Logistics leaders need to assess risk, build up defenses, and remain vigilant as cybersecurity threats intensify. Here’s how to make sure you’re on the right path.
Victoria Kickham started her career as a newspaper reporter in the Boston area before moving into B2B journalism. She has covered manufacturing, distribution and supply chain issues for a variety of publications in the industrial and electronics sectors, and now writes about everything from forklift batteries to omnichannel business trends for DC Velocity.
Logistics industry leaders are sharpening their focus on cybersecurity as supply chains become more connected and digitized—and as threats from cybercriminals intensify in nearly every sector of the economy. Cyberthreats were listed as one of the top three business concerns among 1,200 companies surveyed by global insurance firm Travelers this fall in the leadup to national Cybersecurity Awareness Month, observed each October. The results echoed data from a Gartner survey earlier this year that showed a heightened focus on the topic in supply chain circles: 60% of nearly 500 supply chain organizations surveyed said that by 2025, they will use cybersecurity risk as a “significant determinant” in conducting third-party transactions and business engagements.
The topic is front and center in logistics largely because the supply chain is a prime target for cybercriminals, according to Dan Matney, a senior solutions architect and cybersecurity expert at supply chain consulting and technology firm enVista. Logistics and transportation companies are especially vulnerable because they can’t afford the downtime and delays that an attack or security breach brings, making them susceptible to hackers’ demands in order to get back up and running.
“We’re seeing very standard cybersecurity threats across pretty much all businesses, but the impact to logistics and transportation [is considerable]. That’s why [attackers] try so much harder in this industry,” Matney says, emphasizing the impact of costly disruptions that can have ripple effects throughout the economy.
Manufacturers are prime targets as well, and for similar reasons, explains Kirstin Simonson, cyber lead for global technology at Travelers.
“In many cases, a manufacturer’s systems need to be kept up and running 24/7/365. A cybercriminal could, for instance, use a malware attack to shut down systems to prevent a manufacturer from operating at all and disrupting the larger supply chain,” she says. “The cybercriminal could then request a significant ransom to restore the manufacturer’s operating systems.”
With the stakes so high, experts say it’s more important than ever to shore up your company’s cyber defenses. Here are three ways business leaders can make sure they’re on the right path.
ASSESS YOUR RISKS
The proliferation of technology on the manufacturing floor, in the warehouse, and on the road only exacerbates the risk of a cyberincident, as it creates more access points for cybercriminals to launch their attacks.
“Anything that’s connected to the internet can be hacked, and with the increase in internet-connected sensors, automated machines, industrial internet of things networks, industrial control systems, [and so forth], each of these creates a potential vulnerability or risk factor,” Simonson explains, adding that cybercriminals will leverage known vulnerabilities and look for areas they can compromise using methods such as phishing and malware. Phishing is an attack via email, phone, or text designed to lure people into giving up sensitive data or access to accounts or IT systems; malware is software that is intentionally designed to disrupt a computer, server, or network.
The experts at enVista point to other methods used to attack transportation, logistics, and manufacturing industries: ransomware, which involves encrypting sensitive data and systems and holding them hostage until a ransom is paid; distributed-denial-of-service (DDoS) attacks, which overwhelm a system’s resources, rendering it inaccessible to legitimate users; and man-in-the-middle (MitM) attacks, in which hackers intercept communications between two parties, gaining unauthorized access to sensitive data.
The first step in avoiding any of these attacks is to conduct a cyber-risk assessment, which can be done in partnership with IT vendors, a technology consultant, or an insurance provider. Simonson describes this as a process of identifying the critical points in a company’s network so that managers “know what you have and what you need to protect.” This includes identifying where all those access points are within the organization.
Matney agrees, adding that: “If you don’t have that first step, all the other implementations beyond that are pretty useless.”
It’s also important to conduct a third-party risk assessment, as the Gartner survey points out. This means working with vendors and other business partners to make sure they have adequate cybersecurity measures in place and contractual language outlining standards and how they will be enforced.
Taking that first step is becoming increasingly important: Nearly a quarter of companies in the Travelers survey said their company had suffered a cyberattack, with almost half of those occurring in the past 12 months.
BUILD YOUR DEFENSE
The next step on the cybersecurity journey is making sure you have tools in place to protect against an attack—firewalls, antivirus software, encryption technology, and the like—and that all software and systems are up to date, which can help keep cybercriminals from exploiting IT weaknesses.
