Tag Archives: cybersecurity

Yogi Berra Was Right

car rear view mirror reflecting a roadBy Shawn Conrad, CAE

I recently had a flashback to the ’90s, when I and others were focused on how to fully use the data our new management system was generating. A colleague shared with me an article written by Philip Agre, a former UCLA professor. Dr Agre’s focus was artificial intelligence; he was later identified as a social scientist focused on the social and political aspects of networking and computing. While he recognized the potential of future breakthroughs and opportunities that come with technology, he was also a vocal critic who sent up warning flares about how these new technologies—and the data they collected—could be harmful in the wrong hands.

Fast-forward to the hot days of late summer 2021, and I find myself reading an interesting Washington Post article by Reed Albergotti: “He predicted the dark side of the Internet 30 years ago. Why did no one listen?” It covers Dr. Agre’s predictions as they relate to now, when computer systems and organizations are under attack by global hackers.

A reminder of Dr. Agre’s predictions came full circle when I heard Grant Dawson, VP of information technology at T2 Systems, conduct an IPMI online course on cybersecurity and the rapid shifts in technology that have created new opportunities for cyber criminals. Dawson provided examples of our industry’s vulnerabilities and emphasized how employees—not just security software—can play a significant role in keeping your data safe. It was an excellent session and one we plan to repeat in the months ahead.

Maybe as I was remembering Dr. Agre and listening to Grant’s webinar, I should have also been thinking of what baseball laureate Yogi Berra once said: “It’s like déjà vu all over again.”

Shawn Conrad, CAE, is IPMI’s CEO.

Behind the Keyboard: Cybercrime and Parking

Parking & Mobility February 2020 coverDuring the past generation, parking has become incredibly technology-centric with the introduction of parking guidance technology, frictionless parking suites, and more advanced parking access revenue control systems (PARCS) making parking more convenient and manageable than ever before. Parking professionals just a generation ago could never have predicted the evolution of parking technology would lead us here.

The technification of parking has a dark side, too. As parking becomes increasingly automated, parking operations grow more vulnerable to cyberattacks and digital terrorism. There are many different threats, they come from a multitude of directions, and it’s essential for parking professional to understand where the threats lie, what the criminals are looking for, and what they are trying to accomplish.

In the February issue of Parking & Mobility, David Waal, co-founder of Parking Sense USA, breaks down the cyberthreats industry professional need to consider and what they can do to protect themselves from ugly situations–including information everyone on staff should know. “Remember,” he writes, “You are already under attack–every moment of every day. Take the necessary precautions.” Learn what those are here.

Cybersecurity Concerns and AVs

What happens if the autonomous vehicle you’re in gets hacked? Experts say it’s not a small concern and keeping the driverless cars’ data and systems secure should be top of mind. But they also say developers may not have considered all the possible risks.

Tripwire‘s State of Security blog addresses several areas AVs might be at risk:

  • If a hacker accesses the cloud database used by an AV, the car can be manipulated remotely.
  • Encrypting data for some safety features could slow down those features, but leaving them open makes them very vulnerable to hacking–and hackers could shut them down completely.
  • Every system made by each manufacturer uses its own coding system–there is no universal standard. If those manufacturers don’t all adhere to security standards or consider all risks and address them, some cars could be easily accessed by criminals.

Manufacturers’ resistance to sharing their technologies with each other, the blog says, raises the risk of hacking or other security flaws. And that’s a very scary thing. Read more about it here.  Then let us know in the comments: Valid concerns or not enough information in play?