On Sep. 28, carrier CMA CGM became the victim of a ransomware cyberattack, and it took a while for the company to resume services on its website. As the carrier’s peripheral servers were affected, the company decided to disconnect the service applications in an attempt to limit the scope of the attack. This created a large-scale disruption for customers. Even now, the long-term impact this will have on the carrier’s relationship with customers is yet to be known.
Cybersecurity on the riseThe frequency of cyberattacks in the logistics and transportation industry is increasing. Well-known victims of cyberattacks include Maersk, Deutsche Bahn, and FedEx—and these are just the tip of the iceberg. IT professionals in logistics and transportation companies can no longer neglect these attacks and their ramifications; thus, every company should be looking into technologies that can help protect them.Outdated systems might be easy targets for cybercriminals. In other words, they have a higher chance of experiencing a data breach, as exemplified by the recent CMA CGM incident. Typically, when a company’s devices are attacked, a tiny application will quietly encrypt everything it can access. The result is that the company is blocked from the encrypted data unless a ransom is paid (usually in Bitcoin). According to Verizon’s 2020 Data Breach Investigations Report, almost 50% of breaches are perpetrated through ransomware and phishing. These malware attacks are usually done by planting malicious applications in phishing emails with infected web links or attachments.
There’s something you can do to prevent thisPaying the ransom doesn’t solve the problem and there isn’t any single software that can protect you from every attack. And, the criminal software engineers are constantly coming up with new ransomware by taking advantage of various system vulnerabilities. However, there are still many things companies can do to protect themselves against this kind of attack.
- Instead of building a wall of defense that is still vulnerable to cyberattacks, companies should regularly back up data. This way, you can immediately reset your devices and restore the data afterward without compromising the integrity of your data.
- Employees must always be vigilant when receiving suspicious emails. Be sure they are trained that, when they receive an email from an unknown sender, check the email address and don’t click on any links in that email.