<!-- wp:reyrey-js/page-data {"data":{"icalc":{"formulas":[],"fields":[]}},"lock":{"remove":true,"move":true}} /-->
<!-- wp:reyrey-js/section {"videoSrc":"","customClasses":"Bottom-Spacing-None","customClassesObject":{"Bottom Spacing":"Bottom-Spacing-None"},"backgroundSrc":""} -->
<div class="wp-block-reyrey-js-section"><!-- wp:reyrey-js/row {"template":[["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}}]],"gridLayoutValue":"100","customClasses":"Bottom-Spacing-None","customClassesObject":{"Bottom Spacing":"Bottom-Spacing-None"}} -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyrey-js/flex {"verticalAlignmentClass":"Vertical-Alignment-Center","gap":1} -->
<!-- wp:reyrey-js/group {"width":3} -->
<!-- wp:reyrey-js/image {"mid":"11729","size":"4"} /-->
<!-- /wp:reyrey-js/group -->
<!-- wp:reyrey-js/heading {"text":"Article Highlights","level":2,"fontSize":"22","fontFamily":"SemiBold","fontSizeClass":"FS-22","fontFamilyClass":"FF-SemiBold"} /-->
<!-- /wp:reyrey-js/flex -->
<!-- wp:reyrey-js/list {"customClasses":"Top-Spacing-Six Bottom-Spacing-Six","customClassesObject":{"Top Spacing":"Top-Spacing-Six","Bottom Spacing":"Bottom-Spacing-Six"},"columns":2} -->
<!-- wp:reyrey-js/list-item {"content":"Modern piracy targets data, not ships. Is your dealership secure?"} /-->
<!-- wp:reyrey-js/list-item {"content":"Strong partners make secure dealerships. Are yours doing their part?"} /-->
<!-- /wp:reyrey-js/list --></div>
<!-- /wp:reyrey-js/column -->
<!-- /wp:reyrey-js/row -->
<!-- wp:reyrey-js/row {"template":[["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}}]],"gridLayoutValue":"100"} -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":6},"l":{"colSpan":12},"xl":{"colSpan":12}}} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyact/divider {"colorType":"Silverchalice"} -->
<div class="wp-block-reyact-divider"><div></div></div>
<!-- /wp:reyact/divider --></div>
<!-- /wp:reyrey-js/column -->
<!-- /wp:reyrey-js/row --></div>
<!-- /wp:reyrey-js/section -->
<!-- wp:reyrey-js/section {"videoSrc":"","backgroundSrc":""} -->
<div class="wp-block-reyrey-js-section"><!-- wp:reyrey-js/row {"template":[["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":2},"l":{"colSpan":4},"xl":{"colSpan":4}}}],["reyrey-js/column",{"layout":{"s":{"colSpan":4},"m":{"colSpan":4},"l":{"colSpan":8},"xl":{"colSpan":8}}}]],"gridLayoutValue":"33-66"} -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":2},"l":{"colSpan":3},"xl":{"colSpan":3}},"stickyOption":"Sticky"} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyrey-js/heading {"text":"Subscribe to Fuel","level":2,"customClasses":"Bottom-Spacing-None","fontSize":"22","fontFamily":"SemiBold","fontSizeClass":"FS-22","fontFamilyClass":"FF-SemiBold"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Get the inside scoop on industry trends as well as helpful system tips and educational articles.","fontFamily":"Light","fontFamilyClass":"FF-Light","customClasses":"Bottom-Spacing-Three","customClassesObject":{"Bottom Spacing":"Bottom-Spacing-Three"}} /-->
<!-- wp:reyrey-js/form {"formType":"Hubspot Form","hubspotEntity":{"value":188,"label":"FUEL Subscribe (188)","jsonapi":{"type":"block_content\u002d\u002dhubspot_component","id":"f68574be-77b8-4c05-a820-85372aa9c5d1","links":{"self":{"href":"https://elliotja.sb.reyrey.com/reyrey.com/jsonapi/block_content/hubspot…;}},"attributes":{"drupal_internal__id":188,"info":"FUEL Subscribe"}}}} /--></div>
<!-- /wp:reyrey-js/column -->
<!-- wp:reyrey-js/column {"layout":{"s":{"colSpan":4},"m":{"colSpan":4},"l":{"colSpan":7,"colStart":5},"xl":{"colSpan":7,"colStart":5}}} -->
<div class="wp-block-reyrey-js-column"><!-- wp:reyrey-js/paragraph {"content":"Cybercrime always happens at someone else’s dealership. I’m sure that’s what crosses your mind each time you read an article about cybersecurity — until your dealership is under attack. Cyberattacks aren’t new, but they’re getting more frequent, more clever, and more costly."} /-->
