Maritime Cyber Security Is Equally Important On Land

The last year has found maritime shipping in the firing line from the threat cyber attacks and port infrastructure has never before been under such strain. The combined challenges of COVID-19 and Brexit mean that freight volumes are at an all-time high which has caused significant backlog with importers struggling to obtain their goods and factories pausing manufacturing lines due to a shortage of component parts.

Although this is not the result of any kind of malicious activity, it has certainly highlighted the significant impact that port disruptions can have on the wider economy. 

With the global shipping industry already under pressure, and the UK facing new challenges in 2021 as the Brexit transition period has ended, addressing the risk to port infrastructure from cyber-attack has never been more critical. Different classes of attackers have different motivations, depending on their objectives, and these can vary both between groups and over time. 

Criminal groups have realised that there is money to be made from targeting a company or organisation, stealing data and/or disabling key systems and demanding a ransom payment to restore operation or prevent further disclosure of sensitive information. By causing huge disruption they hope to pressure their victims into paying out to quickly restore operations. Due to the critical nature of ports, and the publicity and knock-on effects of disruption, ports are an attractive target, and may be viewed as being more likely to pay up.

Ports play a significant role in the regulation of the flow of people and goods into and out of a country, something smuggling groups need to evade. By getting access to data and systems within the port, they can get information on goods movements, or attempt to amend records to evade taxes and excise duties.

Nation states are continuously looking to further their own aims. Information held by ports such as passenger movements, goods flows or operational techniques can be hugely revealing to help build a better picture of activity in a country or region. 
Additionally, nation-states may also carry out intrusive and purposefully destructive activity to disrupt the flow of goods into a country in the event of a diplomatic dispute or other conflict. 

The ways in which technology and automation have been rapidly adopted to improve port operations and efficiency can only be a good thing. However, it is important that as it is adopted, the risks that it might introduce are considered in a holistic, and realistic way, commensurate with the threats present in the maritime environment.

Maritime-Executive:         Hellenic Shipping News:        Lloyds Register:       Lloyds Register

You Might Also Read: 

Maritime Cyber Security Needs Shipping Companies to Focus:

 

« Creating A Data-Driven Business Culture
Britain Will Build Up Its Military Cyber Capabilities »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Yubico

Yubico

Yubico sets new global standards for simple and secure access to computers, mobile devices, servers, and internet accounts.

Red Sift

Red Sift

Red Sift is the only integrated cloud email and brand protection platform, supporting organizations to secure their communications.

DigitalXRaid

DigitalXRaid

DigitalXRAID is driven and motivated to ensure the bad guys don’t win. We’re dedicated to providing our clients with state-of-the-art cyber security solutions.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

Chainkit

Chainkit

Chainkit detects adversarial anti-forensic tampering techniques that attackers use to evade detection and prolong dwell times inside a system.

Cyphere

Cyphere

Cyphere is a cyber security company that helps to secure most prized assets of a business. We provide technical risk assessment (pen testing/ethical hacking) and managed security services.

Buchbinder Information Technology Solutions

Buchbinder Information Technology Solutions

Buchbinder Tunick & Company is a premier CPA and advisory firm offering a broad range of assurance, tax, business consulting and IT consulting services.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

BlockAPT

BlockAPT

BlockAPT, empowering you with an advanced, intelligent cyber defence platform. We protect our customers digital assets by unifying operational technologies against advanced persistent threats.

Tetrate.io

Tetrate.io

Tetrate Service Bridge provides enterprises with a consistent, unified way to connect and secure services across an entire mesh-managed environment.

Kingston Technology

Kingston Technology

Kingston is a leading global manufacturer of memory and storage solutions including encrypted storage solutions to protect data inside and outside the firewall.

Artjoker

Artjoker

Artjoker is a full cycle software development partner specialized in Blockchain projects and smart contract development including full cycle information security of all projects.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

InterSec Inc.

InterSec Inc.

InterSec Inc. is a cybersecurity company that offers a variety of services to small and medium-sized businesses including CMMC Compliance, Program Management, Governance, & Cybersecurity.

Red Maple Technologies

Red Maple Technologies

Started and run by engineers from the UK Intelligence and Defence communities, Red Maple is a technical consultancy and product company.

Sayers

Sayers

Sayers is best known for its ability to solve business challenges with IT solutions. Our areas of expertise include cloud, storage, virtualization, security, mobility and networking.