Physical security and access control are vital considerations as well.
“Whenever you’re dealing with getting into your building, that’s one layer. But past that front door, think about how [people can gain access] to critical information—the server room or the ability to plug into a port in the wall and [get] on the network, for example,” Matney explains. “Those are things folks don’t think about. Access control and physical security are the basics before we get into different technologies [for detecting and responding to potential threats].”
Simonson agrees, emphasizing the importance of making sure those who need access to secure systems have it—and that those who shouldn’t have access don’t. This means developing identity and access management plans as well as password management protocols. Those steps could include multifactor authentication, which adds a layer of protection for accessing vital systems, platforms, or applications; essentially, the process asks users for a third identification factor—an access code to be entered after a user name and password have been provided, for example—before a user can gain access to the system.
Building a defense can also include the installation of solutions such as endpoint detection and response technology, which monitors the physical devices connected to your company’s network to detect suspicious activity and respond to threats.
Companies should factor all of this work into a comprehensive incident response plan.
“This is no different than if you live in a fire-prone area or hurricane-prone area,” Simonson explains. “You build some kind of business resilience plan for that. [A similar plan] needs to be in place for a cyberevent as well.”
Many companies have a long way to go before they reach these goals, however. The Travelers survey showed that at least 25% of businesses have not taken essential steps, such as installing a firewall or virus protection and implementing data backup and password update protocols. A larger percentage say they don’t use endpoint detection and response (64%), don’t conduct cyberassessments for vendors (57%) or customers’ assets (56%), don’t have an incident response plan (50%), or don’t utilize multifactor authentication for remote access (44%).
EDUCATE, AND DON’T LET UP
Employee awareness is an important part of the defense strategy as well, and the good news is that most professionals say they understand the growing risk of cyberthreats in the workplace: 81% of respondents to the Travelers survey said they feel that having proper cybersecurity controls in place is critical to the well-being of their company, up from 78% last year and 69% in 2018.
Companies should capitalize on that awareness with proper training. For instance, enVista advises companies to regularly educate workers about cyberthreats, phishing scams, and best practices for secure online behavior, Matney says, adding that insufficient training and bad habits are all it takes for an attack to slip through the cracks in your defense system.
“A lot of the attacks [in this industry] are through phishing and bad links that have compromised an entire network,” Matney says. “[A lack of] training and awareness are probably the weakest links.”
Simonson adds that it’s important to get the entire organization involved in the cybersecurity mission—and to continually educate, evaluate, update, and adjust your company’s strategy.
“Everyone has a role to play in a holistic approach to cybersecurity,” she says, adding that cyberattacks will only intensify as companies take a defensive position because criminals will step up their efforts to find ways around those defenses. “This isn’t something you can build a strategy for today, put it on a shelf, and it will magically work for the next five years. Companies need a living approach to cyberhygiene and cyberawareness. Fortunately, there are tools and information out there that can help.”
The New York-based industrial artificial intelligence (AI) provider Augury has raised $75 million for its process optimization tools for manufacturers, in a deal that values the company at more than $1 billion, the firm said today.
According to Augury, its goal is deliver a new generation of AI solutions that provide the accuracy and reliability manufacturers need to make AI a trusted partner in every phase of the manufacturing process.
The “series F” venture capital round was led by Lightrock, with participation from several of Augury’s existing investors; Insight Partners, Eclipse, and Qumra Capital as well as Schneider Electric Ventures and Qualcomm Ventures. In addition to securing the new funding, Augury also said it has added Elan Greenberg as Chief Operating Officer.
“Augury is at the forefront of digitalizing equipment maintenance with AI-driven solutions that enhance cost efficiency, sustainability performance, and energy savings,” Ashish (Ash) Puri, Partner at Lightrock, said in a release. “Their predictive maintenance technology, boasting 99.9% failure detection accuracy and a 5-20x ROI when deployed at scale, significantly reduces downtime and energy consumption for its blue-chip clients globally, offering a compelling value proposition.”
The money supports the firm’s approach of "Hybrid Autonomous Mobile Robotics (Hybrid AMRs)," which integrate the intelligence of "Autonomous Mobile Robots (AMRs)" with the precision and structure of "Automated Guided Vehicles (AGVs)."
According to Anscer, it supports the acceleration to Industry 4.0 by ensuring that its autonomous solutions seamlessly integrate with customers’ existing infrastructures to help transform material handling and warehouse automation.
