01
Third Party ‘Push’ Access
Updating devices, once a slow but secure manual process, has been revolutionized by maritime hyper-connectivity. With speed and ease, however, come new cyber vulnerabilities for malicious updates to be automatically pushed through unnoticed.
02
New Digital Devices
While more technology can greatly improve the safety, efficiency, and sustainability of a vessel, it creates previously unconsidered cyber vulnerabilities that demand overhauled safeguards for devices and networks.
03
Connected OT
As maritime OT devices progress into the realm of connected technology, new protocols and access methods open doors to system vulnerabilities. With increased connectivity comes an urgent need to rethink system protection.
04
Crew Web Usage
As the vast majority of shipping companies provide onboard crew internet connectivity through satellite networks, new attack vectors like phishing and malware from compromised apps and websites arise. This requires new defenses, like crew network isolation and constant network security monitoring to ensure the protection of a vessel’s essential systems.
05
Cloud Services
Benefactors of maritime hyperconnectivity have jumped on the opportunity of cloud service implementation. This enhanced convenience, however, destroys the ‘internal-external’ perimeter of the past with vulnerable cloud technologies that demand overhauled cybersecurity measures for proficient protection.
01
Network Access Controls
To address the growing diversity of devices and users, we implement enhanced network segregations, access controls, and comprehensive monitoring of an expanded range of network protocols, mainly focusing on Operational Technology (OT). This is also mandated by new maritime cybersecurity regulations.
02
Device and Application Controls
New attack surfaces introduced with hyper-connectivity and the service it enables cannot be solved by network monitoring only. Devices must be scanned for vulnerabilities, and their usage must be monitored, as compromised devices can produce seemingly legitimate traffic with abnormal patterns.
03
Crew Monitoring
With limited connectivity, segregating the crew network was usually sufficient as there was little activity from crew devices. However, hyper-connectivity opens the door for new risks. We recommend paying specific attention to crew usage because social engineering methods are so commonly used for exploitation.