Please get in touch using the form below
As transport operators continue to digitise their operations to improve communications, signalling, timetabling and passenger experience, they cannot afford to ignore the associated cyber security risks.
Organisations transporting goods and passengers across air, rail, road and sea need to ensure they maintain a strong cybersecurity posture by proactively identifying and addressing risks plus detecting and responding to threats swiftly and effectively.
Key challenges faced by organisations in the transport sector include:
• Maintaining continuity and safety of essential services and operations
• Improving aging and fragmented network infrastructure
• Protecting the personal data of passengers and clients
• Reducing cyber risks across the supply chain
• Balancing smart innovations and security
• Complying with NIS, PCI and GDPR requirements
Security questions organisations in the transportation sector should be asking:
The NIS Regulations require operators of essential services (OESs) to have security measures in place to mitigate cyber risks and protect the critical infrastructure on which we all rely. Many organisations in the transport sector are classified as OESs, and are regularly audited to ensure they are able to manage risks, defend against cyber-attacks and minimise the impact of security incidents.
Airlines, train operators and other private and public transport organisations that accept card payments also need to comply with the requirements of the PCI DSS. These include maintaining a secure network, implementing robust security policies, proactive threat monitoring and vulnerability management.
Any transport operator that processes personal information must also make efforts to protect it from unauthorised processing, loss or destruction under the requirements of the GDPR and DPA 2018. Non-compliance and failure to report breaches within 72 hours could lead to a large fine.
€20 million or 4% of global turnover (whichever is greater)
The maximum GDPR penalty for a cyber security breach.
Redscan has experience working with organisations across the aviation, rail, shipping and logistics sectors, helping them to assess cyber security risk, eliminate vulnerabilities and proactively detect and respond to the latest cyber security threats.
Functioning as an extension of in-house IT resources, ThreatDetect™ is an award-winning MDR service supplying the capabilities needed to monitor, hunt for and remediate cyber-attacks and breaches 24/7.
Experience a real-world cyber-attack simulation to identify the weaknesses an attacker could exploit, quantify the value of data that could be exfiltrated and assess the effectiveness of security investments.
Our CREST-approved, fully customisable pen test engagements enable you to identify vulnerabilities and exposures in your infrastructure, applications, people and processes in order to reduce security risk.
“Services like ThreatDetect are few and far between.”
"Redscan's cost effective service gives us peace of mind that we are doing all we can to protect our clients, our business, our staff, our counterparties and other partners"
"Redscan’s hands on approach identified security flaws that had previously been overlooked by other vendors"
"Redscan gave us the professional service and quick turnaround that we needed to meet our tight deadlines."
“Redscan has given us a third party stamp of approval for our IT security and the reassurance to know we are as secure as possible.”
Following a long period of political turmoil, the UK government’s Brexit withdrawal bill has completed its passage through the House of Commons and received royal assent. While …
A private hospital with royal patronage chose ThreatDetect™, Redscan’s Managed Detection and Response service, to protect patient data through proactive network and endpoint monitoring.
Jeff Bezos is alleged to have had his personal phone hacked via a video file from the WhatsApp account of a Saudi crown prince.
The national oil company of the Arabian Gulf island nation of Bahrain has been reportedly hit by a disk wiper attack in an alleged nation-state attack.
A hacker from North London has been given 300 hours of unpaid work and a six-month electronic curfew for threatening to reset 319 million iCloud accounts.
Data ransomers have created a public website to expose data and named recent victim companies that chose to rebuild their operations instead of paying up.
The Microsoft threat research team has discovered 44 million compromised Azure AD and Microsoft Services Accounts in the three billion leaked credentials available online.
US authorities have filed charges against two Russian nationals alleged to be running a global cyber crime organisation named Evil Corp.
This content is blocked. Accept cookies to view the content.