Logistics leaders need to assess risk, build up defenses, and remain vigilant as cybersecurity threats intensify. Here’s how to make sure you’re on the right path.
Victoria Kickham started her career as a newspaper reporter in the Boston area before moving into B2B journalism. She has covered manufacturing, distribution and supply chain issues for a variety of publications in the industrial and electronics sectors, and now writes about everything from forklift batteries to omnichannel business trends for DC Velocity.
Logistics industry leaders are sharpening their focus on cybersecurity as supply chains become more connected and digitized—and as threats from cybercriminals intensify in nearly every sector of the economy. Cyberthreats were listed as one of the top three business concerns among 1,200 companies surveyed by global insurance firm Travelers this fall in the leadup to national Cybersecurity Awareness Month, observed each October. The results echoed data from a Gartner survey earlier this year that showed a heightened focus on the topic in supply chain circles: 60% of nearly 500 supply chain organizations surveyed said that by 2025, they will use cybersecurity risk as a “significant determinant” in conducting third-party transactions and business engagements.
The topic is front and center in logistics largely because the supply chain is a prime target for cybercriminals, according to Dan Matney, a senior solutions architect and cybersecurity expert at supply chain consulting and technology firm enVista. Logistics and transportation companies are especially vulnerable because they can’t afford the downtime and delays that an attack or security breach brings, making them susceptible to hackers’ demands in order to get back up and running.
“We’re seeing very standard cybersecurity threats across pretty much all businesses, but the impact to logistics and transportation [is considerable]. That’s why [attackers] try so much harder in this industry,” Matney says, emphasizing the impact of costly disruptions that can have ripple effects throughout the economy.
Manufacturers are prime targets as well, and for similar reasons, explains Kirstin Simonson, cyber lead for global technology at Travelers.
“In many cases, a manufacturer’s systems need to be kept up and running 24/7/365. A cybercriminal could, for instance, use a malware attack to shut down systems to prevent a manufacturer from operating at all and disrupting the larger supply chain,” she says. “The cybercriminal could then request a significant ransom to restore the manufacturer’s operating systems.”
With the stakes so high, experts say it’s more important than ever to shore up your company’s cyber defenses. Here are three ways business leaders can make sure they’re on the right path.
ASSESS YOUR RISKS
The proliferation of technology on the manufacturing floor, in the warehouse, and on the road only exacerbates the risk of a cyberincident, as it creates more access points for cybercriminals to launch their attacks.
“Anything that’s connected to the internet can be hacked, and with the increase in internet-connected sensors, automated machines, industrial internet of things networks, industrial control systems, [and so forth], each of these creates a potential vulnerability or risk factor,” Simonson explains, adding that cybercriminals will leverage known vulnerabilities and look for areas they can compromise using methods such as phishing and malware. Phishing is an attack via email, phone, or text designed to lure people into giving up sensitive data or access to accounts or IT systems; malware is software that is intentionally designed to disrupt a computer, server, or network.
The experts at enVista point to other methods used to attack transportation, logistics, and manufacturing industries: ransomware, which involves encrypting sensitive data and systems and holding them hostage until a ransom is paid; distributed-denial-of-service (DDoS) attacks, which overwhelm a system’s resources, rendering it inaccessible to legitimate users; and man-in-the-middle (MitM) attacks, in which hackers intercept communications between two parties, gaining unauthorized access to sensitive data.
The first step in avoiding any of these attacks is to conduct a cyber-risk assessment, which can be done in partnership with IT vendors, a technology consultant, or an insurance provider. Simonson describes this as a process of identifying the critical points in a company’s network so that managers “know what you have and what you need to protect.” This includes identifying where all those access points are within the organization.
Matney agrees, adding that: “If you don’t have that first step, all the other implementations beyond that are pretty useless.”
It’s also important to conduct a third-party risk assessment, as the Gartner survey points out. This means working with vendors and other business partners to make sure they have adequate cybersecurity measures in place and contractual language outlining standards and how they will be enforced.