Leading the new U.S. office will be Mark Messina, who was named this week as Anscer’s Managing Director & CEO, Americas. He has been tasked with leading the firm’s expansion by bringing its automation solutions to industries such as manufacturing, logistics, retail, food & beverage, and third-party logistics (3PL).
Supply chains continue to deal with a growing volume of returns following the holiday peak season, and 2024 was no exception. Recent survey data from product information management technology company Akeneo showed that 65% of shoppers made holiday returns this year, with most reporting that their experience played a large role in their reason for doing so.
The survey—which included information from more than 1,000 U.S. consumers gathered in January—provides insight into the main reasons consumers return products, generational differences in return and online shopping behaviors, and the steadily growing influence that sustainability has on consumers.
Among the results, 62% of consumers said that having more accurate product information upfront would reduce their likelihood of making a return, and 59% said they had made a return specifically because the online product description was misleading or inaccurate.
And when it comes to making those returns, 65% of respondents said they would prefer to return in-store, if possible, followed by 22% who said they prefer to ship products back.
“This indicates that consumers are gravitating toward the most sustainable option by reducing additional shipping,” the survey authors said in a statement announcing the findings, adding that 68% of respondents said they are aware of the environmental impact of returns, and 39% said the environmental impact factors into their decision to make a return or exchange.
The authors also said that investing in the product experience and providing reliable product data can help brands reduce returns, increase loyalty, and provide the best customer experience possible alongside profitability.
When asked what products they return the most, 60% of respondents said clothing items. Sizing issues were the number one reason for those returns (58%) followed by conflicting or lack of customer reviews (35%). In addition, 34% cited misleading product images and 29% pointed to inaccurate product information online as reasons for returning items.
More than 60% of respondents said that having more reliable information would reduce the likelihood of making a return.
“Whether customers are shopping directly from a brand website or on the hundreds of e-commerce marketplaces available today [such as Amazon, Walmart, etc.] the product experience must remain consistent, complete and accurate to instill brand trust and loyalty,” the authors said.
When you get the chance to automate your distribution center, take it.
That's exactly what leaders at interior design house
Thibaut Design did when they relocated operations from two New Jersey distribution centers (DCs) into a single facility in Charlotte, North Carolina, in 2019. Moving to an "empty shell of a building," as Thibaut's Michael Fechter describes it, was the perfect time to switch from a manual picking system to an automated one—in this case, one that would be driven by voice-directed technology.
"We were 100% paper-based picking in New Jersey," Fechter, the company's vice president of distribution and technology, explained in a
case study published by Voxware last year. "We knew there was a need for automation, and when we moved to Charlotte, we wanted to implement that technology."
Fechter cites Voxware's promise of simple and easy integration, configuration, use, and training as some of the key reasons Thibaut's leaders chose the system. Since implementing the voice technology, the company has streamlined its fulfillment process and can onboard and cross-train warehouse employees in a fraction of the time it used to take back in New Jersey.
And the results speak for themselves.
"We've seen incredible gains [from a] productivity standpoint," Fechter reports. "A 50% increase from pre-implementation to today."
THE NEED FOR SPEED
Thibaut was founded in 1886 and is the oldest operating wallpaper company in the United States, according to Fechter. The company works with a global network of designers, shipping samples of wallpaper and fabrics around the world.
For the design house's warehouse associates, picking, packing, and shipping thousands of samples every day was a cumbersome, labor-intensive process—and one that was prone to inaccuracy. With its paper-based picking system, mispicks were common—Fechter cites a 2% to 5% mispick rate—which necessitated stationing an extra associate at each pack station to check that orders were accurate before they left the facility.
All that has changed since implementing Voxware's Voice Management Suite (VMS) at the Charlotte DC. The system automates the workflow and guides associates through the picking process via a headset, using voice commands. The hands-free, eyes-free solution allows workers to focus on locating and selecting the right item, with no paper-based lists to check or written instructions to follow.
Thibaut also uses the tech provider's analytics tool, VoxPilot, to monitor work progress, check orders, and keep track of incoming work—managers can see what orders are open, what's in process, and what's completed for the day, for example. And it uses VoxTempo, the system's natural language voice recognition (NLVR) solution, to streamline training. The intuitive app whittles training time down to minutes and gets associates up and working fast—and Thibaut hitting minimum productivity targets within hours, according to Fechter.
