All posts by Nick Kozoro

DG Technologies at their TMC trade show booth

DG Invites YOU to Booth #2540 at TMC Annual 2026

We want to personally invite you to the DG Technologies Truck-Connect booth (2540) at TMC Annual 2026 in Nashville, TN, during the show from March 16th through March 19th.

DG Technologies at their TMC trade show booth

This year, we are introducing our brand new DPA XL PRO hardware adapter. With WiFi and Bluetooth, DoIP and D-PDU protocol capability and new advanced security features. Secure, Connected, Easy! Use the DPA XL PRO and other DG Technologies products with our new DGD PRO software application, with J1979-2, graphing multiple data parameters, gauges, DPF regen, read/clear fault codes, create reports and more!

We will also feature our secure software suite in the Truck-Connect portal showing a dashboard of trending data, utilization and information to help keep your trucks on the road, highlighted by the DPA Inspect CARB-compliance software, DPA Health and Blue Bird bus NEAT software for Predictive Fleet Maintenance.

At our booth this year, we will have DG Technologies President and Founder Mark Zachos, known for his expertise in the industry. Mark has served as Chairman for several technical standards Task Forces with direct involvement for more than 20 technical light and heavy-duty vehicle standards and Recommended Practices, including SAE J1939 Network Security Task Force, and TMC Cyber Security Task Force (S.5).

DG Technologies has a proven track record of success and expertise at TMC, with On-Board Vehicle Electronics, Cybersecurity, and innovative technical leadership, there is so much to learn at booth 2540 this year. One platform to power your uptime!

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

The Role of AI in Cybersecurity in 2026

The following cybersecurity column by Mark Zachos, president and founder of DG Technologies, recently appeared in the Winter 2026 issue of Fleet Maintenance & Technology, the quarterly magazine published by the American Trucking Associations (ATA) Technology & Maintenance Council (TMC). Zachos also chairs the TMC Cyber Security Task Force. 

The Role of AI in Cybersecurity in 2026

By Mark Zachos

Looking at cybersecurity predictions for the upcoming year, you’d be hard-pressed to find a list that does not predominantly involve artificial intelligence (AI).

AI is engrained into much of what we do online – allowing access to even more immediate information and compressing once-complex and time-intensive tasks into those that can be accomplished with just a few lines of instruction and the simple push of a button. In trucking, AI together with telematics can help fleets run more smoothly, more safely and more cost-effectively.

Fleet management technology has evolved dramatically, becoming smarter and more practical for day-to-day operations. Telematics systems monitor everything from a truck’s exact position to how hard the brakes are being pushed, how much fuel is being burned on each trip and even when a driver is idling too long. The constant stream of real-time information gives managers a clear picture of performance, highlighting where efficiency can be improved.

An efficient and effective productivity tool, AI builds on all of that data by transforming it into useful guidance, like recognizing trends in driver behavior, flagging early signs of mechanical issues before they cause breakdowns and forecasting when a vehicle will need maintenance. AI can also recommend optimized delivery routes by taking into account construction zones, road closures and weather.

Almost daily, we’re learning new ways for AI to enhance and streamline industry. However, at the same time, AI is also productive for cyber criminals because it allows them to more easily create exploits, or attacks, that then go out and phish for information. Further, it can create ways to attack equipment by helping guess passwords or by helping attackers better understand the actual bits and bytes of CAN JBUS messages to decode them.

But while attackers have an advantage with AI as a tool, on the other side, we “good guys” also have an advantage in using it to help bolster our defenses against cyberattacks.

Steven Piper, a certified information systems security professional (CISSP), believes that, at least for now, AI will still continue to give IT security teams the advantage.

“I don’t know if threat actors are ever going to have the upper hand with AI,” Piper said in November as part of a webinar on his “Top 5 Security Predictions for 2026” for the International Information System Security Certification Consortium (ISC2).

Head of marketing and research firm CyberEdge Group in Fort Lauderdale, Fla., and cybersecurity online news source Security Buzz, Piper included in his predictions an uptick in high-profile attacks involving deepfake photos, audio and video, and agentic AI becoming “a game-changer for information security teams over the next three years.”

Unlike AI, which simply makes recommendations or analyzes data, agentic AI uses machine learning models to take action on its own to achieve a goal – deciding what steps to take, carrying them out, then adjusting behavior as conditions change.

