Cyber Attacks are You Prepared

Cyber Attacks are You Prepared

Today the buzz within the Global World of Commerce is Digitalization and how to keep business flowing as we start to emerge from the Covid Pandemic, its been a very trying time for companies to keep staff engaged and processes and projects moving forward. Technology has been a life saver to the global economy, but there lies the problem, as a dark criminal element hides within the worldwide web, as they surf the internet looking for prime targets, they look to strike companies, they seek to cause maximum disruption, potential data thefts and of course any angle to wreak financial panic is all in these criminal's minds. Of course there are others out there that just thrive on the fact that they can infiltrate a Global Companies Networks, getting massive press coverage and a form of notoriety within their dark web colleagues as they notch up another mark in their cyber thrills.

Whatever drives these Cyber Attackers, the impact to global companies is significant, we have already seen some of the worlds leading Transportation and Logistics companies been hacked creating a tsunami effect across their Overall Supply Chain, as the impact rarely stops at their doors and filters across their multiple vendors and customers. The Global Transportation Markets are ripe for attack and recent reports and statistics highlight these threats and the reality that can be created by such break downs in networks and systems .

Given the fact that the world is looking at becoming more autonomous in nature with limited or zero human intervention one can imagine what levels of security will need to be adopted to ensure that the hackers are kept at bay.

Lets take an Autonomous Vessel and the potential threats a Cyber attack could accomplish

  • Taking total control over the Vessel
  • Emptying Fuel Tanks into the Ocean causing an environmental hazard
  • Shutting down the Engines, causing potential fires on the vesse
  • Diverting Vessel from its set course and hijacking the Vessel via a Cyber Attack
  • Vessel Spoofing
  • Causing the Vessel to strike the Ports facilities or scuttling and emptying ballast tanks to create a natural barrier within the Ports harborside or in the main navigational channels entering the port.
  • Taking over and ramming the vessel into other vessels causing massive chaos, potential loss of life and financial impacts.

The list is endless in terms of the threats. If you look at a port facility massive chaos could be felt by an attack with such areas as :-

  • Shutting down Automated Machinery
  • Shutting down the Ports Radar and Communication Networks
  • Shutting down the Digital Bouys and Marker beacons for inbound Vessels navigating the channels.
  • Infiltrating the Terminals Operating Systems and changing all work orders, load sequences and mixing up the manifests and container and cargo destinations could cause massive chaos. Shutting down all Power and Utilities across the Port, could have a major impact.
  • Shutting down all the Ports Security Systems.
  • Emptying fuel tanks and causing natural ecology issues across the Port.
  • Shutting down all automated gates causing massive congestion and chaos in the Inland Supply Chain.
  • Stealing vital data on cargo, looking to extract and attack customer details and any financial data stored within the various ERP systems running,

These costs could run into the Billions, in reoccurring issues for the Operators concerned. With Ports already under tremendous operational pressure to try and clear the backlog of containers and ships that are queuing to enter certain Ports across the globe, a Cyber Attack would be catastrophic for the Port.

So after painting a rather grime picture doesn't mean that its all doom and gloom, Companies must take Cyber Defence seriously, having firewalls, and levels of security are all great starting points, but continual monitoring, external and internal audits, staff protocols and procedures must be adhered to, allocating a sizeable amount of your Annual IT budgets must become a priority, so many companies feel that if they haven't been attacked then the potential threat is minimal. But one must note that many Company Insurance Policies do not always cover for certain technology attacks, many threats might be brought into your network from your Vendors Software patches or upgrades, Staff can also be a major hurdle as they can access emails or bring in viruses from external sources.

@GRHombus we take a very logical method in checking and verifying your networks, we look at testing and breaking networks and solutions, with the key aim of highlighting vulnerability and opportunities where the Cyber Criminals could enter or attack. We provide technology audits, We check 3rd party Vendor solutions, We verify networks, inter, intra and cloud based solutions, We test any mobility and Email solutions that allow access to your networks.

Our Cyber Security Team are some of the smartest experts, we thrive on challenges, we keep abreast of the latest threats and we look to introduce improved levels of security to ensure your systems are continually running and performing and the Cyber Criminals out in the cold.

We are so certain of our teams capabilities that we would provide an initial FREE "Proof Of Concept for our prospective clients, Our processes will take between 7 to 10 days and we would showcase what we have found, with recommendations a road map to strengthen your IT networks.

SO why wait, the Cyber Criminals are watching and waiting and will for certain strike when your company least expects it. We are here to help for a full detailed deck on our approach or to enter discussion about our "FREE POC" Then please drop myself a line @ [email protected] or our Cyber Security Director Sujay Chaurasia @ [email protected]? or check out oour website www.grhombustech.com

We look forward to hearing from you .

------------------------------------------"""""""""""""""""""-------------------------------------









Simon Barrett

Social Media Agency for content creators

3 年

Great post. Would be good to connect

回复
Steve T

IDaaS IGA | PAM - CIAM | Advisory | IAM a Simeio EMEA Partner Growth & Business Development at Simeio

3 年

Thanks for sharing Richard,interesting read and every reason to have your IAM and process in place to reduce the risks. Have a great weekend.

回复
Mandy Ward

Life Story Writing Advocate | Author Helping you write your legacy book - you’ve sorted your financials out now sort your ‘emotionals’. Click the Link in blue to start your Life Story - Use the Template £14 ??

3 年

It’s quite terrifying how reliant we are on tech now. No-one is immune.

要查看或添加评论,请登录

Richard Butcher的更多文章

社区洞察

其他会员也浏览了