As transport operators continue to digitise their operations to improve communications, signalling, timetabling and passenger experience, they cannot afford to ignore the associated cyber security risks.
Organisations transporting goods and passengers across air, rail, road and sea need to ensure they maintain a strong cybersecurity posture by proactively identifying and addressing risks plus detecting and responding to threats swiftly and effectively.
Key challenges faced by organisations in the transport sector include:
• Maintaining continuity and safety of essential services and operations
• Improving aging and fragmented network infrastructure
• Protecting the personal data of passengers and clients
• Reducing cyber risks across the supply chain
• Balancing smart innovations and security
• Complying with NIS, PCI and GDPR requirements
The NIS Regulations require operators of essential services (OESs) to have security measures in place to mitigate cyber risks and protect the critical infrastructure on which we all rely. Many organisations in the transport sector are classified as OESs, and are regularly audited to ensure they are able to manage risks, defend against cyber-attacks and minimise the impact of security incidents.
Airlines, train operators and other private and public transport organisations that accept card payments also need to comply with the requirements of the PCI DSS. These include maintaining a secure network, implementing robust security policies, proactive threat monitoring and vulnerability management.
Any transport operator that processes personal information must also make efforts to protect it from unauthorised processing, loss or destruction under the requirements of the GDPR and DPA 2018. Non-compliance and failure to report breaches within the mandated 72 hours could lead to a large GDPR fine.
€20 million or 4% of global turnover (whichever is greater)
The maximum GDPR penalty for a cyber security breach.
Functioning as an extension of in-house IT resources, ThreatDetect™ is an award-winning MDR service supplying the capabilities needed to monitor, hunt for and remediate cyber-attacks and breaches 24/7.
Experience a real-world cyber-attack simulation to identify the weaknesses an attacker could exploit, quantify the value of data that could be exfiltrated and assess the effectiveness of security investments.
Our CREST-approved, fully customisable pen test engagements enable you to identify vulnerabilities and exposures in your infrastructure, applications, people and processes in order to reduce security risk.
"Redscan’s hands on approach identified security flaws that had previously been overlooked by other vendors"
"Redscan's cost effective service gives us peace of mind that we are doing all we can to protect our clients, our business, our staff, our counterparties and other partners"
"If you want a solution where someone will look after you 24/7 and give you a very flexible, professional and agile service – you want Redscan"
"We have been very impressed by the quality of Redscan’s engagement, communication and reporting. We will not hesitate to use them for any future testing requirements."
“Redscan has given us a third party stamp of approval for our IT security and the reassurance to know we are as secure as possible.”
Redscan is proud to announce that our pen testing service has been named best in its category at the 2018 Computing Security Awards. At a prestigious ceremony …
Concerned about the impact of a Business Email Compromise (BEC) attack, a leading insurance broker sought the help of Redscan. Read our investigation and recommendations here.