Concerns about cyber-security are everywhere – even in our cars.
Who ever thought that someday we would be driving cars like Kit from the show Knight Rider? Well, move over David Hasselhoff, because that day is here! But along with all the fancy communication features that come with our new cars, there are also concerns about cyber-security. According to an article on the gasbuddy.com blog, U.S. Senator Edward Markey, from Massachusetts is expressing those concerns and looking for a solution.
Today’s new cars and light trucks contain approximately 50 electronic control units which operate like mini-computers, according to the Detroit Free Press. These mini-computers create a network in the car that control a variety of functions, including:
- Tire pressure monitoring systems
- Bluetooth
- Internet access
- Keyless entry
- Remote start
- Navigation systems
- WiFi
- Anti-theft systems
- Cellular-telematics
And these systems are part of what Mackey believes poses a threat to consumers’ cyber-security in their cars. The cyber-security of the vehicles could be threatened by hackers who could remotely take control of cars and steal personally identifiable information. It is enough of a concern to Mackey that he issued a report about cyber-security and cars and he is asking automobile manufacturers to adopt a cyber-security rating system similar to the one used by the Insurance Institute for Highway Safety’s crash test ratings.
According to Markey’s report, in which he collected information from 16 different car makers,
…there is a clear lack of appropriate security measures to protect drivers against hackers who may be able to take control of a vehicle or against those who may wish to collect and use personal driver information.”
Markey also pointed out that the data collected by the information systems in these cars is unprotected and could pose a threat to the car owner’s cyber-security.
As long as we continue to utilize technology in all areas of our lives, including our cars, cyber-security will be an issue. The first step to protecting our data and our company data is recognizing where we are vulnerable. If you are concerned about cyber-security and vulnerabilities in your organization and processes, contact us. We have colleagues who can assist you with cyber-security for your active systems, and we can assist you with the destruction of your data containing devices that are not active.