Parcel and Postal Technology International
  • News
    • A-E
      • Automation
      • Business Diversification
      • Construction / Development
      • Cross-border
      • Delivery
      • E-commerce
      • Expo
    • F-O
      • Freight
      • IT & Systems
      • Last Mile
      • Lockers / PUDO
      • Logistics
      • Mail
      • Operations
    • P-R
      • Packets
      • Parcels
      • Peak
      • Retail
      • Returns
    • S-Z
      • Sorting Systems
      • Staff / Personnel
      • Sustainability
      • Technology
      • Vehicles / Fleet
  • Features
  • Online Magazines
    • March 2025
    • September 2023
    • June 2023
    • March 2023
    • December 2022
    • SHOWCASE 2019
    • Archive Issues
    • Subscribe Free!
  • Opinion
  • Videos
  • Analysis
  • Awards
    • 2025 Awards
    • Previous Winners
  • Supplier Spotlight
  • Parcel + Post Expo
LinkedIn YouTube Twitter
  • Sign-up for Breaking News Emails
  • Meet the Editors
  • Contact Us
  • Media Pack
Subscribe
LinkedIn Facebook
Parcel and Postal Technology International
  • News
      • Automation
      • Business Diversification
      • Construction / Development
      • Cross-border
      • Delivery
      • E-commerce
      • Expo
      • Freight
      • IT & Systems
      • Last Mile
      • Lockers / PUDO
      • Logistics
      • Mail
      • Operations
      • Packets
      • Parcels
      • Peak
      • Retail
      • Returns
      • Sorting Systems
      • Staff / Personnel
      • Sustainability
      • Technology
      • Vehicles / Fleet
  • Features
  • Online Magazines
    1. December 2024
    2. September 2024
    3. June 2024
    4. March 2024
    5. SHOWCASE 2019
    6. Subscribe Free!
    Featured
    April 2, 2025

    In this Issue – March 2025

    Online Magazines By Web Team
    Recent

    In this Issue – March 2025

    April 2, 2025

    In this Issue – December 2024

    December 5, 2024

    In this Issue – September 2024

    September 19, 2024
  • Opinion
  • Videos
  • Analysis
  • Awards
    • 2025 Awards
    • 2024 Award Winners
    • 2023 Award Winners
    • 2022 Award Winners
    • 2021 Award Winners
    • 2020 Award Winners
    • 2019 Award Winners
    • Previous Winners
  • Supplier Spotlight
  • Parcel + Post Expo
LinkedIn Facebook
Subscribe
Parcel and Postal Technology International
Features

FEATURE: Sorting out cybersecurity for modern warehouse logistics

Fleur Baars, business development and sales director, and Julian Gonzalez Verbeek, director of technology, Prime VisionBy Fleur Baars, business development and sales director, and Julian Gonzalez Verbeek, director of technology, Prime VisionMarch 6, 20245 Mins Read
Share LinkedIn Twitter Facebook Email

In a world where cyberattacks are international news, cybersecurity has become a top priority for the logistics and e-commerce industries to protect operations and brand reputation. However, the operational technology (OT) that controls modern logistics operations has created more potential security vulnerabilities than ever before. In response, experts such as Prime Vision are providing businesses with a holistic, but also agnostic, continuous approach to cybersecurity that safeguards software and hardware.

The zero-trust environment
In the past, networks were not necessary for sorting centers as there was no exchange of information from outside. Eventually, as they were introduced, firewalls were able to create trusted, closed environments. For a time this was fine for protecting data, as warehouse and sorting operations were still not communicating with the outside world. However, all this has changed.

The facets of a modern logistics chain have opened sorting centers to the outside world. Track and trace, as well as communications with customers and suppliers, embody this shift. This interconnectivity comes at a price though – OT is now much harder to secure as there are so many points of entry for malware. A zero-trust environment where everything must be protected and authenticated is prevalent.

The risks of malware for an organization are enormous. A successful cyberattack can disable key equipment, halt operations, steal data and cause nationwide delivery interruptions – all resulting in almost incalculable financial and reputational losses. For example, in January 2023, the UK’s Royal Mail was hit by a ransomware attack that prevented it from sending letters and parcels overseas for almost six weeks. Effective preparation for this scenario is difficult, as it’s hard to know what kind of threat will be faced. Therefore, taking an integrated approach is best.

Being prepared and responding effectively
A good start is to evaluate the total enterprise design and continuously scan and monitor the complete environment to detect any possible threats. Following that, segmentation is important. By building a ‘security perimeter’ around systems, malware can be quarantined in the event of infection to protect other parts of the operation, including physical equipment. Thanks to the zero-trust architecture and centrally managed software and hardware environments of modern warehouses and sorting centers, continuous proactive monitoring is also possible, with observability platforms ready to alert the security team to any issues.

Using hardware that features endpoint protection helps prevent threats introduced into the system via USB and other methods. Strict security protocols for personnel, whether restricting access to server rooms or introducing two-factor authentication, help reduce human errors. Key information regarding processes and actions, including historic access and activity reports, can be stored for full traceability, all available to authorized people at any time.

Beyond prevention, in a worst-case scenario, it is critical to have a robust contingency plan in place with the security team, partners and suppliers. Identifying the threat and what it does is crucial before deciding to close systems down.

It is essential to decipher what malware wants – whether that is to encrypt or steal information, shut down or disrupt operations, mostly resulting in a financial request. Its removal is then conducted on a case-by-case basis. For particularly aggressive threats, a complete wipe or even replacing untrusted hardware may be needed.

