100319616 | Vitpho | Dreamstime.com
67b759127e8dee923b783078 Dreamstime L 100319616 1

Wilkens: Open source tech shouldn't open doors to cyberattacks

Feb. 27, 2025
Cybersecurity isn’t just a technical issue; it’s a fundamental business concern. The same characteristics that make Linux powerful also make it a target.

The trucking industry increasingly relies on technology to manage fleet operations, optimize routes, and ensure compliance with regulatory requirements. This is not a new phenomenon; it is a continuing trend.

Many of the backend systems that keep operations running—dispatch systems, telematics platforms, electronic logging devices, as well as a significant portion of cloud-based infrastructure and tracking software—run on Linux. Unlike Windows, Linux is an open-source operating system known for its flexibility, efficiency, and security.

See also: How fleets can prepare for cyber threats in 2025 

However, it is important to understand that Linux is not invulnerable to cyberthreats. The same characteristics that make it powerful also make it a target. Threat actors are always looking for ways to compromise Linux-based infrastructure. While Linux is often viewed as more secure than Windows, failing to implement proper protections can expose companies to serious risks, including ransomware, data theft, and extortion.

Understanding the unique security challenges of Linux systems and mitigating those Linux-specific security risks is essential. Ensuring your IT or security team follows Linux OS security best practices will strengthen resilience against cyber threats and help protect the critical systems that keep your operation moving.

One of Linux’s biggest strengths is its multi-user environment, which allows different users different access levels. However, this also creates security challenges. If an organization does not carefully manage who has access to its systems, unauthorized users—including attackers—could potentially gain control over critical servers, tracking systems, and more.

See also: NMFTA releases 2025 Trucking Cybersecurity Trends Report

To mitigate these risks, businesses should enforce strict access controls. Linux systems allow for Role-Based and Attribute-Based access control, meaning that users can only be given the permissions required to complete their assigned duties. For example, a dispatcher should not have any access to administrative system settings. Default ports for remote access protocols should be changed and multi-factor authentication should also be enabled for all remote and privileged access to Linux systems. While Linux’s built-in authentication mechanisms are strong, they are not immune to compromise. Adding this additional layer of identity verification greatly reduces the risk of attackers exploiting stolen credentials to access critical systems.

Cybercriminals often exploit known vulnerabilities in outdated software. While Linux distributions are generally quick to release security patches, they only protect a system if installed promptly. Patches and upgrades should always be tested in an offline test environment or sandbox when possible to rule out the introduction of adverse behavior or incompatibilities with operations-facing software or services. Maintenance windows should be scheduled to allow for the application of all approved patches on live systems to minimize interruptions to the operations environment.

Where Windows systems often have security tools built-in and on by default, Linux systems require proactive logging and monitoring to detect suspicious activity. Centralized logging and a security information and event management system can also help detect patterns of suspicious behavior across an organization. Detection of system configuration changes is also critical.

Data should be encrypted when at rest on any system or in transit between systems. It should also be backed up regularly using encrypted backups and stored both locally (on-premises) and remotely in a secure cloud location—preferably using immutable storage that an attacker cannot modify or delete.

While business leaders don’t need to be Linux experts, they do need to prioritize security and ensure that their IT and security teams follow Linux-specific best practices. By controlling system access, keeping software updated, securing remote access, monitoring for threats, and encrypting critical data, fleet owners can ensure that their teams build resilient, secure technology infrastructure to support their business operations and support their end goal of moving freight safely and efficiently.

Cybersecurity isn’t just a technical issue; it’s a fundamental business concern. A well-secured Linux environment reduces downtime and helps to lower the risk of costly cyber incidents.

About the Author

Ben Wilkens

Ben Wilkens, CISSP, CISM, is a cybersecurity principal engineer at the National Motor Freight Traffic Association. In his role at NMFTA, Ben spearheads research initiatives and leads teams dedicated to developing cybersecurity technologies, methodologies, and strategies to safeguard information systems and networks. He collaborates with academic institutions, industry partners, and government agencies to advance cybersecurity practices and knowledge.

Voice your opinion!

To join the conversation, and become an exclusive member of FleetOwner, create an account today!

Sponsored Recommendations

The Road Ahead: 2025 Trucking and Fleet Insights

Discover how fleet operators are impacted by challenges like driver onboarding delays and complex compliance, and the critical need for technology to boost efficiency and cut ...

Driving Growth: How to Manage More Freight

Ready to grow your trucking business? Whether you have 25 or 200 trucks, this guide offers practical tips and success stories to help you expand with confidence. Discover how ...

How to Maximize Fleet Management with Vehicle Bypass

Watch now to learn how truck weigh station bypass systems boost fleet performance and driver satisfaction.

Optimizing your fleet safety program using AI

Learn how AI supports fleet safety programs with tools for compliance monitoring, driver coaching and incident analysis to reduce risks and improve efficiency.