Telematic Data: the Key to a Successful Energy Transition

Fleet managers are currently facing the colossal challenge of the energy transition, in order to meet…
Fleet managers are currently facing the colossal challenge of the energy transition, in order to meet…
The COVID-19 pandemic has left many traces behind, including a worldwide supply chain crisis, which is…
When a carrier thinks about going electric, the choice of vehicles is the first thing that…
The U.S. Department of Energy recently released a report containing a vehicle cost analysis for zero-emission…
After mechanization (1.0), mass production (2.0) and digital automation (3.0), the manufacturing industry is entering its fourth great wave, one where artificial intelligence and communication help machines make productivity gains while increasing the value of workers’ roles. Two Fonds experts weigh in.
The electrification of transport is unavoidable, meaning the industry will need to undergo a major transformation and adaptation of products. Re-engineering is necessary to optimize products and make them perform. To accelerate your transition to electrification, we propose 3 strategies focused on the development of new technologies and suppliers.
Desjardins Group has announced an ambitious action plan to achieve net zero emissions by 2040 in its extended operations and in its lending activities and own investments in three key carbon-intensive sectors: energy, transportation and real estate.
With cybercrime damages expected to cost the world $10.5 trillion annually by 2025, this evolving issue shouldn’t be taken lightly. Threat actors continue to develop new ways to attack organizations, though only 60% of public transit agencies have a cybersecurity strategy in place.
That’s where cyber hygiene comes in.
By maintaining the security and upkeep of your organization’s systems, devices, and procedures – whether that’s through secure corporate communication or purchasing cyber liability insurance, among other options – you greatly lower your chances of falling victim to a cyber attack.
The initial step: supply chain risk management
Cyber threats are lurking everywhere. That’s why it’s important to do everything you can to limit your organization’s vulnerabilities. Through supply chain risk management, you can maintain a strong network of trusted vendors while securing your end-to-end supply chain. This strengthens your organization’s physical security and helps protect against potential cyber attacks.
It’s important to communicate and work closely with your partners and vendors, to get an in-depth understanding of their data and privacy protection policies. After all, the highest level of resilience against cyber threats isn’t achieved alone. It happens when everyone involved commits to upholding best practices.
You can establish this dialogue by asking your vendors and partners the following questions, which are discussed in detail on our Network of Trust page:
Asking these questions puts your organization in the best position to prevent, and in the worst case respond to, a cyber attack.
Detecting suspicious communications
Threat actors use social engineering campaigns – like phishing attacks or pretexting – to bait you into unknowingly providing sensitive information, giving them access to your private data. For that reason, ensuring that all your employees can effectively detect and avoid suspicious communication attempts is vital to your organization’s physical security.
While mistakes happen, keeping an eye out for unusual communication requests, and thinking before you click on any links or messages, are some of the ways that you can help to protect your organization against cyber attacks.
Providing consistent user education from the start
Since the repercussions of a cyber attack can have a long-lasting negative impact on your organization — whether it be in the form of a financial hit or data loss — providing consistent user education to your employees is an investment that goes a long way.
Educating your employees on cyber hygiene is an ongoing task that should begin during their onboarding. By explaining the importance of strategies like strong password selection, locking devices, and identifying social engineering attacks, your organization can limit the chances for human error while maintaining best practices.
Adding a layer of security with cyber liability insurance
There are as many as 12 different types of coverage available for cyber threats, which means that you’ll have to do some research before finding a cyber liability insurance package that can meet your organization’s needs. With cyber attacks on the rise, investing in the right package should be an essential part of your cybersecurity strategy.
Because such a wide range of options are available, reading the fine print is a key part of your insurance selection process, as that’ll determine the exact coverage that you’d receive in the case of a cyber attack.
Alongside a careful selection process, understanding the claims process for your package is important, to help prevent added confusion and stress in the case of a cyber attack.
While cyber liability insurance is a good way to help mitigate the financial risk of cyber attacks, vetting your vendors, partners, systems, and devices, and establishing an effective cyber risk mitigation plan are all equally-essential steps to protecting your organization against cyber attacks. Always remember that any vulnerability is one too many.
Good cyber hygiene is a team effort
Cyber hygiene isn’t only about securing systems and devices, but it requires time and attention to many aspects of your organization. Because your physical security system is only as secure as the least trusted device connected to it, there isn’t much room for error. Focusing on maintaining strong cyber hygiene through supply chain risk management, secure exchanges, user education, and cyber liability insurance are some of the key ways that you can protect your organization against evolving cyber threats.
Learn more about how to build a strong physical security foundation by checking out our Trust Center, which features a wide array of relevant information and resources at your disposal.
About Genetec
Genetec Inc. develops open platform software, hardware and cloud-based services for the physical security and public safety industry. Its flagship product, Security Center, unifies IP-based video surveillance, access control and automatic license plate recognition (ALPR) into one platform. This platform is used and trusted in various other industries, including traffic and transit.
This blog post is made possible by our great partner Genetec as part of the Transportation Cybersecurity and functional safety Forum, an initiative of Propulsion Québec and supported by the Quebec government.
The cluster for electric and smart transportation is proud to announce a new partnership with AttriX…
Quebecor is kicking off 2020 with the launch of its action plan to accelerate the electrification…