Working with non-zero-trust solutions
However, logistics operations are not uniform, which presents additional cybersecurity challenges. Take legacy equipment, for example. Sorting machines can cost tens of millions of dollars and are expected to work for decades. Anything can be replaced, but large costs and potential downtime are often prohibitive. This means that cybersecurity experts are required to work with dated infrastructure, programming languages and equipment from a plethora of vendors.

Understanding legacy systems and developing secure solutions for them requires decades of experience and experts who understand all languages and systems. A cybersecurity expert must create interface layers that can communicate with older systems while passing information to newer, more secure systems. This is something that Prime Vision specializes in.

However, the optimal approach is security-by-design, which is only possible when cybersecurity is engrained early on in a project.

Security-by-design for zero downtime
When a leading e-commerce business in central Europe required cybersecurity for its new warehouse sorting operations, it approached Prime Vision. The business processes millions of parcels a day, with customers expecting same- or next-day delivery – so no downtime could be tolerated.

Security-by-design allows cybersecurity to be built into the foundations of a warehouse or sorting operation. Rules regarding software, hardware, protocols and personnel can be established early, allowing partners, vendors and suppliers to easily understand and adopt the measures. Prime Vision applied this methodology to the e-commerce business.

Segmentation also meant that Prime Vision could change the usual customer policy of installing a large update every quarter. Instead, continuous upgrades and patches could be rolled out on the fly without any downtime. Secure encryption, automation of updates and regular market monitoring for the latest global malware threats allowed cybersecurity to stay up to date seamlessly.

By taking a security-by-design approach, Prime Vision delivers continuous cybersecurity with zero downtime, ensuring 24/7 sorting is uninterrupted by the installation of new updates and infrastructure.

More from Prime Vision: https://primevision.com/sorting-out-cybersecurity-for-modern-warehouse-logistics/

Share. Twitter LinkedIn Facebook Email
Previous ArticleCo-op and Uber Direct partner to deliver ‘quick commerce’
Next Article Royal Mail to increase stamp prices from April

Related Posts

Features

FEATURE: Overcoming cross-border e-commerce customs challenges

May 14, 202514 Mins Read
Features

EXCLUSIVE INTERVIEW: Egypt Post

May 1, 202511 Mins Read
Features

FEATURE: Improving reverse logistics with better data and collaboration

April 15, 202514 Mins Read

Receive breaking stories and features in your inbox each week, for free


Enter your email address:


Latest News

Yeep! rolls out 1,000th locker in the UK

June 13, 2025

Sameday acquires private courier Cargus

June 13, 2025

THG Fulfil to increase sorting capacity with 430 Libiao robots

June 12, 2025
Getting in Touch
  • Contact Us / Advertiser
  • Meet the Editors
  • Download Media Pack
  • Breaking News Emails
Our Social Channels
  • Facebook
  • LinkedIn
Supplier Spotlights
  • Bloq.it
  • Cookie Policy
  • Privacy Policy
  • Terms & Conditions
  • Notice & Takedown Policy
  • Site FAQs
© 2025 UKi Media & Events a division of UKIP Media & Events Ltd

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.

CookieDurationDescription
cookielawinfo-checkbox-advertisement1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Advertisement" category.
cookielawinfo-checkbox-analytics1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Analytics" category.
cookielawinfo-checkbox-functional1 yearThe GDPR Cookie Consent plugin sets the cookie to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary1 yearSet by the GDPR Cookie Consent plugin, this cookie records the user consent for the cookies in the "Necessary" category.
cookielawinfo-checkbox-others1 yearSet by the GDPR Cookie Consent plugin, this cookie stores user consent for cookies in the category "Others".
cookielawinfo-checkbox-performance1 yearSet by the GDPR Cookie Consent plugin, this cookie stores the user consent for cookies in the category "Performance".
elementorneverThe website's WordPress theme uses this cookie. It allows the website owner to implement or change the website's content in real-time.
JSESSIONIDsessionNew Relic uses this cookie to store a session identifier so that New Relic can monitor session counts for an application.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

CookieDurationDescription
__cf_bm30 minutesCloudflare set the cookie to support Cloudflare Bot Management.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

CookieDurationDescription
CONSENT2 yearsYouTube sets this cookie via embedded YouTube videos and registers anonymous statistical data.
uidsessionThis is a Google UserID cookie that tracks users across various website segments.
vuid1 year 1 month 4 daysVimeo installs this cookie to collect tracking information by setting a unique ID to embed videos on the website.
_ga1 year 1 month 4 daysGoogle Analytics sets this cookie to calculate visitor, session and campaign data and track site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognise unique visitors.
_ga_*1 year 1 month 4 daysGoogle Analytics sets this cookie to store and count page views.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

CookieDurationDescription
OAGEOsessionOpenX sets this cookie to avoid the repeated display of the same ad.
OAID1 yearCookie set to record whether the user has opted out of the collection of information by the AdsWizz Service Cookies.
VISITOR_INFO1_LIVE5 months 27 daysYouTube sets this cookie to measure bandwidth, determining whether the user gets the new or old player interface.
YSCsessionYoutube sets this cookie to track the views of embedded videos on Youtube pages.
yt-remote-connected-devicesneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt-remote-device-idneverYouTube sets this cookie to store the user's video preferences using embedded YouTube videos.
yt.innertube::nextIdneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.
yt.innertube::requestsneverYouTube sets this cookie to register a unique ID to store data on what videos from YouTube the user has seen.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

CookieDurationDescription
VISITOR_PRIVACY_METADATA5 months 27 daysDescription is currently not available.

SAVE & ACCEPT
Powered by