{"id":15373,"date":"2020-08-27T14:52:07","date_gmt":"2020-08-27T14:52:07","guid":{"rendered":"http:\/\/www.felana.com.mx\/eng\/3-new-cybersecurity-threats-shippers-businesses-need-to-watch-for\/"},"modified":"2020-08-27T14:52:07","modified_gmt":"2020-08-27T14:52:07","slug":"3-new-cybersecurity-threats-shippers-businesses-need-to-watch-for","status":"publish","type":"post","link":"https:\/\/www.felana.com.mx\/eng\/3-new-cybersecurity-threats-shippers-businesses-need-to-watch-for\/","title":{"rendered":"3 New Cybersecurity Threats Shippers &#038; Businesses Need to Watch For"},"content":{"rendered":"<p>The world of cybersecurity is constantly changing. Attackers are always looking for new exploits or loopholes in the latest software or operating systems, and are utilizing new psychosocial tactics to gain access to vulnerable information through people at lucrative businesses. That\u2019s why it\u2019s critical for shippers and other businesses to always be on the lookout for the latest threats. It is important to understand how hackers may use these new techniques and find ways to counteract them before any information is leaked. Here, you\u2019ll find three cybersecurity threats that are predicted to be on the rise in 2020 and some suggestions on how to counteract these threats in the world of shipping and beyond.<\/p>\n<h4><span style=\"color: #ff6600;\">1. Internet of Things Attacks<\/span><\/h4>\n<p>The Internet of Things (or IoT, for short) is the various smart devices in any given space that are connected to the same network. The smart devices in use could be anything from in-home speakers to Google Homes and Amazon Echos. Because more and more households now have at least one smart device, more hacking groups have turned to these as points of entry into networks. Even more importantly, many businesses have IoT devices \u2013 usually smart thermostats or communication hubs.<\/p>\n<p>These devices could offer highly valuable entry points for hackers since they could sneak malware or security bypasses onto these devices with simple exploits. While relatively few major hacks have occurred on IoT networks to date, as more devices are added to networks in homes and businesses, these places become increasingly enticing \u2013 potentially leading to an uptick in hacking attempts in 2020.<\/p>\n<p>To counteract IoT-based hacks, there are a few simple steps to take. Make sure your IoT devices are provided by reputable companies with easily accessible firmware updates. These companies will roll out updates relatively quickly when exploits are revealed. You should also make sure to consistently check for firmware updates across IoT devices to make sure that everything is up to date, as older versions are more likely to have exploitable code. Finally, make sure that you keep track of all IoT devices connected to your local network. Regularly evaluate whether the cost of security burdens caused by a \u00a0device are outweighed by the benefits to your home or business, and remove devices that may be causing unnecessary security risks as you go.<\/p>\n<h4><span style=\"color: #ff6600;\">2. Supply Chain Intrusions<\/span><\/h4>\n<p>While supply chains have always been a weak point in cybersecurity due to the interfacing of multiple companies with different security protocols, 2020 may see more intrusions in these supply chains. As supply chain management gets increasingly digitized, more opportunities for data breaches are likely. Furthermore, some supply chain companies rely on contract work for their labor and data management. Contract workers generally are less invested in company security and are less likely to be briefed on secure management practices; a double-hitter that\u2019s likely to cause more problems for security than before.<\/p>\n<p>To work against these supply chain breaches, streamline your security access as much as possible. As more and more contract workers come into the system, you\u2019ll need to figure out exactly what information each of those workers needs to access. For example, a lax protocol may give a material loading worker access to delivery shipment points. But why would those loading workers need that information if they are provided loading directions already? Finding points of access (like the one used by loading workers in this instance) and patching them will allow you to reduce the chance of security intrusions significantly.