Heavy Duty Trucking Logo
MenuMENU
SearchSEARCH

Why Trucking Companies Need to Plan Now for a Cyber Attack

Transportation and logistics companies are now among the top-targeted industries by computer hackers. What can you do to prevent and prepare for a ransomware attack or a malicious computer virus?

Deborah Lockridge
Deborah LockridgeEditor and Associate Publisher
Read Deborah's Posts
October 7, 2019
Why Trucking Companies Need to Plan Now for a Cyber Attack

 

6 min to read


Harold Sumerford, CEO of J&M Tank Lines, talks about his fleet's experience with a cyber attack.

Photo by Deborah Lockridge

When Harold Sumerford’s phone rang at 2:30 a.m. on April 2, he knew the news couldn’t be good. But he figured it was probably the safety department – not the CFO telling him the company’s entire computer system was down from a ransomware attack.

The CEO of J&M Tank Lines, Sumerford shared the headaches and lessons learned from that experience as part of a panel discussion on cybersecurity on Oct. 6 during the American Trucking Associations’ Management Conference and Exhibition in San Diego.

Ad Loading...

Although the company was able to get the email and phone systems back up in a few hours, it took four days to get functional again. While they had backups, he said, in layman’s terms, the computer system “could see the data but didn’t know what it meant.”

It was a painstaking process to go through all the lines of code and make it interpretable by the computer system. And during those four days, they weren’t able to bill any customers or enter anything into the system. Drivers got their paychecks only because J&M simply paid them the exact same amount they received the previous week.

J&M was just one example of a rapidly growing problem with cybersecurity in the trucking industry. Transportation and logistics companies are now among the top-targeted industries by computer hackers, according to the panel. 

In fact, a recent article on ZDNet reported that “hackers are deploying previously unknown tools in a cyberattack campaign targeting shipping and transport organizations with custom trojan malware.”

Sharon Reynolds, chief information security officer, Omnitracs, said normally she would put up a montage of recent cyber security headines – but there have been so many lately, you might as well just put "your company name here."

Photo by Deborah Lockridge

Trucking's Cybersecurity Vulnerabilities

Sharon Reynolds, chief information security officer for Omnitracs, explained that the “attack surface” vulnerable to hackers in the trucking industry is ever-expanding and includes:

Ad Loading...
  • CAN bus exploits on vehicles

  • Connectivity via satellite, wireless, cellular and Bluetooth

  • Internet-facing networks and platforms

Trucks, laptops, mobile phones, etc., connect to web services. Then there are web-based platforms we use such as GoToMeeting or SalesForce that are also points of connection. 

“So when you talk about the attack surface, think about the whole ecosystem,” she said. “These are all points of ingress and egress.”

The Human Factor

Sometimes the point of vulnerability isn’t technology-based at all, but human-based

Moderator Ken Craig, vice president of special projects for McLeod Software, later shared with HDT a story of a “white-hat” test probing a company’s defenses. 

Ad Loading...

The “hacker,” unable to find a weakness via computer, called the company’s main phone line and went down the company directory until he found someone whose outgoing voice mail said they were on vacation for the next two weeks.

Then he mimicked that employee’s voice to call the company’s IT help desk, saying she was having trouble logging in remotely, and got the access information needed.

“A high number of people do not survive these attacks financially,” Sumerford said. “This has to be a strategic priority.”

6 Things to do to Protect Your Company from Hackers

The panel offered a number of strategies to help prevent cyberattacks and mitigate their consequences:

1. Conduct an assessment.

Ad Loading...

Joseph Saunders, CEO of RunSafe Security, said there are many assessments available that you can use as a framework to evaluate the vulnerabilities in your organization. 

Generally, he said, there are about 100 questions to ask yourself. You can do it internally or hire an outside party to help (but don’t pay more than $15,000, he said.) It’s a good idea to do a new assessment once a year.

2. Conduct a penetration test

In a penetration test, an outside party, a “white hat hacker,” tests and probes your systems looking for vulnerabilities. Don’t tell your team you’re doing it, or they will become more vigilant and skew the results. This is a separate assessment from the self-assessment, and the results may be similar, or the white hat may find something that you did not uncover previously. 

Like the assessment, don’t just do it once. Repeat every year or two.

Ad Loading...

As an example of a penetration test, Reynolds cited the Cyber Truck Challenge held in Detroit annually. "We bring our equipment, and college students and professional white-hat hackers hack our devices in an NDA (non-disclosure agreement) environment, and we get that feedback and can go back and say you to developers, you missed this."

Joseph Saunders, CEO, RunSafe Security, talks about how to prioritize cyber security weaknesses at your company.

Photo by Deborah Lockridge

3. Prioritize the risks

You can apply a simple risk management framework, Saunders said. 

On one axis, plot the weaknesses you uncover based on the likelihood of an attack. On the other axis, plot them based on the significance of their impact. The items in the upper-right-hand quadrant that are both most likely and can do the most damage are the ones you want to address first.

“You only have a finite number of resources you can throw at this,” Reynolds added. “So identify the most critical things — but have your containment and mitigation plan in place for those critical systems.”

Ad Loading...

4. Apply software patches

Saunders compared software patches to washing your hands – it’s something that can prevent viruses, but only if you do it consistently. Yes, it’s a pain, but make it a regular part of operations and maintenance. 

Talk to your suppliers and vendors. They’re regularly coming up with fixes for weaknesses they find in their offerings, and you need to come up with procedures and practices to install them consistently.

5. Consider insurance

One of the things J&M Tank Lines did after its attack was purchase a cyber insurance plan. 

Ad Loading...

“Cyber insurance is becoming really critical,” said Omnitracs’ Reynolds. “Like any other business risk we insure for, it’s important to view it as a business risk.” 

However, companies will generally require you to put a robust cyber security program in place as part of the deal. 

“You have to have good cyber hygiene or they won’t pay.” 

Sumerford said J&M just renewed its insurance; “We have a pretty in-depth cyber security plan of action.” Which leads us to…

6. Create an incident response plan

Ad Loading...

Don’t wait until you get that phone call at 2:30 a.m. to figure out what you’re going to do if and when your company is the victim of a cyber-attack, Saunders said. 

“Knowing what to do when you get that phone call in the middle of the night is key.” 

Questions to ask yourself include:

  • Who is in charge?

  • Who gets notified?

  • Who is the response team?

  • Who is your forensics team? The panel emphasized that it’s important to build the relationship with that forensics company before you have the attack. It’s not exactly a good time to be trying to set up a purchase order with your computers down. Set up a retainer arrangement, Reynolds suggested. “This way, you can call and say, ‘It’s happened, boots on the ground.’”

  • Who is your FBI or DHS contact? Again, the time to meet your FBI or Department of Homeland Security contact is not when you’re in the middle of a cyber attack situation. “You don’t want to cold-call the FBI,” Craig said.

  • Will you pay the ransom?

Long-term solutions

Saunders said while these are good things to do in the short term, in the long term, the industry needs to find better ways to “disrupt hacker economics.”

Ad Loading...

“Often times if they can find a vulnerability in one place, they’re going to do it again and again,” he said. In fact, automated exploits are used in nearly 70% of cyber-attacks. 

“This is an underground business as sophisticated as the ones you operate. The idea is to disrupt hacker economics.”

The military has learned this lesson with drones. 

“If you think about a fleet of drones… each one is functionally identical, they have the same software, so if there’s a vulnerability on one, it exists in all. The military figured out if you could make it functionally identical but logically unique, so each one is different from an attacker’s perspective, then they have to spend a lot of time to work on each drone. This disrupts the hacker economy.”

Subscribe to Our Newsletter

More Fleet Management

A mechanic in a workshop leans over the open engine compartment of a large yellow vehicle, inspecting components while holding a tablet.
Sponsoredby Kristy CoffmanMarch 9, 2026

Smarter Maintenance Strategies to Keep Trucks Rolling

In today’s cost-conscious market, fleets are finding new ways to get more value from every truck on the road. See how smarter maintenance strategies can boost uptime, control costs and drive stronger long-term returns.

Read More →
2026 ACT Expo Speakers

ACT Expo 2026 Unveils Speaker Lineup Focused on Real-World Fleet Technology Deployment

Nearly 400 executives and fleet leaders will address AI, autonomy, zero-emission vehicles, and connected technologies at ACT Expo 2026 event in Las Vegas in May.

Read More →
thermo king heavy duty trucking
SponsoredMarch 2, 2026

How Thermo King’s AI-Fueled Telematics Drive Fleet Efficiency

Thermo King's AI-powered telematics enhance fleet efficiency with smart monitoring, predictive maintenance, and real-time insights. Improve uptime and help reduce costs with these advanced digital solutions.

Read More →
Ad Loading...
Illustration with fraud and cybersecurity images and the words "The Cyber Stop"
Fleet Managementby Ben WilkensFebruary 26, 2026

NMFTA Targets Freight Fraud and Telematics Supply Chain Risks

New carrier identity checks, industry resources, and telematics supply chain research aim to make freight fraud and cyber risks harder to exploit.

Read More →
Bobit Business Media logo displayed next to The Fleet Source logo on a white background, separated by a vertical line.
Fleet Managementby News/Media ReleaseFebruary 25, 2026

Bobit Business Media Expands Fleet Technology Platform with Acquisition of Roadz Partner Portfolio

Bobit Business Media has acquired key partner agreement assets from Roadz, expanding its role as a go-to-market partner for fleet technology providers and strengthening its digital sourcing capabilities.

Read More →
American Class 8 tractor-trailers.
Fleet Managementby News/Media ReleaseFebruary 24, 2026

ATRI Seeks Carrier Data for 2026 Operational Costs Report

The annual benchmarking study from ATRI adds year-over-year comparisons for repeat participants as fleets navigate shifting market conditions.

Read More →
Ad Loading...
Fleetworthy fleet management.
Fleet Managementby News/Media ReleaseFebruary 23, 2026

Fleetworthy Unifies Brands Under Single Banner to Streamline Fleet Readiness

Company consolidates Bestpass, Drivewyze and CPSuite into one platform aimed at reducing vendor complexity and controlling fleet costs

Read More →
Podcast thumbnail saying "Cargo Theft: Is Your Load Next?"
Fleet ManagementFebruary 23, 2026

Double Brokering, Phishing, and the Rise of Strategic Cargo Theft

Cargo theft has evolved from parking-lot break-ins to cyber-enabled strategic fraud. Here’s what fleets need to know.

Read More →
YouTube thumbnail with Scott Cornell, HDT Talks Trucking Logo, and the words, "Is Your Load Next?"
Safety & Complianceby Deborah LockridgeFebruary 20, 2026

The New Cargo Theft Playbook — And How Fleets Can Fight Back

Cargo theft has shifted from parking-lot break-ins to organized international schemes using double brokering, phishing, and even spoofing tracking signals. In this HDT Talks Trucking video podcast episode, cargo-theft investigator Scott Cornell explains what’s changed and what fleets need to do now.

Read More →
Ad Loading...
Daimler Truck North America Vice President David Carson
Fleet Managementby Jack RobertsFebruary 19, 2026

Capacity Overhang Begins to Clear, But Fleets Aren’t Ready to Spend 

Daimler Truck’s David Carson sees early signs of tightening capacity — yet buyers remain wary, extending trade cycles and resisting a pre-2027 emissions surge. 

Read More →