In trucking, this might look like AI autonomously adjusting delivery routes without human assistance to avoid storms or road closures, or re-planning delivery schedules and automatically contacting customers when a driver is delayed. It also could look like automatically scheduling repairs, ordering parts and booking repair shop appointments when AI detects early signs of engine trouble.

Like AI in recent years, agentic AI also opens the door to more cyberattacks and raises the stakes for trucking and other industries due to its capacity to make cyberattacks more automated, more adaptive and more persistent.

In place of a human initiating an attack, agentic AI acts on its own, mining for weaknesses, adjusting tactics as needed and carrying out other parts of attacks without supervision, making human threat actors even faster, stealthier and more efficient. For sectors as interconnected as trucking, that means cybersecurity should be viewed as just as essential as maintenance or route planning.

With new capabilities like agentic AI transforming the security landscape, both defenders and adversaries now have unprecedented power. But one constant remains – people continue to be the greatest vulnerability, and the greatest asset, in any security program.

Most cyber incidents don’t start with a sophisticated hack, but with human error. Someone clicks a convincing link, reuses a weak password or rushes through a process that should have been double-checked.

Some simple, impactful security measures organizations can take include requiring employees use long passwords and multi-factor authentication, using phishing simulation software to train staff to pause before clicking on questionable links and to encrypt files containing sensitive information and data.

Organizations also can implement role-based security, authorizing employees at different levels to perform different operations, for instance, having controls around who is authorized to change passwords, or which employees have access to certain data and decryption keys for encrypted data. Human risk management reduces everyday vulnerabilities by building habits, awareness and systems that help people in an organization make safer choices.

Technology is only going to keep advancing and, with that, threats will keep intensifying. The individual organizations that succeed in 2026 will be the ones that align their strategies, their tools and, most importantly, their people.

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

VSI NxGen graphic showing version 3.17 is now available for download

VSI NxGen Version 3.17: Now Available!

VSI NxGen Version 3.17, Now Available for Download!

DG Technologies, #1 in Secure Diagnostics, has just released the latest VSI NxGen software update on the DG Technologies downloads page.

What’s improved in v3.17:

  • More accurate vehicle communication detection to prevent false fault codes
  • Expanded support for additional vehicle communication methods
  • Faster message handling for quicker diagnostics and programming
  • Improved compatibility with older and specialized vehicle systems

This new version offers speed, compatibility

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

DPA XL Version 3.17 is now available for download. Graphic showing DPA XL product.

DPA XL Version 3.17, Now Available for Download!

DPA XL Version 3.17, Now Available for Download!

DG Technologies, #1 in Secure Diagnostics, has just released the latest DPA XL software update on the DG Technologies downloads page.

This new version offers speed, compatibility and cybersecurity like no other product on the market today to Protect Your Uptime!

What’s improved in v3.17:

  • More accurate vehicle communication detection to prevent false fault codes
  • Expanded support for additional vehicle communication methods
  • Faster message handling for quicker diagnostics and programming
  • Improved compatibility with older and specialized vehicle systems
  • Connects quicker with DPA Inspect software for CARB compliance with the Clean Truck Check program

Remember to check Truck-Connect.com to find more ways we are driving innovation to Protect Your Uptime! Find out how DPA Health can enhance fleet maintenance efficiency.

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

Jessica H. administers DG's VDOT Training Program at the DG Technologies Headquarters in Farmington Hills.

Coordinating VDOT: What It Takes to Administer DG’s VDOT Training Program

Coordinating VDOT: What It Takes to Administer DG’s VDOT Training Program

By Becky Burns

Ask Jessica Howlin to describe her job as administrative program assistant with DG’s Virginia Department of Transportation (VDOT) Training Program and she laughs. “It’s a lot of spreadsheets!”

But then ask her what the best part of her job is and she gets serious: “It’s the customer    relationships.”

Jessica H. administers DG's VDOT Training Program at the DG Technologies Headquarters in Farmington Hills.

Whether she’s creating a spreadsheet for a new training class, following up on a payment to an instructor or attending a quarterly VDOT meeting in Virginia, everything Howlin does boils down to the managers, mechanics, instructors and DG Technologies co-workers she interacts with day-to-day as part of DG’s partnership with the State of Virginia.

Broken up into nine districts, she explains, “VDOT has 250 technicians/mechanics and the training program is continuing education for them. So, we manage the training, certifications and industry memberships for them.”

Ken Sturdevant had been heading DG Technologies’ VDOT Laptop Program for about a decade when a few years ago he secured a bid for DG to coordinate and provide support for the agency’s in-house mechanics training program. He hired Howlin, bringing her on board in the company’s Farmington Hills, Mich., headquarters in 2023, to make it all happen.