<\/p>\n<h4><span style=\"color: #ff6600;\">3. Insider Threats<\/span><\/h4>\n<p>One of the most insidious and potentially harmful hacks that companies face in 2020 is insider exploitation. Insider attacks come in two categories, with some intending to be extremely malicious and others simply resulting from sloppy practices by a few employees. In some cases, employees will have a specific plan to exploit data sources or hold back important information for a payout. They will siphon off information or money with their knowledge of security protocols and insider company information, giving them an edge over ordinary hackers. Alternatively, some employees may not follow security protocols as necessary \u2013 allowing hackers entry to sensitive information simply because the employees were careless in their data management.<\/p>\n<p>Counteracting these attacks relies almost entirely on proper business management and instilling good values in employees. Upon first hiring a new employee, managers should instill good data management practices, and regularly screen those employees early to ensure protocols are maintained. For the more insidious, carefully acted-out insider plans, less can be done upfront. Instead, companies should try to maintain positive values and ethics at the corporate and individual employee level while still giving employees the freedom to understand why the company is taking certain actions. Insider breaches tend to happen when employees strongly disagree with the actions of a company, so staying away from these morally ambiguous areas could help significantly.<\/p>\n<p>Cybersecurity is a growing field, and understanding the threats that companies face in the digital realm is an important aspect of any company\u2019s business plan \u2013 not just those in the shipping world. The three threats discussed here pose big problems for companies and individuals in 2020. If you can identify these issues, you can save millions of dollars in lost revenue.<\/p>\n<h4><span style=\"color: #ff6600;\">With this information, you\u2019ll be well-informed and ready to enact new protocols or remind employees about these threats this year in the world of shipping and beyond.<\/span><\/h4>\n<div class=\"essb_links essb_counters essb_displayed_bottom essb_share essb_template_metro-retina essb_2037487216 print-no\" id=\"essb_displayed_bottom_2037487216\" data-essb-postid=\"15078\" data-essb-position=\"bottom\" data-essb-button-style=\"button\" data-essb-template=\"metro-retina\" data-essb-counter-pos=\"insidebeforename\" data-essb-url=\"https:\/\/www.morethanshipping.com\/three-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for\/\" data-essb-fullurl=\"https:\/\/www.morethanshipping.com\/three-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for\/\" data-essb-instance=\"2037487216\">\n<ul class=\"essb_links_list\">\n<li class=\"essb_item essb_totalcount_item\" data-counter-pos=\"insidebeforename\"><span class=\"essb_totalcount essb_t_l_big\" title=\"\" data-shares-text=\"shares\"><span class=\"essb_t_nb\">24<span class=\"essb_t_nb_after\">shares<\/span><\/span><\/span><\/li>\n<li class=\"essb_item essb_link_facebook nolightbox\"> <a href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.morethanshipping.com%2Fthree-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for%2F&#038;t=3+New+Cybersecurity+Threats+Shippers+%26amp%3B+Businesses+Need+to+Watch+For\" title=\"Share on Facebook\" onclick=\"essb.window(&#39;https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.morethanshipping.com%2Fthree-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for%2F&#038;t=3+New+Cybersecurity+Threats+Shippers+%26amp%3B+Businesses+Need+to+Watch+For&#39;,&#39;facebook&#39;,&#39;2037487216&#39;); return false;\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" class=\"nolightbox\"><span class=\"essb_icon essb_icon_facebook\"><\/span><span class=\"essb_network_name\"><span class=\"essb_counter_insidebeforename\" data-cnt=\"6\" style=\"display: none;\" data-cnt-short=\"6\">6<\/span>Facebook<\/span><\/a><\/li>\n<li class=\"essb_item essb_link_linkedin nolightbox\"> <a href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;ro=true&#038;trk=EasySocialShareButtons&#038;title=3+New+Cybersecurity+Threats+Shippers+%2526amp%253B+Businesses+Need+to+Watch+For&#038;url=https%3A%2F%2Fwww.morethanshipping.com%2Fthree-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for%2F\" title=\"Share on