Trucker 1329 Cyber3

Report: Hacking getting easier thanks to connected technologies

June 19, 2017
The “Internet of Things” found to be a growing source of cybersecurity weakness.

If you are worried that the connected technologies being adding to everything from cars to heavy trucks might be vulnerable to hacking, you’re not alone. For a recent survey of 139 chief information security officer (CISO) groups from 11 countries around the world found that such “hacking” is but one of growing worries regarding cybersecurity in the near future.

In the State of Cybersecurity Report 2017 compiled by consulting firm

Wipro Limited, there’s been an “alarming” increase in the number of electronic records stolen across the globe; a 53.6% spike from 2015 to 2016, according to the company’s survey.  

On top of that, 56% of breaches reported included the theft of user credentials or passwords, implying that further damage could be perpetrated using the stolen data.

The study found that a majority of the security products were themselves vulnerable to exploitation and CISOs will be required to keep track of vulnerabilities in the security products themselves, Wipro found.

Interestingly, the emergence of new Internet of Things (IoT) “surfaces” like connected cameras, cars, health and industrial automation devices is proving to be a great launch pad for the “hacking for hire” industry, the firm noted.

The emerging IoT devices come with a low memory and processing footprint and usually accommodate very little security capabilities including patching. Such devices, once “online” with an IP [internet protocol] address, are easy prey for sophisticated hacking syndicates.

As a result, those syndicates can develop custom malware to take control of IoT devices en masse and use them as a launch pad for cyber-attacks, Wipro said.

The report also noted that the responsibility for governance of data privacy is still highly centralized, lying with either the CIO, CISO or CPO for 71% of organizations, with the management of privileged access to data ranked as the highest control amongst data security needs.

About the Author

Sean Kilcarr | Editor in Chief

Sean previously reported and commented on trends affecting the many different strata of the trucking industry. Also be sure to visit Sean's blog Trucks at Work where he offers analysis on a variety of different topics inside the trucking industry.

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!

Sponsored Recommendations

Leveraging telematics to get the most from insurance

Fleet owners are quickly adopting telematics as part of their risk mitigation strategy. Here’s why.

Reliable EV Charging Solution for Last-Mile Delivery Fleets

Selecting the right EV charging infrastructure and the right partner to best solve your needs are critical. Learn which solution PepsiCo is choosing to power their fleet and help...

Overcoming Common Roadblocks Associated with Fleet Electrification at Scale

Fleets in the United States, are increasingly transitioning from internal combustion engine vehicles to electric vehicles. While this shift presents challenges, there are strategies...

Report: The 2024 State of Heavy-Duty Repair

From capitalizing on the latest revenue trends to implementing strategic financial planning—this report serves as a roadmap for navigating the challenges and opportunities of ...