Should today’s cars be more like Fred Flintstone’s?

Flintstone's
The Flintstones’ GPS system didn’t say, “Wilma … you’re hacked!”

While Fred Flintstone’s  car was driven by his feet, many of today’s cars are computer controlled. Your auto’s computer offers much greater connectivity than Fred’s feet: it contains your private information.

According to the National Highway Traffic Safety Administration, “The same way computers need to be protected from hacking, vehicles must be protected from malicious cyber-attacks, unauthorized access, damage, or anything that might interfere with normal functions.”

All passengers in Fred Flintstone’s car had to worry about was Dino sticking his neck out through the roof. Today’s drivers and passengers should be concerned about criminal hackers taking over the steering wheel while the car is moving. Drivers who unlock and start their autos using an app run the risk of a criminal hacker stealing their car. Entertainment and navigational systems can be hacked. Calls can be intercepted, and conversations listened to.

Protect your organization

We are no longer cave people like the Flintstones, so we recognize the need for connectivity. We also recognize the need to be secure and are happy to see that measures are being taken to protect our devices and information from unauthorized access.

According to the Auto Alliance, “Like many industries, auto engineers use ‘threat modelling’ and simulated attacks with the latest methods to test security and to help design controls to enhance data integrity.” Many organizations are doing something similar. 

No matter which industry or sector your organization operates in, it must follow information security best practice.

ISO 27001

ISO 27001, is the international standard that describes best practice for an ISMS (information security management system). Achieving accredited certification to ISO 27001 demonstrates that your company is following information security best practice, and delivers an independent, expert assessment of whether your data is adequately protected. ISO 27001 is supported by its code of practice for information security management, ISO/IEC 27002:2013.

Learn how by signing up for IT Governance USA’s ISO27001 Certified ISMS Lead Auditor Online Masterclass training course, which runs from March 4–8, 9:00 am – 5:00 pm PST. 

It will help you build your career in information security audit or ensure your organization achieves ISO 27001 certification. This fully certificated, practitioner-led course equips you to execute an ISO/IEC 27001:2013-compliant ISMS (information security management system) audit. Learn from experts with real-world expertise and insights.

Register here.