If you want to open a can of worms, then the best thing to do is ask a question about security problems with data. If you want to run a modern, efficient and productive transport operation, you are going to generate a vast amount of data, prompting the security question, and the can of worms.
The great thing about using modern computerised monitoring and management systems in a fleet is that it generates lots of data. The worst thing about using modern computerised monitoring and management system in a fleet is that it generates lots of data.
It is difficult to get your head around just how much data is being generated in a typical trucking fleet in the 2020s. In essence, just about everything in a road transport operation generates data, and lots of it.
Just the truck itself logs an endless stream of data, some of which is simply to enable the vehicle to function, but other data is shared with ancillary systems, like driver monitoring, load management, vehicle servicing and onboard telematics systems. All of this data is logged within the system as well as being transmitted. If the trailer has an electronic braking system, all of that data is logged and some of it transmitted to the truck and beyond.
The modern truck will also have tracking systems, onboard mass monitoring, customer and freight data, communication data, loading, compliance, and now driver hours data. All of this data will have details about the truck, the trailer, the load, the driver, their working hours, the consignor, the consignee, the goods being transported, its location and much more. That driver will be associated with a phone number, a street address, a TFN etc.
Back at base, multiply the amount of data again with data streaming from vehicles, joining data from warehouses, operations departments, compliance monitors, customer orders, accounting systems and everyone else involved in the supply chain.
This data is vital to the workings of that supply chain. It is extremely useful to everyone involved, keeping an eye on fuel costs, maintenance costs, scheduling issues, monitoring productivity and safety, optimising the operation. The management of the various stages in the supply chain use the flow of data to develop insights into improvements, ensure targets are being met and rules are being followed.
Security problems with data was clearly highlighted by the cyberattacks on the Toll organisation, starting in January last year, as the entire operation had to move over to a paper-based system until the problem was resolved. All of those transactions normally carried out automatically, had to resort to manual mode until the ransomware was cleared out.