Taking that first step is becoming increasingly important: Nearly a quarter of companies in the Travelers survey said their company had suffered a cyberattack, with almost half of those occurring in the past 12 months.
BUILD YOUR DEFENSE
The next step on the cybersecurity journey is making sure you have tools in place to protect against an attack—firewalls, antivirus software, encryption technology, and the like—and that all software and systems are up to date, which can help keep cybercriminals from exploiting IT weaknesses.
Physical security and access control are vital considerations as well.
“Whenever you’re dealing with getting into your building, that’s one layer. But past that front door, think about how [people can gain access] to critical information—the server room or the ability to plug into a port in the wall and [get] on the network, for example,” Matney explains. “Those are things folks don’t think about. Access control and physical security are the basics before we get into different technologies [for detecting and responding to potential threats].”
Simonson agrees, emphasizing the importance of making sure those who need access to secure systems have it—and that those who shouldn’t have access don’t. This means developing identity and access management plans as well as password management protocols. Those steps could include multifactor authentication, which adds a layer of protection for accessing vital systems, platforms, or applications; essentially, the process asks users for a third identification factor—an access code to be entered after a user name and password have been provided, for example—before a user can gain access to the system.
Building a defense can also include the installation of solutions such as endpoint detection and response technology, which monitors the physical devices connected to your company’s network to detect suspicious activity and respond to threats.
Companies should factor all of this work into a comprehensive incident response plan.
“This is no different than if you live in a fire-prone area or hurricane-prone area,” Simonson explains. “You build some kind of business resilience plan for that. [A similar plan] needs to be in place for a cyberevent as well.”
Many companies have a long way to go before they reach these goals, however. The Travelers survey showed that at least 25% of businesses have not taken essential steps, such as installing a firewall or virus protection and implementing data backup and password update protocols. A larger percentage say they don’t use endpoint detection and response (64%), don’t conduct cyberassessments for vendors (57%) or customers’ assets (56%), don’t have an incident response plan (50%), or don’t utilize multifactor authentication for remote access (44%).
EDUCATE, AND DON’T LET UP
Employee awareness is an important part of the defense strategy as well, and the good news is that most professionals say they understand the growing risk of cyberthreats in the workplace: 81% of respondents to the Travelers survey said they feel that having proper cybersecurity controls in place is critical to the well-being of their company, up from 78% last year and 69% in 2018.
Companies should capitalize on that awareness with proper training. For instance, enVista advises companies to regularly educate workers about cyberthreats, phishing scams, and best practices for secure online behavior, Matney says, adding that insufficient training and bad habits are all it takes for an attack to slip through the cracks in your defense system.
“A lot of the attacks [in this industry] are through phishing and bad links that have compromised an entire network,” Matney says. “[A lack of] training and awareness are probably the weakest links.”
Simonson adds that it’s important to get the entire organization involved in the cybersecurity mission—and to continually educate, evaluate, update, and adjust your company’s strategy.
“Everyone has a role to play in a holistic approach to cybersecurity,” she says, adding that cyberattacks will only intensify as companies take a defensive position because criminals will step up their efforts to find ways around those defenses. “This isn’t something you can build a strategy for today, put it on a shelf, and it will magically work for the next five years. Companies need a living approach to cyberhygiene and cyberawareness. Fortunately, there are tools and information out there that can help.”
Progress in generative AI (GenAI) is poised to impact business procurement processes through advancements in three areas—agentic reasoning, multimodality, and AI agents—according to Gartner Inc.
Those functions will redefine how procurement operates and significantly impact the agendas of chief procurement officers (CPOs). And 72% of procurement leaders are already prioritizing the integration of GenAI into their strategies, thus highlighting the recognition of its potential to drive significant improvements in efficiency and effectiveness, Gartner found in a survey conducted in July, 2024, with 258 global respondents.
Gartner defined the new functions as follows:
Agentic reasoning in GenAI allows for advanced decision-making processes that mimic human-like cognition. This capability will enable procurement functions to leverage GenAI to analyze complex scenarios and make informed decisions with greater accuracy and speed.