With little information to go on from the previous company VDOT had contracted with for the work, Howlin needed to create her own roadmap for the program. That involved working closely with VDOT managers and asking a lot of questions. What resulted was an organized system for coordinating training class schedules statewide, creating monthly reports, maintaining VDOT’s training website and more. Her role also includes crosschecking with the National Institute for Automotive Service Excellence (ASE) to learn which individual VDOT mechanics are eligible for what tests and to register them when they are.

“I enjoy all the people I work with and I enjoy all the successes they have,” she says. As the one who keeps track for VDOT of whether individual mechanics pass or fail their testing, it makes her happy to see when they receive their certifications and are eligible for promotions.

Also responsible for teacher schedules and invoicing, Howlin looks at what training VDOT needs at any given time and then contacts the appropriate instructor from her go-to list for subjects like hydraulics, welding and shop safety, bringing them to Virginia from all over the country. Last July through winter, she says, one instructor from Arizona was at VDOT every other week training on topics like Ford gas engines, Navistar systems and diesel engines.

For much of her first year at DG, everything Howlin did was by email, phone and Zoom. Since then, she has accompanied Sturdevant and Paul Hamburg, who coordinates DG’s VDOT Laptop Program, to two DG quarterly meetings to meet with VDOT managers. When she can’t be in Virginia for the quarterly meetings, she attends them on Zoom, but she prefers being on-site.

“You get more out of having in-person conversations with people,” she says. “I like being able to see the people I talk to all the time on the phone. I think there is value added to seeing the customer face-to-face. It builds a good rapport.”

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

Cyber Week Specials from DG Technologies!

Cyber Week is here! Call DG Technologies, the experts in Secure Vehicle Network Solutions, for our Cyber Week special, featuring a FREE DPA XL with the purchase of a DPA Health subscription at a NEW SPECIAL PRICE! Call now through Friday and DO NOT miss out on this deal!

ABOUT DPA HEALTH:

DPA Health is a PC software application that runs on a laptop, plugs into the truck through a DG Technologies DPA XL. The software securely extracts data from the vehicle network, sends that encrypted data to the cloud through your wireless connection from the PC and in less than 5 minutes you can see the results for state of health of your vehicles electrical system components. Fleet managers and owners can then log into the www.truck-connect.com portal and get an overall view of their entire vehicle fleet.

Electrical Health System Monitoring: Modern vehicles are becoming more electrified and integrated with multiple ECUs and sensors, which make them smarter in terms of engine diagnostics, performance, fuel efficiency, security, safety and stability. So the ability to save time while monitoring those systems in your fleet is critical to protecting your uptime. All this from DG Technologies, the company that brings you the #1 products and services for secure diagnostics and predictive maintenance. DPA Health provides a portable diagnostic solution for your vehicles’ electrical applications. It is a predictive analytic tool set that assesses the current condition of the primary electrical systems:

  • Battery / Battery Pack Health
  • Starting System Health
  • Charging System Health

The use of the vehicle CAN communication network messages allows for downloading of data, scheduling of maintenance, and integration with other fleet management systems.

The DPA Health analysis is done in the cloud and reported back to the technician on the PC within seconds of completing the test sequence.

DPA Health and the www.truck-connect.com cloud portal access is designed to work with a laptop and a DG Technologies DPA XL.

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

 

Made by Canva AI. A hacker for the 7 stages of the cyber kill chain article

The Seven Stages of the Cyber Kill Chain

This article (Seven Stages of the Cyber Kill Chain) was originally published in the Winter 2025 issue of Fleet Maintenance & Technology magazine.

The Seven Stages of the Cyber Kill Chain

Knowing the steps of a cyberattack can help mitigate damage to an organization

By Mark Zachos

Given the critical role that trucking plays in the supply chain, it’s not surprising that the industry is an attractive target for cyber criminals — which makes understanding the Cyber Kill Chain essential.

Having a grasp of what a Cyber Kill Chain is and being able to identify its seven stages can give fleets an advantage when it comes to heading off cyberattacks.

The term “Cyber Kill Chain” was coined in 2011 by Lockheed Martin, the American defense, information security and technology company, and it refers to the set of cyberattack stages leading up to a successful cyberattack. In the trucking industry, it could involve things like phishing emails or vulnerabilities in outdated software allowing an attacker to target logistics data, fleet management software or even vehicle control systems. And the results could be detrimental: disruption of deliveries, data breaches, financial losses or even potential accidents on the road.