LinkedIn\" onclick=\"essb.window(&#39;https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;ro=true&#038;trk=EasySocialShareButtons&#038;title=3+New+Cybersecurity+Threats+Shippers+%2526amp%253B+Businesses+Need+to+Watch+For&#038;url=https%3A%2F%2Fwww.morethanshipping.com%2Fthree-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for%2F&#39;,&#39;linkedin&#39;,&#39;2037487216&#39;); return false;\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" class=\"nolightbox\"><span class=\"essb_icon essb_icon_linkedin\"><\/span><span class=\"essb_network_name\"><span class=\"essb_counter_insidebeforename\" data-cnt=\"18\" style=\"display: none;\" data-cnt-short=\"18\">18<\/span>LinkedIn<\/span><\/a><\/li>\n<li class=\"essb_item essb_link_twitter nolightbox\"> <a href=\"https:\/\/www.morethanshipping.com\/three-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for\/#\" title=\"Share on Twitter\" onclick=\"essb.window(&#39;https:\/\/twitter.com\/intent\/tweet?text=3%20New%20Cybersecurity%20Threats%20Shippers%20%26%20Businesses%20Need%20to%20Watch%20For&#038;url=https%3A%2F%2Fwww.morethanshipping.com%2Fthree-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for%2F&#038;counturl=https%3A%2F%2Fwww.morethanshipping.com%2Fthree-new-cybersecurity-threats-shippers-and-businesses-need-to-watch-for%2F&#39;,&#39;twitter&#39;,&#39;2037487216&#39;); return false;\" target=\"_blank\" rel=\"nofollow noopener noreferrer\" class=\"nolightbox\"><span class=\"essb_icon essb_icon_twitter\"><\/span><span class=\"essb_network_name\"><span class=\"essb_counter_insidebeforename\" data-cnt=\"0\" style=\"display: none;\" data-cnt-short=\"0\">0<\/span>Twitter<\/span><\/a><\/li>\n<li class=\"essb_item essb_link_mail nolightbox\"> <a href=\"http:\/\/www.morethanshipping.com\/cdn-cgi\/l\/email-protection#c9f6babcaba3acaabdf490a6bcecfbf984a0aea1bdecfbf98bacecfbf980a7bdacbbacbabdacadecfbf9a0a7ecfbf99da1a0baecfbf984a6bbac9da1a8a79aa1a0b9b9a0a7aee7aaa6a4ecfbf988bbbda0aaa5acefa8a4b9f2aba6adb0f481a0ecfb8aecf98decf988ecf98decf98880ecfbf9bda1a6bcaea1bdecfbf9bda1a0baecfbf9a8bbbda0aaa5acecfbf9a6a7ecfbf984a6bbac9da1a8a79aa1a0b9b9a0a7aee7aaa6a4ecfb8aecfbf9a6a7acecfbf9a6afecfbf9bda1acecfbf9beacabecfbfebaecfbf9bda6b9ecfbf9f8f9ecfbf9a4a6babdecfbf9bfa0baa0bdacadecfbf9a5a6aea0babda0aabaecfbf9a8a7adecfbf9baa1a0b9b9a0a7aeecfbf9aba5a6aebaecfb8aecfbf9a4a0aea1bdecfbf9abacecfbf9a0a7bdacbbacbabda0a7aeecfbf9bda6ecfbf9b0a6bcecfa88ecf98decf988faecfbf987acbeecfbf98ab0abacbbbaacaabcbba0bdb0ecfbf99da1bbaca8bdbaecfbf99aa1a0b9b9acbbbaecfbf9ecfbffecfbf98bbcbaa0a7acbabaacbaecfbf987acacadecfbf9bda6ecfbf99ea8bdaaa1ecfbf98fa6bbecfbf8ecf98decf98885a0a7a2ecfa88ecfbf9a1bdbdb9baecfa88ecfb8fecfb8fbebebee7a4a6bbacbda1a8a7baa1a0b9b9a0a7aee7aaa6a4ecfb8fbda1bbacace4a7acbee4aab0abacbbbaacaabcbba0bdb0e4bda1bbaca8bdbae4baa1a0b9b9acbbbae4a8a7ade4abbcbaa0a7acbabaacbae4a7acacade4bda6e4bea8bdaaa1e4afa6bbecfb8fecf98decf988ecf98decf98881a8bfacecfbf9a8ecfbf9aebbaca8bdecfbf9ada8b0ecfbf8\" title=\"Share on Email\" onclick=\"essb.tracking_only('', 'mail', '2037487216', true);\" target=\"_self\" rel=\"nofollow noopener noreferrer\" class=\"nolightbox\"><span class=\"essb_icon essb_icon_mail\"><\/span><span class=\"essb_network_name\"><span class=\"essb_counter_insidebeforename\" data-cnt=\"0\" style=\"display: none;\" data-cnt-short=\"0\">0<\/span>Email<\/span><\/a><\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The world of cybersecurity is constantly changing. Attackers are always looking for new exploits or loopholes in the latest software or operating systems, and are utilizing new psychosocial tactics to gain access to vulnerable information through people at lucrative businesses. That\u2019s why it\u2019s critical for shippers and other businesses to always be on the lookout [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15374,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/posts\/15373"}],"collection":[{"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/comments?post=15373"}],"version-history":[{"count":0,"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/posts\/15373\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/media\/15374"}],"wp:attachment":[{"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/media?parent=15373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/categories?post=15373"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.felana.com.mx\/eng\/wp-json\/wp\/v2\/tags?post=15373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}