EXPECTED RESULTS REALIZED
Key benefits of the project include a reduction in mispicks—which have dropped to zero—and the elimination of those extra quality-control measures Thibaut needed in the New Jersey DCs.
"We've gotten to the point where we don't even measure mispicks today—because there are none," Fechter said in the case study. "Having an extra person at a pack station to [check] every order before we pack [it]—that's been eliminated. Not only is the pick right the first time, but [the order] also gets packed and shipped faster than ever before."
The system has increased inventory accuracy as well. According to Fechter, it's now "well over 99.9%."
IT projects can be daunting, especially when the project involves upgrading a warehouse management system (WMS) to support an expansive network of warehousing and logistics facilities. Global third-party logistics service provider (3PL) CJ Logistics experienced this first-hand recently, embarking on a WMS selection process that would both upgrade performance and enhance security for its U.S. business network.
The company was operating on three different platforms across more than 35 warehouse facilities and wanted to pare that down to help standardize operations, optimize costs, and make it easier to scale the business, according to CIO Sean Moore.
Moore and his team started the WMS selection process in late 2023, working with supply chain consulting firm Alpine Supply Chain Solutions to identify challenges, needs, and goals, and then to select and implement the new WMS. Roughly a year later, the 3PL was up and running on a system from Körber Supply Chain—and planning for growth.
SECURING A NEW SOLUTION
Leaders from both companies explain that a robust WMS is crucial for a 3PL's success, as it acts as a centralized platform that allows seamless coordination of activities such as inventory management, order fulfillment, and transportation planning. The right solution allows the company to optimize warehouse operations by automating tasks, managing inventory levels, and ensuring efficient space utilization while helping to boost order processing volumes, reduce errors, and cut operational costs.
CJ Logistics had another key criterion: ensuring data security for its wide and varied array of clients, many of whom rely on the 3PL to fill e-commerce orders for consumers. Those clients wanted assurance that consumers' personally identifying information—including names, addresses, and phone numbers—was protected against cybersecurity breeches when flowing through the 3PL's system. For CJ Logistics, that meant finding a WMS provider whose software was certified to the appropriate security standards.
"That's becoming [an assurance] that our customers want to see," Moore explains, adding that many customers wanted to know that CJ Logistics' systems were SOC 2 compliant, meaning they had met a standard developed by the American Institute of CPAs for protecting sensitive customer data from unauthorized access, security incidents, and other vulnerabilities. "Everybody wants that level of security. So you want to make sure the system is secure … and not susceptible to ransomware.
"It was a critical requirement for us."
That security requirement was a key consideration during all phases of the WMS selection process, according to Michael Wohlwend, managing principal at Alpine Supply Chain Solutions.
"It was in the RFP [request for proposal], then in demo, [and] then once we got to the vendor of choice, we had a deep-dive discovery call to understand what [security] they have in place and their plan moving forward," he explains.
Ultimately, CJ Logistics implemented Körber's Warehouse Advantage, a cloud-based system designed for multiclient operations that supports all of the 3PL's needs, including its security requirements.
GOING LIVE
When it came time to implement the software, Moore and his team chose to start with a brand-new cold chain facility that the 3PL was building in Gainesville, Georgia. The 270,000-square-foot facility opened this past November and immediately went live running on the Körber WMS.
Moore and Wohlwend explain that both the nature of the cold chain business and the greenfield construction made the facility the perfect place to launch the new software: CJ Logistics would be adding customers at a staggered rate, expanding its cold storage presence in the Southeast and capitalizing on the location's proximity to major highways and railways. The facility is also adjacent to the future Northeast Georgia Inland Port, which will provide a direct link to the Port of Savannah.
"We signed a 15-year lease for the building," Moore says. "When you sign a long-term lease … you want your future-state software in place. That was one of the key [reasons] we started there.
"Also, this facility was going to bring on one customer after another at a metered rate. So [there was] some risk reduction as well."
Wohlwend adds: "The facility plus risk reduction plus the new business [element]—all made it a good starting point."
The early benefits of the WMS include ease of use and easy onboarding of clients, according to Moore, who says the plan is to convert additional CJ Logistics facilities to the new system in 2025.
"The software is very easy to use … our employees are saying they really like the user interface and that you can find information very easily," Moore says, touting the partnership with Alpine and Körber as key to making the project a success. "We are on deck to add at least four facilities at a minimum [this year]."