With the emergence and accelerated growth of artificial intelligence (AI), it is important to recognize and prepare for the fact that what once would take hackers weeks to successfully pull off, may now take only days, or even hours, and makes knowledge of the Cyber Kill Chain even more vital today.

Lockheed Martin developed its Cyber Kill Chain as a framework made up of seven sequential stages with the idea that if an organization knows how to identify a potential threat at any phase in the process, it has a better chance of breaking the chain of attack and stopping an attacker from successfully infiltrating and compromising its security.

Understanding the Cyber Kill Chain Framework

The Cyber Kill Chain provides valuable insight into the phases of a cyberattack. Knowledge of these cyberattack stages enables fleets and other organizations to proactively identify and block attacks at each stage as well as aid in determining what areas need protecting.

Stage 1: Reconnaissance This phase involves compiling information about the target company or system. The attacker collects data about potential vulnerabilities, company personnel, technologies and network infrastructure.

Stage 2: Weaponization The attacker then creates malicious software, such as viruses or Trojans, and pairs them with an exploit – a program or piece of code designed to use a weakness in the system – to take advantage of a security flaw or vulnerability identified in Stage 1 to gain unauthorized access or perform harmful actions.

Stage 3: Delivery In this stage, the attacker delivers the weaponized malware to the target. Common methods of delivery include phishing emails, malicious attachments or software vulnerability abuses.

Stage 4: Exploitation This step occurs when the malware is activated to compromise or cause harm to the victim’s system.

Stage 5: Installation In this phase, the attacker installs a backdoor or other mechanism to work around a system’s security measures, giving the attacker continued access to the compromised system.

Stage 6: Command and Control The attacker establishes a communication channel with the compromised system to send commands and receive data. This phase enables remote control over the target system.

Stage 7: Actions on Objectives The mission of the cyberattack is accomplished when attackers succeed in stealing data, destroying systems or otherwise accomplishing what they set out to do. It is at this stage when users may realize something is wrong.

There are a variety of ways for fleets to mitigate cyber risks including: educating employees about phishing scams and best practices for cybersecurity hygiene, isolating critical systems from the public internet to limit potential access to cyber criminals, promptly addressing vulnerabilities in software and systems, implementing security tools to monitor network activity and identify suspicious behavior and coming up with a response plan to cyber incidents that includes data backup and recovery procedures.

By recognizing how each phase of the Cyber Kill Chain unfolds, fleets can spot vulnerabilities earlier and strengthen overall cybersecurity defenses.

Learning how to identify the steps and understanding ways to strengthen defenses, monitor systems and mitigate risks at each stage, an organization can significantly reduce the risk of being victimized by a successful cyberattack.

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

 

Supercharged: Catching Up with SAE International’s Carla Bailo

Supercharged: Catching Up with SAE International’s Carla Bailo

The 2024 SAE International president talks with DG’s Mark Zachos about EV standards, digital technology and chemistry lab explosions

DG Technologies president Mark Zachos recently sat down with Society of Automotive Engineers (SAE) International past president Carla Bailo for Supercharged, the YouTube show he hosts for SAE Detroit Section.

Bailo is president and CEO of Michigan-based ECOS Consulting LLC, a company that specializes in engineering cost efficiency and optimization. A mechanical engineer and mobility expert, she has led departments at Nissan North America and the Center for Automotive Research. From 2015 to 2017, she was instrumental in The Ohio State University’s Mobility Research and Business Development initiative that, in addition to raising millions of dollars in private and non-profit investments, applied for and won the $40 million U.S. Department of Transportation’s Smart City Challenge. It was a collaborative effort, according to the department, to implement “ideas for how to create an integrated first-of-its kind smart transportation system that would use data, applications and technology to help people and goods move faster, cheaper and more efficiently.”

Zachos, a past SAE Detroit Section chair, talked with Bailo about some of her main focus areas from her tenure as 2024 president of SAE International.

MARK ZACHOS: I get a chance to see you and other SAE colleagues once or twice a year at WCX or at AeroTech but we don’t get a chance to talk a lot. So, I really enjoy this opportunity to chat with you here. You just wrapped up your term as SAE president. How did that go?

