve been hearing in the marketplace, that information security is undergoing a profound change and entering a new phase,” noted Jim Kent, Nuix’s global head of investigations and cybersecurity.

“We’ll be very interested to see how this transformation works its way through the business community as we repeat this benchmarking survey next year and into the future,” he added.

So will the trucking industry, as well, methinks.

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.