Cybersecurity Risks to Vehicles

According to a new report by IBM, consumers are taking cybersecurity issues seriously, with 56 percent stating that security and privacy will be a key factor in future vehicle purchasing decisions. This is leading automakers to take a hard look at potential points of exploitation, suspicious behavior, and response systems.

As technology advances, cars are becoming much more than just a mode of transportation. Stocked with sensors and computers, your vehicle acts as a kind of moving data center. With the rise of the Internet of Things, car technology is also being integrated with outside devices. While this seamless experience is beneficial in many ways for consumers, it also opens up vulnerabilities in technologies capable of being compromised and hacked.

This from IBM:

Modern travelers will want to switch seamlessly between modes of transportation, all the while retaining a consistent and personalized digital experience. With many technologies sharing information about the traveler, and each participant in an intermodal experience independent from each other, governance and privacy are major concerns. When the traveler leaves one mode for another, there must be guarantees that personal data is wiped from the vehicle and that persistent data captured during the travel transaction is properly protected, encrypted and retained for the minimum period of use before it is finally deleted.

Read the full report.

The good news? While these threats are on the radar, they are not yet being actively exploited. Right now, hackers are gaining easier access into laptops and cellphones, but as those targets become more difficult to compromise, IBM suggest that cybersecurity threats to the Internet of Things, including connected vehicles, will rise.

The report states: “While consumers demand the latest technology, they also expect it to be wrapped into a neat package with three bows: safety, security and data privacy.”

Related Post

Related Post

DISCLAIMER

All content provided in the ECS Redcat blog is for informational purposes only. The opinions and interests expressed here do not necessarily represent ECS's positions or views. ECS makes no representation or warranties about this blog or the accuracy or reliability of the blog. In addition, a link to an outside blog or website does not mean that ECS endorses that blog or website or has responsibility for its content or use.

Post Comments

Your email address will not be published. Required fields are marked *