Multimodality refers to the ability of GenAI to process and integrate multiple forms of data, such as text, images, and audio. This will make GenAI more intuitively consumable to users and enhance procurement's ability to gather and analyze diverse information sources, leading to more comprehensive insights and better-informed strategies.
AI agents are autonomous systems that can perform tasks and make decisions on behalf of human operators. In procurement, these agents will automate procurement tasks and activities, freeing up human resources to focus on strategic initiatives, complex problem-solving and edge cases.
As CPOs look to maximize the value of GenAI in procurement, the study recommended three starting points: double down on data governance, develop and incorporate privacy standards into contracts, and increase procurement thresholds.
“These advancements will usher procurement into an era where the distance between ideas, insights, and actions will shorten rapidly,” Ryan Polk, senior director analyst in Gartner’s Supply Chain practice, said in a release. "Procurement leaders who build their foundation now through a focus on data quality, privacy and risk management have the potential to reap new levels of productivity and strategic value from the technology."
Businesses are cautiously optimistic as peak holiday shipping season draws near, with many anticipating year-over-year sales increases as they continue to battle challenging supply chain conditions.
That’s according to the DHL 2024 Peak Season Shipping Survey, released today by express shipping service provider DHL Express U.S. The company surveyed small and medium-sized enterprises (SMEs) to gauge their holiday business outlook compared to last year and found that a mix of optimism and “strategic caution” prevail ahead of this year’s peak.
Nearly half (48%) of the SMEs surveyed said they expect higher holiday sales compared to 2023, while 44% said they expect sales to remain on par with last year, and just 8% said they foresee a decline. Respondents said the main challenges to hitting those goals are supply chain problems (35%), inflation and fluctuating consumer demand (34%), staffing (16%), and inventory challenges (14%).
But respondents said they have strategies in place to tackle those issues. Many said they began preparing for holiday season earlier this year—with 45% saying they started planning in Q2 or earlier, up from 39% last year. Other strategies include expanding into international markets (35%) and leveraging holiday discounts (32%).
Sixty percent of respondents said they will prioritize personalized customer service as a way to enhance customer interactions and loyalty this year. Still others said they will invest in enhanced web and mobile experiences (23%) and eco-friendly practices (13%) to draw customers this holiday season.
That challenge is one of the reasons that fewer shoppers overall are satisfied with their shopping experiences lately, Lincolnshire, Illinois-based Zebra said in its “17th Annual Global Shopper Study.”th Annual Global Shopper Study.” While 85% of shoppers last year were satisfied with both the in-store and online experiences, only 81% in 2024 are satisfied with the in-store experience and just 79% with online shopping.
In response, most retailers (78%) say they are investing in technology tools that can help both frontline workers and those watching operations from behind the scenes to minimize theft and loss, Zebra said.
Just 38% of retailers currently use AI-based prescriptive analytics for loss prevention, but a much larger 50% say they plan to use it in the next 1-3 years. That was followed by self-checkout cameras and sensors (45%), computer vision (46%), and RFID tags and readers (42%) that are planned for use within the next three years, specifically for loss prevention.
Those strategies could help improve the brick and mortar shopping experience, since 78% of shoppers say it’s annoying when products are locked up or secured within cases. Adding to that frustration is that it’s hard to find an associate while shopping in stores these days, according to 70% of consumers. In response, some just walk out; one in five shoppers has left a store without getting what they needed because a retail associate wasn’t available to help, an increase over the past two years.
The survey also identified additional frustrations faced by retailers and associates:
challenges with offering easy options for click-and-collect or returns, despite high shopper demand for them
the struggle to confirm current inventory and pricing
lingering labor shortages and increasing loss incidents, even as shoppers return to stores
“Many retailers are laying the groundwork to build a modern store experience,” Matt Guiste, Global Retail Technology Strategist, Zebra Technologies, said in a release. “They are investing in mobile and intelligent automation technologies to help inform operational decisions and enable associates to do the things that keep shoppers happy.”
