Connected cars and threat landscapes

Connected Cars and Threat Landscapes

“If somebody wants to interfere with a car today then generally they have to go to the car itself. But as soon as it’s a connected they can be anywhere in the world – your threat landscape is quite significantly different and the opportunity for a hack is much higher” said Intercede’s Chief Innovations Officer, Nick Cook, quoted in a recent BBC comment on connected car security.

A widening ‘threat landscape’ is something Intercede has been developing solutions for, over the last 15 years.  As consumers, we’ve gradually poured more and more of our lives into ‘the cloud’, relying on the security practices of our service providers and their products, often based half a world away from us. In 2017, we sit at the cusp of a seismic shift in said threat landscape: the “Internet of Things” (IoT) and with its advent our focus as a Company on securing connectivity has sharpened. 

Previously, cybersecurity practises have been largely intended to protect personal data: our banking, social media accounts, email etc. Usernames and passwords were considered generally ‘adequate’ at providing the necessary protection.   In fact, it transpires, they never were and their inherent vulnerabilities have resulted in millions of hacked records worldwide!  When you start connecting cars, pacemakers, and cameras to the internet, cyber security becomes a matter of personal security and removal of the outdated, clumsy password paradigm becomes critical.  

We’ve seen already how connected cars can have very real security flaws, as well as how harnessing the IoT with malicious intent can bring much of the internet to its knees. It’s up to manufacturers to reconsider the foundation of their cybersecurity protocol with connected things, making sure every link in the cybersecurity chain is completely secured, to ensure we’re able to reap the benefits of the IoT without unnecessary risks. 

Our solutions establish a secure digital identity between the user and service provider, without the use of passwords and right down to the device and even chip-levels.  Built with best-in-class security components such as multi-factor authentication, 2-way SSL, PKI Certification, Encrypted Keys and trusted workflows, Intercede’s solutions offer the protection for securing the IoT and its connected devices, without a single password in sight! 

To learn more, click here.

Trusted by Governments and Enterprises Worldwide

Where protecting systems and information really matters, you will find Intercede.  Whether its citizen data, aerospace and defence systems, high-value financial transactions, intellectual property or air traffic control, we are proud that many leading organisations around the world choose Intercede solutions to protect themselves against data breach, comply with regulations and ensure business continuity.