{"id":3696,"date":"2018-11-09T00:00:00","date_gmt":"2018-11-09T00:00:00","guid":{"rendered":"https:\/\/www.bilogistik.com\/cybersecurity-challenges-in-logistics-and-transport\/"},"modified":"2021-11-18T12:35:43","modified_gmt":"2021-11-18T12:35:43","slug":"cybersecurity-logistics-transport","status":"publish","type":"post","link":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/","title":{"rendered":"Cybersecurity challenges in logistics and transport"},"content":{"rendered":"<p>There are many, ever-changing challenges in the transport sector. With this reality in mind, last 30 October Madrid hosted a workshop entitled <strong><u><a href=\"http:\/\/www.unologistica.org\/wp-content\/uploads\/programaciberseguridadoct2018v1opt.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cCybersecurity in Logistics and Transport\u201d<\/a><\/u>. <\/strong>Promoted by the <em>Organizaci\u00f3n Empresarial de la Log\u00edstica y el Transporte<\/em> (Logistics and Transport Business Organisation) (UNO), companies and players from the industry met to address the issue in depth.<\/p>\n<p>One of the main focuses was the <strong>European Cybersecurity Directive<\/strong>, analysing its requirements and the measures set forth by the law to protect and manage incidents of this type throughout the logistics chain. <strong>Cyber Crime in the Transport Sector<\/strong> was the other star topic of the meeting, handled from a more practical point of view, with real examples.<\/p>\n<h2>Debates and success stories<\/h2>\n<p>The event was <strong>inaugurated by the secretary general of UNO, Francisco Armada<\/strong>.\u00a0 Next, the <strong>head of the Cybersecurity Service and OCC of the CNPIC, Alberto Francoso Figueredo<\/strong> shed light on the Spanish situation with the aforementioned European cybersecurity directive.\u00a0 Following, a <strong>speech was given by the director of Commercial Cybersecurity at Minsait, Carlos Fern\u00e1ndez Mart\u00ednez<\/strong>, where he mentioned protective and management measures against possible cyber incidents in logistics.<\/p>\n<p>Halfway through the morning, guests attended a <strong>debate table<\/strong> addressing <strong>cybersecurity challenges for companies in the logistics sector<\/strong>. This panel had speakers such as the head of Information Security for Correos (Spanish post), Jes\u00fas Garc\u00eda, the vice-president of Ceva Logistics, Pedro Luis de las Heras, and more.<\/p>\n<p>The programme continued with a <strong>talk by Alberto Redondo S\u00e1nchez<\/strong>, captain of the <strong>Technological Crime Group with the Civil Guard<\/strong> and a presentation of a <strong>success story in cybersecurity with a big retail client<\/strong>, given by Jos\u00e9 Mar\u00eda Blanco, director of Strategic Intelligence for Prosegur Ciberseguridad. A <strong>debate<\/strong> with Mahou and Bonduelle on <strong>how companies are tackling cybersecurity in the supply chain<\/strong> ended the conference before a round of conclusions.<\/p>\n<h2>Cybercrime, a pressing challenge for the logistics sector<\/h2>\n<p>Cybercrime is a plague <strong>catching many companies by surprise<\/strong>. The massive cyber-attack in May 2017 with the <strong>Wannacry virus jeopardised the world economy,<\/strong> affecting both small companies and large corporations. This threw <strong>many sectors into turmoil, such as the logistics sector<\/strong>. They began working for more ironclad security.<\/p>\n<p><strong>But, what kind of attacks are we talking about?<\/strong> Cyber criminals&#8217; favourites would fall under <strong>social engineering<\/strong>, manipulating the behaviour of legitimate users to obtain confidential information. Thus, through the employees of a company and <strong>tactics such as phishing<\/strong>, they can create huge security breaches.<\/p>\n<p><strong>Transport and logistics companies<\/strong> are not especially vulnerable to this kind of attack. In fact, it is estimated that they are better-prepared than the average. However, given the data that they handle, <strong>they form part of critical infrastructures<\/strong>, according to the <em><u><a href=\"http:\/\/www.cnpic.es\/en\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Centro Nacional para la Protecci\u00f3n de Infraestructuras Cr\u00edticas (National Centre for the Protection of Critical Infrastructures) (CNPIC)<\/a><\/u><\/em>, so they <strong>are a more appetising target for cyber criminals<\/strong> and cyber terrorists.<\/p>\n<h2>Training, essential in the fight against cyber crime<\/h2>\n<p>One part in the fight against cybercrime is IT. There are practises that reduce risk, such as <strong>updating equipment with the latest manufacturer security patches<\/strong>, having adequate protection tools, such as antiviruses and anti-malware and firewalls, or making periodical security backup copies of information, especially sensitive information.<\/p>\n<p>However, <strong>the most fundamental step <\/strong>to attain a secure business setting <strong>lies in educating<\/strong> staff. Recognising fraudulent strategies leads people to avoid downloading malware to company servers. Workers must be taught to: not open attachments to emails that look suspicious, to be cautious when following links that come through emails, instant messages and social media, even if they come from known contacts, and, in short, to be able to <strong>distinguish trusted sources<\/strong> from those that are.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d. An event with debates, sucess stories and lectures about how to stop cybercrime.<\/p>\n","protected":false},"author":1,"featured_media":4071,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[63],"tags":[],"class_list":["post-3696","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity challenges in logistics and transport | Bilogistik<\/title>\n<meta name=\"description\" content=\"Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity challenges in logistics and transport | Bilogistik\" \/>\n<meta property=\"og:description\" content=\"Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/\" \/>\n<meta property=\"og:site_name\" content=\"Bilogistik\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-09T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-18T12:35:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bilogistik.com\/wp-content\/uploads\/2018\/11\/retos-ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"169\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"aukera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"aukera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/\"},\"author\":{\"name\":\"aukera\",\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/#\\\/schema\\\/person\\\/8f8070aa02dac2496b42201c978a72a6\"},\"headline\":\"Cybersecurity challenges in logistics and transport\",\"datePublished\":\"2018-11-09T00:00:00+00:00\",\"dateModified\":\"2021-11-18T12:35:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/\"},\"wordCount\":621,\"image\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bilogistik.