We use cookies to provide you with a better experience. By continuing to browse the site you are agreeing to our use of cookies in accordance with our Cookie Policy.
  • INDUSTRY PRESS ROOM
  • ABOUT
  • CONTACT
  • MEDIA FILE
  • Create Account
  • Sign In
  • Sign Out
  • My Account
Free Newsletters
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • Parcel Forum 2022
    • MODEX 2022
    • Upload Your Video
  • MAGAZINE
    • Current Issue
    • Archives
    • Digital Edition
    • Subscribe
    • Newsletters
    • Mobile Apps
  • TRANSPORTATION
  • MATERIAL HANDLING
  • TECHNOLOGY
  • LIFT TRUCKS
  • PODCAST ETC
    • Podcast
    • Webcasts
    • Blogs
      • One-Off Sound Off
      • Global Logistics and Risk
      • Empowering Your Performance Edge
      • Analytics & Big Data
      • Submit your blog post
    • Events
    • White Papers
    • Industry Press Room
      • Upload Your News
    • New Products
      • Upload Your Product News
    • Conference Guides
    • Conference Reports
    • Newsletters
    • Mobile Apps
  • DCV-TV
    • DCV-TV 1: News
    • DCV-TV 2: Case Studies
    • DCV-TV 3: Webcasts
    • DCV-TV 4: Viewer Contributed
    • DCV-TV 5: Solution Profiles
    • Parcel Forum 2022
    • MODEX 2022
    • Upload Your Video
Home » Defend your DC network
techwatch

Defend your DC network

March 11, 2013
James A. Cooke
No Comments

With the flow of information as crucial as the flow of goods and materials in a distribution operation today, it's vital that the information network be secure from cyberattacks. That's why a recent report on the growing danger of advanced persistent threats (APTs) should serve as a red flag for logistics managers.

APTs are an espionage tactic used by hackers and cyberterrorists to steal intellectual property from a company's computer systems. A recent survey of more than 1,500 security professionals conducted by ISACA (formerly the Information Systems Audit and Control Association) found that these types of attacks are on the rise. In fact, more than one in five survey respondents said their enterprise had experienced an APT attack.

What makes this particularly worrisome, according to ISACA, is that APTs pose a much greater danger to enterprises than "traditional" threats. "APTs are sophisticated, stealthy, and unrelenting," said Christos Dimitriadis, international vice president of ISACA, in a statement announcing the publication of the report, Advanced Persistent Threat Awareness: Study Results. "Traditional cyberthreats often move right on if they cannot penetrate their initial target, but an APT will continually attempt to penetrate the desired target until it meets an objective – and once it does, it can disguise itself and morph when needed, making it difficult to identify or stop."

Examples of APT attacks include the recently reported incidents of cyberespionage by Chinese military hackers targeting corporations and the media. Although in many cases, the hackers are trying to steal corporate secrets, some are simply looking to cause mischief. "Sometimes, the motives of the attack are disruption of the business," says John Pironti, an adviser with ISACA. "Other times, it's disruption of reputation. They don't need to steal data to be successful."

Although logistics managers may think this problem is strictly an information technology issue, that's not the case, says Pironti. That's because these types of cyberattacks are being launched more often at supply chain and distribution networks.

What makes these networks an attractive target has largely to do with access, Pironti says. Hackers have figured out that they can sometimes gain entry to a designated company's IT system by exploiting its network connections. That is, instead of attacking the company's computer system directly, they'll try to sneak in through the information connections it has with suppliers or carriers. "A small guy will be less protected than the big guy," he explains. "If I can't get into the manufacturer, let me see who they are working with and get in through that entry point."

In fact, Pironti says he knows of at least 10 cases where hackers have broken into logistics software to place phony customer orders. The company is then forced to go in and root out the fake orders, which results in a slowdown in its distribution operation and impairs its ability to ship orders on time.

To avoid those types of situations, logistics managers need to help ensure the "data integrity" of orders received for fulfillment and shipping to make sure that the "senders are who they say they are." Pironti says information transmissions should be encrypted as a safety precaution.

So, what additional advice does the security expert have for logistics managers? Pironti says that DC managers need to adopt a "trust but verify" approach for information exchanges with suppliers and carriers. On a regular basis, managers should check with their software vendors and ask for proof that monitoring systems are in place and up to date to safeguard against hacking. "People have to stop believing that they are not a target for hackers," he says. "You have to create a culture that's risk aware."

Technology
  • Related Articles

    Is your DC struggling with fulfillment? Consider DOM software

    Does your DC need wider vision?

    Software that tracks your carbon (so you can cut it)

Jamescooke
James Cooke is a principal analyst with Nucleus Research in Boston, covering supply chain planning software. He was previously the editor of CSCMP?s Supply Chain Quarterly and a staff writer for DC Velocity.

Recent Articles by James Cooke

Getting smart about using software intelligence

Where's the payback in software?

R is for "robot": interview with Tom Bonkenburg

You must login or register in order to post a comment.

Report Abusive Comment

Most Popular Articles

  • Big and bulky last-mile delivery segment set for hot growth

  • Outlook 2023: What’s in store for logistics/supply chain?

  • Ports, maritime operators see tide turning as ocean freight tsunami subsides

  • In Person: Steve Beverly of Penske

  • InPerson interview: Rob McKeel of Fortna

Now Playing on DCV-TV

89cfed30 8aac 4284 960d c8c8c1886e16

Have you checked your read rate lately?

DCV-TV 4: Viewer Contributed
No reads. Unaccounted for boxes. Boxes sent to the wrong place. A logistics nightmare! But this nightmare doesn’t have to come true. SICK’s linear line scan camera is what dreams are made of for your logistics operations. And if you’re worried about motion and vibration from conveyor belts...well, there’s no reason...

FEATURED WHITE PAPERS

  • The five best applications for robotic lift trucks in warehouse environments

  • Fulfillment Facility Improved Efficiencies by 4x

  • 3PLs: Complete Orders Faster with Flexible Automation

  • Reusable Packaging for the New Wave of Supply Chain Automation

View More

Subscribe to DC Velocity Magazine

GET YOUR FREE SUBSCRIPTION
  • SUBSCRIBE
  • NEWSLETTERS
  • ADVERTISING
  • CUSTOMER CARE
  • CONTACT
  • ABOUT
  • STAFF
  • PRIVACY POLICY

Copyright ©2023. All Rights ReservedDesign, CMS, Hosting & Web Development :: ePublishing