Individual car owners

Use Case: Personal transportation, smart features, mobile app integration

Key risks

  • Keyless entry exploits (e.g., relay attacks)
  • Mobile app vulnerabilities
  • Infotainment data leakage (contacts, location history)
  • Firmware tampering in used vehicles (most buyers and dealers today don’t inspect firmware integrity in used cars, but this is an emerging risk)

Device & Access Security

  • Use signal-blocking pouches for key fobs to prevent relay attacks.
  • Set strong, unique passwords for connected vehicle apps.
  • Disable unused wireless interfaces (Bluetooth, Wi-Fi) when not in use.
  • Avoid connecting unknown USB devices to infotainment ports.

Software Integrity

  • Regularly install OTA (Over-The-Air) updates for infotainment and telematics systems.
  • Register the vehicle with the manufacturer—even if out of warranty—to receive recall alerts, software patches, and cybersecurity updates notifications.
  • During service visits, request a VIN-based software check or try booking service using the car manufacturer’s online service portal and inspect all notifications to identify available updates not listed in public databases.

Used Vehicle Precautions

  • If purchasing a used vehicle, request a dealer-level diagnostic reset. This goes beyond user-accessible infotainment resets and ensures firmware integrity across ECUs.
  • Be aware that optional updates (e.g., battery optimisation, cybersecurity patches) may not appear on DVSA recall databases but can be critical.
two cars with two different cyber security ratings

Corporate fleet operators

Telematics Control Units (TCUs) have become a standard feature in modern fleet vehicles, particularly those used in logistics, delivery, public services, and commercial transport. These embedded modules enable real-time tracking, diagnostics, and remote management, and are often essential for regulatory compliance—such as with the Electronic Logging Device (ELD) mandate, which requires automatic logging of driver hours and vehicle activity.

While TCUs offer robust functionality, many fleet operators—especially small and medium-sized businesses—are opting to use drivers’ mobile phones as a cost-effective alternative. Mobile apps can replicate many TCU functions, including GPS tracking and job dispatch, but they introduce additional cybersecurity and privacy risks if not properly secured and managed.

Key risks:

  • Fleet-wide vulnerabilities from centralised systems
  • Remote access abuse
  • GDPR violations from improper tracking or data handling (Improper or covert tracking even within businesses can breach GDPR and employee privacy laws)

Fleet-Wide Monitoring

  • Deploy cybersecurity monitoring tools across all vehicles.
  • Enforce OTA updates for infotainment, telematics, and safety-critical ECUs.

Mobile Security

  • MDM is foundational but insufficient on its own. Pair it with mobile endpoint protection software to detect phishing links, malicious SMS, unsafe networks, and rogue apps.
  • Use solutions that offer real-time threat detection, behavioural analysis, and network protection.

Network Segmentation

  • Create logical and physical boundaries between vehicle systems and enterprise infrastructure.
  • Use separate Wi-Fi networks or cellular APNs for vehicle-linked devices.
  • Implement VLANs or SD-WAN policies to restrict data flow and isolate risk.
  • Facilitate telecom-layer isolation: Route telemetry and remote commands through private APNs and VPN/MPLS backhaul to avoid public internet exposure and enforce network-level policy boundaries

Compliance & Governance

  • Align with GDPR, ELD mandates, and ISO/SAE 21434 where applicable.
  • Maintain audit trails for software updates, access logs, and data handling procedures.

Use Case: Modding, diagnostics, custom firmware

Tech-savvy vehicle owners often explore the boundaries of what their cars can do – whether through performance tuning, custom firmware, or advanced diagnostics. This hands-on experimentation can unlock new features and insights, but it also introduces cybersecurity risks that are often overlooked. From bricking ECUs to unintentionally exposing vehicle systems to remote threats, the consequences of poorly vetted tools or modifications can be significant.

Key risks:

  • Bricking ECUs or exposing vulnerabilities
  • Installing unverified third-party tools
  • Unintentionally sharing sensitive data
  • Use only trusted diagnostic and flashing tools.
  • Avoid jailbreaking infotainment systems or bypassing OEM security layers.
  • Maintain backups of original firmware before making modifications.
  • Understand the legal and warranty implications of software changes.

As vehicles evolve into software-defined platforms, cybersecurity must evolve with them. By segmenting advice based on user type, we can better address the unique risks faced by individuals, small businesses, fleet operators, and public sector teams. Whether you’re buying a used EV, managing a delivery fleet, or deploying emergency vehicles, proactive cyber hygiene is no longer optional—it’s essential.

As we wrap up this series on automotive cybersecurity, it’s evident that securing our vehicles is both challenging and essential. We’ve explored the transformation of modern cars into sophisticated data centres on wheels, the cybersecurity threats they face, and the innovative solutions being developed to counter these risks.

From understanding the evolution of vehicle connectivity and the expanding attack surface to examining real-world incidents and speculative scenarios, we’ve highlighted the critical need for robust cybersecurity measures. The industry’s response, driven by regulatory frameworks, architectural shifts, and embedded defence technologies, underscores the importance of staying ahead of potential threats.

As we look to the future, the integration of modular, upgradable, and user-controllable security systems will be key. The collaboration between OEMs, third-party providers, and consumers will shape the landscape of automotive cybersecurity, ensuring that vehicles remain not just connected but secure.

Thank you for joining us on this journey. Stay vigilant, stay informed, and drive safely.