Aaron Marsh/Fleet Owner
While fleets and trucking companies are looking to hire younger workers and fill driver shortages, could those workers also be increasing security risks?
While fleets and trucking companies are looking to hire younger workers and fill driver shortages, could those workers also be increasing security risks?
While fleets and trucking companies are looking to hire younger workers and fill driver shortages, could those workers also be increasing security risks?
While fleets and trucking companies are looking to hire younger workers and fill driver shortages, could those workers also be increasing security risks?
While fleets and trucking companies are looking to hire younger workers and fill driver shortages, could those workers also be increasing security risks?

Are millennials increasing risk for your business?

July 26, 2016
Much is said of trucking's workforce struggles not only in hiring and holding onto good workers but bringing on young ones. Even as you're trying to attract Millennials and younger professionals, could these workers be increasing security risks for your business?

Much is said of trucking's workforce struggles not only in hiring and holding onto good workers but bringing on young ones, with the median ages of truck transportation and bus service workers about five and nine years higher, respectively, than the current median worker's age of 42 across all industries.1 Even as you're trying to attract Millennials and younger professionals, could these workers be increasing security risks for your business?

One group, the Society for Human Resource Management (SHRM), has been raising this point recently in examining worker tendencies. The concept makes rational sense: young professionals have grown up with smartphones and other Internet-connected devices in their hands and apps running more and more things in their lives, from email to "wallet" finances/payment management to shopping and travel.

So part of the risk is there's a kind of normalcy that can become overfamiliarity with doing almost everything online and via computer or connected device; carry that a little farther and it becomes more like naivety and lack of healthy suspicion where it's due. Younger workers may have "a different perspective" — e.g., they may have their guard down more — when it comes to things like sharing information on social media sites, SHRM notes, and that could open the door to higher risk of data and computer security breaches.

Meanwhile, here's a damning double-statistic: IT giant Hewlett-Packard finds that three out of four, 75%, of all apps fail to properly encrypt data, and Gartner, Inc. projects that 75% of mobile security breaches will happen via apps. Information security breaches that happen through social media and other scams seeking criminal ends fall into the category of "social engineering" attacks.

Herndon, VA-based cyber security services provider General Dynamics spells out some additional risks of this kind to be aware of, including:

1. Public WiFi. Have you become less hesitant about using unsecured WiFi with your devices where it's available — airports, malls, restaurants, hotels, coffee shops, amusement parks, etc.? Have you programmed unsecured WiFi networks into your smartphone to boost service based on your day-to-day location and where you usually travel?

The honest answer for likely most of us is a shrug and a nod in the affirmative. "These connections should always be used with caution," General Dynamics advises, and it's best to avoid financial transactions or any sites where you log in/use passwords when using unsecured WiFi access.

2. Phone calls. "Phishing" and criminal activity can happen via telephone, although many phone scams prey on the elderly and perceived easy targets. However, it can happen at work, too: "Callers may sound like a vendor or familiar individuals calling to request updated credit card information, often claiming the previous card has expired," General Dynamics notes. 

3. Hyperlinks. These often take the form of email message scams, which are familiar to many. Maybe it's a message with a clever subject line designed to look like a friend sent it, or maybe it's a phony message designed to look like it's officially sent by a trusted source.

The obvious protocol you should be practicing is to be careful and deliberate about what messages (and any attachments) you open and what links you click. General Dynamics points out that it's safer to type links — particularly when doing anything financially related — directly in your web browser.  

4. Giveaways. We've all seen those emails about things too good to be true; hopefully by now, we all know they aren't and avoid them. But people still fall victim to scams that seem insignificant or benign enough not to question, such as a phishing/information-seeking scam disguised as an offer of a few free music downloads.

5. In-person schemes. This one is rarer, but information breaches can happen courtesy of an in-person scam. General Dynamics says this "bold" method would include things like a person claiming to have forgotten a key to the office or posing as a legitimate employee, such as someone in IT needing to access computers or a custodian taking away documents to shred. Some advice to protect yourself: be sure you can identify someone before you let them in or give them any access to your place of employment, General Dynamics warns.

Foreign objects introduced

Regardless of which generation they belong to, there are also the various connected devices that all of your employees likely are bringing into your work environment, try as you may to secure it. The BYOD — "bring your own device" — argument and its implications for maintaining information security are a gray area that trucking and fleet are still navigating as more fleet management, routing, telematics and other systems make their way into trucks and other commercial vehicles.

There's that end of the spectrum as well as the flip side — a policy strictly allowing only company-owned devices to be used — while other organizations are choosing a "COPE" (company owned, personally enabled) model for connected devices that's somewhere in between. According to BlackBerry, nearly half of U.S. business executives believe BYOD policies create serious risks.

Software Advice, a company that provides software reviews and market research, finds in a 2015 study that at least this much is true: Millennials and younger workers increasingly feel distressed if they're without their smartphones and/or other devices and social media. But there's some good news for Millennials in this case. Baby Boom and Generation X employees are actually more likely — 48% and 47%, respectively — to use a personal device to access work files compared with 40% of Millennials, according to the study.

Returning to sharing information on social media, however, SHRM also points to data from the Washington, DC-based Ethics Research Center showing that Millennials are more likely to engage in ethically questionable behaviors like blogging or tweeting negative things about their employers.

So all things considered, are Millennials any better or worse than employees of other generations in exposing your company to risk, intentionally or unintentionally? For the trucking industry and others, that tossed coin is still up in the air.

1 U.S. Bureau of Labor Statistics, Labor Force Statistics from the Current Population Survey.

About the Author

Aaron Marsh

Before computerization had fully taken hold and automotive work took someone who speaks engine, Aaron grew up in Upstate New York taking cars apart and fixing and rewiring them, keeping more than a few great jalopies (classics) on the road that probably didn't deserve to be. He spent a decade inside the Beltway covering Congress and the intricacies of the health care system before a stint in local New England news, picking up awards for both pen and camera.

He's written about you-name-it, from transportation and law and the courts to events of all kinds and telecommunications, and landed in trucking when he joined Fleet Owner in July 2015. Long an editorial leader, he's a keeper of knowledge at Fleet Owner ready to dive in on the technical and the topical inside and all around trucking—and still turns a wrench or two. Or three. 

And he's never without a camera, or so rumor has it.

Sponsored Recommendations

Stop Sweating Temperature Excursions

Advanced chemical indicators give you the peace of mind that comes from reliable insights into your supply chains. Compromised shipments can be identified the moment they arrive...

How Electric Vehicles Help You Prolong the Life of Your Fleet

Before adopting electric vehicles for commercial/government fleets, prioritize cost inquiries. Maintenance is essential; understand the upkeep of EV fleets. Here’s what you need...

How to Choose the Right Route Planning Solution

This free buyer's guide will help equip you with the knowledge and insights needed to analyze route planning software and vendors in the market and, ultimately, make an informed...

How to Put Your Trucking Data to Work

How fleets can overcome data overload to optimize operations and get ahead.

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!