Last month (March 2022) a 19 year old tech security specialist used a third party software app to hack into 25 Tesla’s in 12 different countries, he was able to collect every bit of each vehicles data which included private information stored through the owners smartphone via the infotainment system, he was able to take full control of each car, and it’s not just the vehicles that are vulnerable to attacks, the whole EV charging infrastructure is at risk too, only a few weeks ago on 5th April 2022 all three of Isle of Wight’s charging points were hacked putting the chargers out of use and displaying pornography, which shows the drastic need for a much higher form of cybersecurity is needed for EVs and in order for consumers to feel confident enough to give up their combustion engine vehicles for an electric one, but the issue is far from straightforward to resolve as intelligence firm Mandiant along with Google’s bug hunting team Project Zero discovered from their investigations ending last year, unless a vulnerability is known about then it’s pretty near on impossible to know about it until it is brought to the software developers attention, which means that either a hacker makes you aware, or your in-house team discovers the vulnerability first, but that of course still leaves the door wide open to unknow vulnerabilities which is a real problem, like we learnt this month after Downing Street announced it was the victim of a powerful spyware security breach which took place back in Jul 2020, the British National Cyber Security Centre was unable to locate the devices in question or what data had been taken.
And as we can see nothing that is connected to the internet is safe, we have become extremely reliant upon it and therefore should take our security and backup plan more seriously. Fortunately more companies and governments are taking action but the reality is a solution is a long way off and once a solution is implemented there are usually other new threats to look to protect.
So, the answer in our view is to ensure you have an offline plan in place, a type of disaster recovery protection if you will. As much as we like to rely on the protection provided by the software manufacturer, we can’t 100% rest our laurels upon it. Fortunately there are many tools that can be easily implemented into your business that will allow us to continue to operate offline if such an event were to occur, and though this in itself may not protect the software, hardware and the data held within it, it still provides access to the all important information, and a means to move our data across to a different provider if so required. From a legal and business stance, customers will at least feel some confidence in you and your business, though certainly not an ideal situation, you are doing all that you can humanly possibly do, one of the biggest reasons why established and not so established businesses fail is due to data breaches, it’s a costly affair and even if it’s not necessarily that businesses fault that a data breach occurred, from a customer’s perspective the onus stops at your door, by adding an additional layer of offline security you can at least prove and provide evidence that no matter what the problem affecting the business is, was not your businesses fault and that their data stored with you at least is safe.
If you don’t have an offline strategy in place and would like to discuss how one could be integrated into your business, then please do not hesitate in contacting us today on: 01737 824 003 or email us email@example.com.
Alternatively if you enjoyed this article and would like to read more content like this then please do take a look through our blog which can be found HERE, or why not take a look through the other services that we have on offer here: