Embracing cybersecurity beyond the back office to over the road

S A99lg K5t R Cls2 Headshot
Updated Jan 9, 2026

Enterprise cybersecurity, which guards back-office systems like servers and computers against threats such as email phishing scams, is often treated as separate from asset cybersecurity, which defends trucks from remote attacks via telematics.

Typically, focus is placed on securing the former, as it tends to be the most targeted attack surface. However, Ben Wilkens, a cybersecurity engineer at the National Motor Freight Traffic Association (NMFTA), spoke during a recent webinar about the importance of treating both as one. This is because cybercriminals can attack assets through back-end systems—and conversely, they can infiltrate back-end systems via the assets themselves.

Amadou Kane, senior solution architect and engineer of automotive cybersecurity at VicOne Automotive, shared several real-world scenarios during the NMFTA’s “Securing the Future of Freight” webinar. He detailed how vehicles have become targets and how fleets can build resilient freight systems and a robust cybersecurity posture in a world that has transitioned from traditional electrical systems to IoT-enabled connectivity.

[RELATED: Prepare for the evolving cyber threat landscape of 2026]

Kane noted that while connectivity has benefited fleets with increased productivity and efficiency, it has also expanded the attack surface, creating greater risk. “What if a hacker sitting anywhere in the world could stop an entire fleet with one keystroke?” Kane asked. “Ten or 20 years ago, this wasn't really something we had to think about, but with today's connectivity, it is a question we must ask ourselves.”

The expanding attack surface area

The attack surface has moved beyond office IT systems to wherever a fleet has a vehicle deployed. Telematics systems, electronic logging devices (ELDs), driver monitoring systems, and dash cameras are all assets that can contain vulnerabilities and be compromised remotely.

Cybercriminals can also launch attacks via Bluetooth or Wi-Fi. Kane explained that Wi-Fi attacks typically target driver monitoring systems or dash cameras, while telematics systems are often accessible via Bluetooth. “You can exploit them to gain full control of these vehicles and bring them to a complete stop,” he said.

Partner Insights
Information to advance your business from industry suppliers

VicOne researchers demonstrated this in a real-world scenario by attacking an ELD. This breach granted them full control of the vehicle—from accelerating and braking to steering and operating the windows.

Another scenario Kane highlighted was GPS spoofing. A hacker can manipulate an asset's tracking data via the telematics system to hide a shipment's location, allowing thieves to steal high-value loads. Kane anticipates that sensor spoofing will also become a major attack vector over the next five years as fleets begin rolling out autonomous vehicles.

Building resiliency

Kane outlined a four-step approach to creating a resilient cybersecurity posture:

  1. Risk assessment and vendor vetting: It is critical for fleets to ensure their suppliers have embedded security. Kane suggests fleets require a Software Bill of Materials (SBOM) from vendors. Fleets can also request the product's binary code to scan for vulnerabilities themselves using a management tool, repeating this process whenever updates are released.
    • For smaller fleets: Kane recommended an assessment questionnaire. Ask providers how many vulnerability-related incidents they have experienced in the last five years, what percentage of their code is open-source versus internal, and if they are compliant with ISO/SAE 21434 (the international standard for road vehicle cybersecurity).
  2. Real-time threat intelligence: Stay informed on industry trends, new attack methods, and execution tactics to keep mitigation plans updated.
  3. Cloud security: Secure the back end. “Your back end is just as important because it can compromise your assets and lead to ransomware,” Kane warned.
  4. In-vehicle security: Implement intrusion detection and prevention systems (IDPS) within telematics. While fleets often rely on OEMs and suppliers for this, vetting these partners ensures the technology is in place.

“Cybersecurity is the new safety,” Kane concluded. “Something cannot be safe if it is not secure.”

Angel Coker Jones is a senior editor of Commercial Carrier Journal, covering the technology, safety and business segments. In her free time, she enjoys hiking and kayaking, horseback riding, foraging for medicinal plants and napping. She also enjoys traveling to new places to try local food, beer and wine. Reach her at [email protected].