CARLA BAILO: It wasn’t exactly what I was expecting. We had a CEO search and I became interim co-CEO for a short period of time. So, it wasn’t necessarily the get out and talk about what SAE is doing or visit people globally. It was more, let’s go to Pittsburgh (where SAE International is headquartered), let’s get our house in order and make SAE the organization we all want it to be. Even though it wasn’t exactly what I expected, I think it’s exactly what SAE needed. It went great and now my year is past, I’m still on the board, I’m able to still be engaged, I’m able to work with the new CEO to make sure that everything is going smoothly.

MARK: Well, I can tell you, from the SAE Detroit Section point of view and as a longtime member, you’ve made a difference, our team made a difference and I can see some changes. Things take time, but we’ve got something rolling here that’s good for everyone. We can talk about that in more detail when you get into some of your focus areas. The first one was inclusion. What are your thoughts there?

CARLA: I think there’s a lot of word play going on. So, you know, nobody is allowed to have DEI (diversity, equity and inclusion) as an initiative. DEI offices have been closed. Colleges have been told you must change the names of this scholarship or that scholarship and stop promoting DEI. However, when you think about the solutions that need to be made for the problems that we have, diversity to me means having people from different backgrounds, different mindsets, different ways of thinking to solve problems. This is what’s going to make the best solution, and you’re not going to get that from a homogeneous population. So even if we don’t call it DEI and we call it sustainability or we call it inclusion, at least things within SAE are not going to change and things that the engineering community is going to work on are not going to change either. We still need to have that mindset and different ways of thinking coming in so that we can really tackle some of these big issues that as a community we’re facing.

MARK: Engineers solve problems, I’ve learned that through my career. And some of those problems are pretty hard. Having the most engagement you can get and including everybody in that discussion is important for teamwork.

CARLA: I really learned it when I was in academia for a while and worked on the Smart City Challenge in 2017. As a mobility engineer, when the Smart City Challenge came around, I was like, “Okay, we need to have autonomous shuttles, we need to have EV solutions, we need this and we need that.” Then I went out and saw what was really in the city and I said, “Whoa, wait a second. You know, we have a lot of people that just can’t get to work, can’t get to health care, can’t get to educational opportunities. Maybe we need to think about bus rapid transit or other solutions rather than moving to these very complex solutions that really don’t fit the city.”

So, one thing I learned right off the bat was, first, I needed everybody from all parts of the city included. But secondly, engineers are really good at finding solutions and creating new technology, and then going to find a problem to apply it to. And we have to reverse that. We have to first understand the problem fully and then think about what the solution is going to be. It might be a high-tech solution. It might be a very simple solution. If we look at some of the work done by Engineers Without Borders in some of the African communities – bridges, water, very basic things – they’re not applying the same solution they apply in a first-world country. They can’t afford to and they don’t need it. So, really thinking about what is needed can lead you to what technology can solve the right problem.

MARK: When I think of SAE, and the mobility engineering that we’re into, we’re improving the lives of folks who are in cities and take airplanes to fly to visit their grandchildren or to go on business trips overseas, through engineering. And how you map that back into SAE, it fits really well.

CARLA: When you think about improving people’s lives, let’s go back to diversity for a minute. When you look at those fields where young women tend to be entering, they’re in the biomedical, they’re in the chemical fields predominantly, they’re in the computer systems field and most of those you can see a direct correlation to human beings and improving their lives. So, I think we really have to talk differently about all of engineering. You know, the mechanical engineers, they’re involved in some of these great products in your house. What I always tell young females is everything you touch today, the clothes you put on, the makeup container you use, that was all designed by an engineer. So, the impact you can have by simplifying or improving designs goes in so many different facets of life. So, really talking about engineering differently than perhaps the way we talk about it now. It’s not all about making hot rod cars, although we love them. It’s not all about dune buggies and EVs and solar cars. There’s a lot more to engineering than that. And I think if we expanded the way we talk about it in so many settings, I think so many young minds would be open.

MARK: Let’s turn to the next focus area you had, and that was technical standards.

CARLA: When you think about how we improve people’s lives with standards, keeping them safe – everybody who gets on a plane or behind the wheel of a vehicle, in an Uber, in a bus, any mode that they go from A to B, they want to feel safe and secure that nothing’s going to happen. This is what our standards help to do. So, they’re not, maybe, sexy but they’re so needed. It’s one of those things that people expect, but they don’t even know who’s behind the scenes making it happen. We just did the (EV) charging standard for all of those people who went to a charging station and didn’t have the right adapter or right kind of charger. Thank goodness we’ve got a charging standard now!