The survey was administered online by Azure Knowledge Corporation and included 4,200 adult shoppers (age 18+), decision-makers, and associates, who replied to questions about the topics of shopper experience, device and technology usage, and delivery and fulfillment in store and online.
An eight-year veteran of the Georgia company, Hakala will begin his new role on January 1, when the current CEO, Tero Peltomäki, will retire after a long and noteworthy career, continuing as a member of the board of directors, Cimcorp said.
According to Hakala, automation is an inevitable course in Cimcorp’s core sectors, and the company’s end-to-end capabilities will be crucial for clients’ success. In the past, both the tire and grocery retail industries have automated individual machines and parts of their operations. In recent years, automation has spread throughout the facilities, as companies want to be able to see their entire operation with one look, utilize analytics, optimize processes, and lead with data.
“Cimcorp has always grown by starting small in the new business segments. We’ve created one solution first, and as we’ve gained more knowledge of our clients’ challenges, we have been able to expand,” Hakala said in a release. “In every phase, we aim to bring our experience to the table and even challenge the client’s initial perspective. We are interested in what our client does and how it could be done better and more efficiently.”
Although many shoppers will
return to physical stores this holiday season, online shopping remains a driving force behind peak-season shipping challenges, especially when it comes to the last mile. Consumers still want fast, free shipping if they can get it—without any delays or disruptions to their holiday deliveries.
One disruptor that gets a lot of headlines this time of year is package theft—committed by so-called “porch pirates.” These are thieves who snatch parcels from front stairs, side porches, and driveways in neighborhoods across the country. The problem adds up to billions of dollars in stolen merchandise each year—not to mention headaches for shippers, parcel delivery companies, and, of course, consumers.
Given the scope of the problem, it’s no wonder online shoppers are worried about it—especially during holiday season. In its annual report on package theft trends, released in October, the
security-focused research and product review firm Security.org found that:
17% of Americans had a package stolen in the past three months, with the typical stolen parcel worth about $50. Some 44% said they’d had a package taken at some point in their life.
Package thieves poached more than $8 billion in merchandise over the past year.
18% of adults said they’d had a package stolen that contained a gift for someone else.
Ahead of the holiday season, 88% of adults said they were worried about theft of online purchases, with more than a quarter saying they were “extremely” or “very” concerned.
But it doesn’t have to be that way. There are some low-tech steps consumers can take to help guard against porch piracy along with some high-tech logistics-focused innovations in the pipeline that can protect deliveries in the last mile. First, some common-sense advice on avoiding package theft from the Security.org research:
Install a doorbell camera, which is a relatively low-cost deterrent.
Bring packages inside promptly or arrange to have them delivered to a secure location if no one will be at home.
Consider using click-and-collect options when possible.
If the retailer allows you to specify delivery-time windows, consider doing so to avoid having packages sit outside for extended periods.
These steps may sound basic, but they are by no means a given: Fewer than half of Americans consider the timing of deliveries, less than a third have a doorbell camera, and nearly one-fifth take no precautions to prevent package theft, according to the research.
Tech vendors are stepping up to help. One example is
Arrive AI, which develops smart mailboxes for last-mile delivery and pickup. The company says its Mailbox-as-a-Service (MaaS) platform will revolutionize the last mile by building a network of parcel-storage boxes that can be accessed by people, drones, or robots. In a nutshell: Packages are placed into a weatherproof box via drone, robot, driverless carrier, or traditional delivery method—and no one other than the rightful owner can access it.
Although the platform is still in development, the company already offers solutions for business clients looking to secure high-value deliveries and sensitive shipments. The health-care industry is one example: Arrive AI offers secure drone delivery of medical supplies, prescriptions, lab samples, and the like to hospitals and other health-care facilities. The platform provides real-time tracking, chain-of-custody controls, and theft-prevention features. Arrive is conducting short-term deployments between logistics companies and health-care partners now, according to a company spokesperson.
The MaaS solution has a pretty high cool factor. And the common-sense best practices just seem like solid advice. Maybe combining both is the key to a more secure last mile—during peak shipping season and throughout the year as well.