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/retos-ciberseguridad.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/\",\"url\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/\",\"name\":\"Cybersecurity challenges in logistics and transport | Bilogistik\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bilogistik.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/retos-ciberseguridad.jpg\",\"datePublished\":\"2018-11-09T00:00:00+00:00\",\"dateModified\":\"2021-11-18T12:35:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/#\\\/schema\\\/person\\\/8f8070aa02dac2496b42201c978a72a6\"},\"description\":\"Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/cybersecurity-logistics-transport\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bilogistik.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/retos-ciberseguridad.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bilogistik.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/retos-ciberseguridad.jpg\",\"width\":300,\"height\":169},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/\",\"name\":\"Bilogistik\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/#\\\/schema\\\/person\\\/8f8070aa02dac2496b42201c978a72a6\",\"name\":\"aukera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f12d2bd352b85c793ba729bdcaa57bb70770411cd2409d9fe891e98eb00b772d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f12d2bd352b85c793ba729bdcaa57bb70770411cd2409d9fe891e98eb00b772d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f12d2bd352b85c793ba729bdcaa57bb70770411cd2409d9fe891e98eb00b772d?s=96&d=mm&r=g\",\"caption\":\"aukera\"},\"sameAs\":[\"https:\\\/\\\/www.bilogistik.com\"],\"url\":\"https:\\\/\\\/www.bilogistik.com\\\/en\\\/blog\\\/author\\\/aukera\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity challenges in logistics and transport | Bilogistik","description":"Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity challenges in logistics and transport | Bilogistik","og_description":"Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d.","og_url":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/","og_site_name":"Bilogistik","article_published_time":"2018-11-09T00:00:00+00:00","article_modified_time":"2021-11-18T12:35:43+00:00","og_image":[{"width":300,"height":169,"url":"https:\/\/www.bilogistik.com\/wp-content\/uploads\/2018\/11\/retos-ciberseguridad.jpg","type":"image\/jpeg"}],"author":"aukera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"aukera","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/#article","isPartOf":{"@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/"},"author":{"name":"aukera","@id":"https:\/\/www.bilogistik.com\/en\/#\/schema\/person\/8f8070aa02dac2496b42201c978a72a6"},"headline":"Cybersecurity challenges in logistics and transport","datePublished":"2018-11-09T00:00:00+00:00","dateModified":"2021-11-18T12:35:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/"},"wordCount":621,"image":{"@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bilogistik.com\/wp-content\/uploads\/2018\/11\/retos-ciberseguridad.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/","url":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/","name":"Cybersecurity challenges in logistics and transport | Bilogistik","isPartOf":{"@id":"https:\/\/www.bilogistik.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/#primaryimage"},"image":{"@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bilogistik.com\/wp-content\/uploads\/2018\/11\/retos-ciberseguridad.jpg","datePublished":"2018-11-09T00:00:00+00:00","dateModified":"2021-11-18T12:35:43+00:00","author":{"@id":"https:\/\/www.bilogistik.com\/en\/#\/schema\/person\/8f8070aa02dac2496b42201c978a72a6"},"description":"Last 30 October Madrid hosted a workshop entitled \u201cCybersecurity in Logistics and Transport\u201d.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bilogistik.com\/en\/blog\/cybersecurity-logistics-transport\/#primaryimage","url":"https:\/\/www.bilogistik.com\/wp-content\/uploads\/2018\/11\/retos-ciberseguridad.jpg","contentUrl":"https:\/\/www.bilogistik.com\/wp-content\/uploads\/2018\/11\/retos-ciberseguridad.jpg","width":300,"height":169},{"@type":"WebSite","@id":"https:\/\/www.bilogistik.com\/en\/#website","url":"https:\/\/www.bilogistik.com\/en\/","name":"Bilogistik","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bilogistik.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.bilogistik.com\/en\/#\/schema\/person\/8f8070aa02dac2496b42201c978a72a6","name":"aukera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f12d2bd352b85c793ba729bdcaa57bb70770411cd2409d9fe891e98eb00b772d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f12d2bd352b85c793ba729bdcaa57bb70770411cd2409d9fe891e98eb00b772d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f12d2bd352b85c793ba729bdcaa57bb70770411cd2409d9fe891e98eb00b772d?s=96&d=mm&r=g","caption":"aukera"},"sameAs":["https:\/\/www.bilogistik.com"],"url":"https:\/\/www.bilogistik.com\/en\/blog\/author\/aukera\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/posts\/3696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/comments?post=3696"}],"version-history":[{"count":0,"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/posts\/3696\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/media\/4071"}],"wp:attachment":[{"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/media?parent=3696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/categories?post=3696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bilogistik.com\/en\/wp-json\/wp\/v2\/tags?post=3696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}