MARK: There’s one more area I’d like to talk about before we wrap up and that’s digital technology, and especially AI. Is that the thing behind the scenes that we can all rely on and trust to keep us safe?

CARLA: AI is one of the largest breakthroughs and changes we’re going to see in our industry, in engineering in general. We have to be very careful with it though because it can spit out a lot of erroneous information depending where it searches for the information on the web. I think it really depends what you’re doing. At the same time, there’s a lot of common sense you may lose if you rely on it too much, things that you need to figure out for yourself how they work. Even if you can Google it, it’ll tell you that you can get a YouTube video, it’ll tell you how to do it, but you still need to, afterward, make sure you understand what it had you do, and understand the things that AI gave you in order to write that paper or to think about what your thesis project should be. Use it smartly, but still use your own brain because AI is just spitting what’s already out there and has been done. Engineers need to create things that haven’t been done yet, things that people don’t even realize they’re missing in their lives, and that’s not going to change.

MARK: You make a great point. Thinking back to when I was a young person going into engineering, there were people just landing on the moon, and they got there with a slide rule, not with AI! And mainly technology is one thing, but in this all these other areas it’s scary and exciting, isn’t it?

CARLA: It really is. I’m reading a book right now called “The Anxious Generation” about how this technology is maybe not making lives better. I think it’s a really interesting read – if you get a chance, take a look at it. I think we have to be smart as parents and grandparents when we think about introducing technology to kids -make sure that they still are learning themselves and have free play time, get out and explore, take risks, you know, try things out. My gosh, I can’t tell you how many times I blew up a chemistry lab! It got so bad in college, they wouldn’t let me in there unless the professor was in there, too – but I wanted to see what happened! I’m not telling you to let your kids blow up a lab, but you know, really think about a good balance. Yes, technology is great, but so is learning on your own, discovery, being curious. Because if you just have technology, you lose that part of your brain where you can be curious and create those solutions that are going to be more and more needed in the future world of technology-driven solutions. And then – for SAE – how can we use AI smartly? How can we see it as perhaps a challenge to some of the work we’re doing? And how can we be ahead of that challenge and make sure we still have a unique proposition for the marketplace?

MARK: That’s a way to wrap it up. We’ve got a great team and SAE is all behind us. Thanks Carla. I really enjoyed the chance to chat with you!

To watch the interview, visit Supercharged: Catching Up with Carla Bailo

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

Multi-Factor Authentication for Trucking Companies

Why Multi-Factor Authentication Matters for Trucking Companies

Published in TMC Fleet Maintenance & Technology magazine Spring 2025

Why Multi-Factor Authentication Matters for Trucking Companies

By Mark Zachos

When it comes to cybersecurity in trucking, it is important to remember the extent of just how much the industry encompasses. There are computerized tools for everything from diagnostics and fuel management to payroll and driver hours to route planning and other logistics. These tools play a big part in keeping wheels on the road, and without proper security, can open a trucking company up to a cyberattack.

Multi-factor authentication (MFA) is a valuable tool that can be implemented on computer systems and accounts to help individuals and organizations ward off cyberattacks by protecting critical information and data.

“MFA is a layered approach to securing physical and logical access where a system requires a user to present a combination of two or more different authenticators to verify a user’s identity for login,” according to the U.S. Cybersecurity & Infrastructure Security Agency (CISA). “MFA increases security because even if one authenticator becomes compromised, unauthorized users will be unable to meet the second authentication requirement and will not be able to access the targeted physical space or computer system.”

The way it works is that in addition to simply entering a password or personal identification number (PIN) to gain access to an account protected with MFA, users are also required to present at least one extra piece of evidence to prove they are legitimate. This evidence typically falls into three categories:

  1. Something you know – like your password or a PIN
  2. Something you have – like a smartphone, a USB key or a security token
  3. Something you are – like your fingerprint or facial recognition

“Typically, the second factor we use is ‘something we have,’ such as our smart phone with access to email or an authenticator app, a smart card … or a token that generates a unique code based on a complex algorithm,” explained Ryan A. Higgins, Chief Information Security Officer for the U.S. Department of Commerce, in a 2022 Cybersecurity Awareness Month post. “More companies and organizations are offering MFA as an option by emailing you a code or using an authenticator app.”

Why Should the Trucking Industry Care About MFA?

Since trucking companies handle things like client contracts, delivery schedules payroll information and other sensitive information, it causes the industry to be an appealing target for cybercriminals. MFA makes it much more difficult for hackers to break into an account, even if a hacker somehow gets hold of a password or another single layer of authentication.

