Please get in touch using the form below
As transport operators continue to digitise their operations to improve communications, signalling, timetabling and passenger experience, they cannot afford to ignore the associated cyber security risks.
Organisations transporting goods and passengers across air, rail, road and sea need to ensure they maintain a strong cybersecurity posture by proactively identifying and addressing risks plus detecting and responding to threats swiftly and effectively.
Key challenges faced by organisations in the transport sector include:
• Maintaining continuity and safety of essential services and operations
• Improving aging and fragmented network infrastructure
• Protecting the personal data of passengers and clients
• Reducing cyber risks across the supply chain
• Balancing smart innovations and security
• Complying with NIS, PCI and GDPR requirements
Security questions organisations in the transportation sector should be asking:
The NIS Regulations require operators of essential services (OESs) to have security measures in place to mitigate cyber risks and protect the critical infrastructure on which we all rely. Many organisations in the transport sector are classified as OESs, and are regularly audited to ensure they are able to manage risks, defend against cyber-attacks and minimise the impact of security incidents.
Airlines, train operators and other private and public transport organisations that accept card payments also need to comply with the requirements of the PCI DSS. These include maintaining a secure network, implementing robust security policies, proactive threat monitoring and vulnerability management.
Any transport operator that processes personal information must also make efforts to protect it from unauthorised processing, loss or destruction under the requirements of the GDPR and DPA 2018. Non-compliance and failure to report breaches within 72 hours could lead to a large fine.
€20 million or 4% of global turnover (whichever is greater)
The maximum GDPR penalty for a cyber security breach.
Redscan has experience working with organisations across the aviation, rail, shipping and logistics sectors, helping them to assess cyber security risk, eliminate vulnerabilities and proactively detect and respond to the latest cyber security threats.
Functioning as an extension of in-house IT resources, ThreatDetect™ is an award-winning MDR service supplying the capabilities needed to monitor, hunt for and remediate cyber-attacks and breaches 24/7.
Experience a real-world cyber-attack simulation to identify the weaknesses an attacker could exploit, quantify the value of data that could be exfiltrated and assess the effectiveness of security investments.
Our CREST-approved, fully customisable pen test engagements enable you to identify vulnerabilities and exposures in your infrastructure, applications, people and processes in order to reduce security risk.
“I can offer a higher level of assurance at board level about our information security now. Redscan gives us a broader lens on a complex and changing environment.”
“Services like ThreatDetect are few and far between.”
Redscan is pleased to share the news that, for the fourth successive year, we’ve been shortlisted as a finalist at the Computing Security Awards – and we’d really …
A private hospital with royal patronage chose ThreatDetect™, Redscan’s Managed Detection and Response service, to protect patient data through proactive network and endpoint monitoring.
Over 20 local government authorities in the US state of Texas have been infected with ransomware, with reports suggesting the attacks ‘came from one single threat actor’.
The UK’s Financial Conduct Authority has said that firms will be given an extra 18 months to comply with the Secure Customer Authentication requirements of the PSD2.
A BEC attack was discovered targeting French football club Amiens, which attempted to fraudulently intercept €2m of transfer funds owed after the transfer of former player Tanguy Ndombele.
Almost half a million Monzo account holders have been urged to change their PINs after an internal security flaw exposed information to unauthorised staff.
A sophisticated cyber-attack has been discovered that is targeting investigative journalists who are looking into the activities of Russian intelligence services.
The personal information of 106 million individuals across the USA and Canada were compromised in an attack targeting financial services firm Capital One, the company has revealed.
This content is blocked. Accept cookies to view the content.