Skip to Content

How safe is your car?

June 14, 2017 Article 1 min read
Joe Oleksak
Managing cybersecurity threats in today's rapidly changing technology landscape presents no small obstacle for OEMs. Collaboration is critical to identifying, detecting and resolving threats across all stages of production and suppliers.
Curve ahead sign It’s imperative automotive companies competing in today’s market leverage information technology to maximize production efficiency while effectively controlling and securing their informational assets, customers’ private data, and more importantly, car safety. The technology landscape is rapidly changing with the introduction of connected car technology, mobile technology, open source development, cloud computing, and more.

There are multiple entry points in a car that need to be secured, from component production to design and assembly.

Managing cybersecurity threats in cars is not a simple task for any OEM. The safety of cars is at stake if risks are not mitigated at all stages of production. There are multiple entry points in a car that need to be secured from component production to design and assembly. In addition to OEMs, a number of third parties, from auto parts suppliers to technology companies, are involved in building a car. Cybersecurity needs to be addressed by each party in collaboration, and at the same level, with OEMs.

Preventing threats

Organizations value and view cybersecurity, risk, and control differently. Some of these differences are related to risk and threat profiles impacting an organization based on factors such as industry, location, product/services, etc. Other differences are related to management’s view of or commitment to security, and some are based on prior security incidents in the industry. Regardless, OEMs, auto parts suppliers, and after-market manufacturers need to evolve their security and control frameworks to meet the changing landscape.

Recognizing threats

It is just a matter of time before cybersecurity threats are realized in cars. Below are some examples of potential threats:

  • Bug at auto parts supplier
  • Trojan in after-market product
  • Man-in-the-middle attacks at auto dealer
  • Data or IP loss at OEM
  • Call center phishing attack
  • Car mobile app hack
  • Drive-by attacks
  • Exploiting known vulnerabilities

Addressing threats

To address cybersecurity threats in cars, OEMs will need to collaborate with auto suppliers, after-market suppliers, auto dealers, technology companies, and our cybersecurity experts. To assist in defining appropriate security practices or assessing existing control structures, Plante Moran has developed a comprehensive and proven methodology to assist our clients’ obligations to protect the confidentiality, availability, and integrity of their information and IT assets, as well as compliance with various security and privacy regulations. Plante Moran’s “House of Security” framework allows an organization to address cybersecurity from the IT infrastructure to the automobiles.

Related Thinking

Two business professionals in casual clothing using a handheld tablet device together while standing.
June 18, 2024

Cybersecurity essentials for franchises: Prevent, respond, comply

Article 7 min read
Food and beverage cookie manufacturer equipment using smart manufacturing processes.
June 3, 2024

Cybersecurity in food manufacturing: Ransomware threats

Article 3 min read
Cybersecurity professional on their laptop in a server room.
April 29, 2024

Bridging the widening cybersecurity skills gap

Article 5 min read