Take, for example, phishing attacks. The most careful employee can still accidentally click a bad link. But with MFA enabled, even if an account password gets compromised in a phishing attack, there is a high chance that hackers will not be able to come up with a second authenticator needed to log in. Thus, access to that account will be denied.

A single cyber breach can shut down operations, costing a company time, money and its reputation. MFA can help fleets protect GPS tracking, telematics and electronic logging devices (ELDs), all of which are vulnerable to attacks. A cybercriminal gaining access to any of these systems could disrupt routes, delay deliveries or even endanger driver safety.

And for businesses that handle government contracts or sensitive goods, MFA is often seen as a best practice to protect fleet information and to meet compliance standards.

How MFA Works in the Real World

Say a dispatcher needed to log in to a company’s logistics portal. With MFA, the dispatcher likely first would enter a password (something they know). Next, the dispatcher would receive a cellphone notification (something they have) or, if it is a newer system, they might also scan a fingerprint (something they are).

Only after verifying at least two of these factors would the dispatcher gain access. So even if someone stole a password, that cyberthief would hit a dead end without access to at least one other factor.

Here are some ways fleets can apply MFA:

  1. Start with Critical Systems – Identify which systems are most crucial to your operations. Implement MFA there first.
  1. Educate Your Team – Beyond installing new tech, it’s about getting buy-in from your drivers, dispatchers and office staff. Explain how MFA protects not just the company but also employees’ personal data.
  2. Choose the Right Tools – There is no shortage of MFA solutions out there. Some integrate directly with the software you are already using. Pick a solution that is user-friendly for your team.
  3. Make It Trucking-Friendly – The trucking industry has unique challenges – drivers are on the move, often working irregular hours. Make sure your MFA system is accessible on mobile devices and does not require perfect cell service to work.
  4. Plan for Exceptions – What happens if someone loses their phone or their fingerprint scanner doesn’t work? Have a backup plan in place, like security questions or a temporary code system, so operations do not grind to a halt.

In the trucking industry, where every minute counts and margins can be razor-thin, the last thing an organization wants is to deal with the chaos of a cyberattack. MFA is a smart, cost-effective way to protect business, drivers and customers.

“Most people accessing services online have relied exclusively on passwords to protect their accounts, yet passwords have proven to be a weak link on their own due to the sheer number we are asked to memorize and how effective computer programs are at cracking passwords,” said Higgins. “This is where MFA helps overcome these inherent weaknesses and better protect us all. Adoption of a second authentication factor increases confidence that the right individual is accessing the right system or service.”

About the Author

 Mark Zachos

Mark Zachos is a vehicle communications and cybersecurity expert for the Society of Automotive Engineers (SAE) International and the American Trucking Associations (ATA) Technology & Maintenance Council (TMC). He is the owner and president of DG Technologies in Farmington Hills, Michigan, the director of the Vehicle Cyber Engineering Lab at the University of Detroit Mercy, where he also teaches, and he runs the Cybersecurity Skills Station at TMC SuperTech each year.

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies

CyberUP logo

Staying Cybersafe: Essential cybersecurity tips for trucking fleets

Staying Cybersafe: Essential cybersecurity tips for trucking fleets

Simple mistakes, such as reusing passwords or clicking unknown links, can expose fleets to costly cyberattacks.

Mark Zachos     Oct. 28, 2025

Key takeaways
  • Simple errors, such as reusing passwords or clicking unknown links, can expose fleets to cyberattacks.
  • Phishing and AI-driven scams increasingly target fleet employees to access sensitive systems.
  • Regular updates, strong passwords, multifactor authentication, and data backups reduce cyber risks.

While it is common today to see cyberattacks and online breaches in the news, for those who have not felt their effects firsthand, it may feel far-removed. To keep it that way, it is more important than ever now to understand that without consistent monitoring and proper precautions, a cyberattack can happen to anyone, and many attacks are actually caused by simple mistakes that could be made by any person at any level in any organization.

Common mistakes that put fleets at risk

Things as simple as clicking on an attachment or a link in an incoming email or using the same password for multiple online accounts can trigger an attack, creating problems not only for the individual but potentially leading to a fleet’s infiltration or even shutdown.

This summer, researchers for Cybernews reported discovering lists of billions of exposed usernames and passwords from major platforms, including Google, Apple, and Facebook. According to the June article, it was not known who compiled the data or where it came from, but cybercriminals were at least partly responsible for it. Its disclosure potentially puts millions of users at risk for identity theft, account takeovers, and targeted phishing

Since the breach, Google has been advising Gmail users to update their passwords. In a Google Cloud blog post titled “The Cost of a Call: Voice Phishing to Data Extortion,” the Google Threat Intelligence Group (GTIG) spelled out a recently reported tactic involving hackers pretending to be customer support representatives from companies like Google or Apple.

Through deceptive emails and phone calls, known as phishing and vishing (voice phishing), attackers attempt to manipulate users’ trust and talk them into handing over passwords, multifactor authentication codes, and other sensitive information. Once divulged, these details can give hackers access to individual victims’ accounts, which can even ultimately mean access to entire companies’ computer systems.

GTIG specifically mentioned Salesforce, a cloud-based software company that works in partnership with Google, and stated it has been tracking “a financially motivated threat cluster that specializes in voice phishing campaigns specifically designed to compromise organizations’ Salesforce instances for large-scale data theft and subsequent extortion.”

According to the post, attackers were able to repeatedly breach networks because their operators were so convincing at impersonating IT support personnel. The report made it clear that, as a result, neither Google nor Salesforce had been breached at the company level. “In all observed cases, attackers relied on manipulating end users, not exploiting any vulnerability inherent to Salesforce.”

Perhaps not surprisingly, cybercrime is increasingly involving artificial intelligence (AI). The Federal Bureau of Investigation (FBI) San Francisco Field Office issued a release last year warning about perpetrators who use AI in their cyber scams:

“In addition to traditional phishing tactics, malicious actors increasingly employ AI-powered voice and video cloning techniques to impersonate trusted individuals, such as family members, co-workers, or business partners. By manipulating and creating audio and visual content with unprecedented realism, these adversaries seek to deceive unsuspecting victims into divulging sensitive information or authorizing fraudulent transactions.”

Former special agent in charge of the FBI’s San Francisco Field Office, Robert Tripp, was quoted in the release, “As technology continues to evolve, so do cybercriminals’ tactics. Attackers are leveraging AI to craft highly convincing voice or video messages and emails to enable fraud schemes against individuals and businesses alike.” He added, “These sophisticated tactics can result in devastating financial losses, reputational damage, and compromise of sensitive data.”

Unfortunately, cybercrime is not going away, and any individual or organization using devices that connect to the internet, Bluetooth, Wi-Fi, or cellular networks are vulnerable to an attack. Obviously, it is important to follow the basics, such as creating strong passwords, avoiding using the same login credentials for multiple accounts, using two-factor authentication, and not clicking on links or attachments unless you know and trust who sent them.

Practical steps to protect fleet data and operations

Following are some additional, equally important steps from the April 7, 2024, International Security Journal article, “12 Ways to Prevent Cyber Crime,” by Simon Burge:

  • Keep software and devices updated to patch vulnerabilities that hackers could exploit.
  • Install reputable antivirus and anti-malware software and keep it updated.
  • Use a virtual private network (VPN) when accessing the internet from unsecured networks, including public Wi-Fi networks.
  • Don’t save passwords on your browser. Instead, use a secure password manager or memorize them.
  • Limit the personal information you share on social media and adjust your privacy settings.
  • Back up important data regularly onto external devices or to the cloud.
  • Disconnect the compromised system/device from the internet, change your passwords, run an anti-virus scan, inform the relevant authorities, and notify your bank or other affected institutions if you suspect a breach.

 

About the Author

 Mark Zachos

Mark Zachos is a vehicle communications and cybersecurity expert for the Society of Automotive Engineers (SAE) International and the American Trucking Associations (ATA) Technology & Maintenance Council (TMC). He is the owner and president of DG Technologies in Farmington Hills, Michigan, the director of the Vehicle Cyber Engineering Lab at the University of Detroit Mercy, where he also teaches, and he runs the Cybersecurity Skills Station at TMC SuperTech each year.

For further information:

Dearborn Group, Inc.
33604 West Eight Mile Road
Farmington Hills, MI 48335
1 (248) 888-2000
sales@dgtech.com

General Contact:

Mr. John McNelis
Sales and Marketing Manager
jmcnelis@dgtech.com

Visit our website: www.dgtech.com
Our Services Portal:  https://www.truck-connect.com/

Follow us!
X: x.com/DGTechnologies
Facebook: facebook.com/vehiclenetworksolutions
Instagram: Instagram.com/dg_technologies/
YouTube: www.youtube.com/@DGTechnologies