<!-- wp:reyrey-js/paragraph {"content":"To a cybercriminal, your dealership is a gold mine of customer data, financial records, and sensitive systems, all of which are high-value targets. It’s the new wave of modern piracy, and your dealership is the X on the map."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Safeguarding your dealership’s cybersecurity might feel like just one more urgent thing, but it’s fundamental. Ignore it, and you may end up paying more later. Recovery from ransomware now averages more than $228,000 per incident, not including customer loss or damage to your reputation."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Here are a few blind spots for many dealerships, and what you can do now to uncover them:"} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003e1. Training That’s Falling Behind\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Cybercriminals don’t stay static. They change tactics. They use deepfakes, AI-generated voice or text, \u003ca href=\u0022https://www.ibm.com/think/topics/smishing\u0022\u003esmishing\u003c/a\u003e, and sophisticated impersonation. \u003ca href=\u0022https://www.fbi.gov/news/press-releases/fbi-releases-annual-internet-cr…\u0022 target=\u0022_blank\u0022\u003eIn 2024, the FBI received 33 percent more cybercrime reports compared to 2023, even after extensively stepping up security efforts.\u003c/a\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"If your training focuses on last year’s threats, it’s not enough. You need regular refreshers, not just a “watch this video once” approach. Think interactive drills, role-based guidance, and constant updates on what attackers are doing now."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003e2. The Email “Speed Culture” Trap\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Emails feel urgent. They pile up. You want quick replies and fast customer service. That urgency is exactly what attackers count on."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Phishing messages are getting sharper and more convincing, and AI helps them sound more real. What looks like a customer email or invoice from one of your vendors might be fraud. Once someone clicks, the damage can spread quickly."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Encourage employees to slow down and question \u003cstrong\u003eevery\u003c/strong\u003e email. Were they expecting this, even if it’s from a sender they recognize? Does the email pressure them to do something ASAP? Make it easy to report something suspicious. Practice caution, not just speed."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003e3. The Devices and Apps You Didn’t Know Were There\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"Think about all the devices and apps touching your network. Tablets in the service bay, computers in the parts department, security cameras, printers, personal phones, vendor tools, maybe even firmware in shop equipment."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Each one is a potential entry point. If they’re unmanaged, outdated, or using weak credentials, they are liabilities. \u003ca href=\u0022https://protontechs.com/blog/shadow-it-vs-shadow-data/\u0022 target=\u0022_blank\u0022\u003eShadow IT\u003c/a\u003e, or the use of unauthorized tools without IT’s knowledge, adds more risk, even if the intent was harmless."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Start by doing a complete inventory, use device management tools, set patch policies, and segment your network so that less-trusted devices have limited access."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003e4. Choosing Risky Partners\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"The truth is, your cybersecurity posture is shaped not only by what happens inside your dealership, but also by the partners you choose to work with."} /-->
<!-- wp:reyrey-js/paragraph {"content":"From software providers to digital retailing platforms to outsourced IT support, every partner you bring on board becomes part of your extended security environment. That includes things like inventory tools, messaging platforms, scheduling apps, and any other connected software that might not seem critical but still touches your data. If they are not following strong cybersecurity practices, their vulnerabilities could become yours."} /-->
<!-- wp:reyrey-js/paragraph {"content":"That is why choosing the right partners matters. You need more than functionality. You need reliability, transparency, and a commitment to data protection that matches your own. Ask the right questions. Look for partners who are proactive about security, offer clear incident response protocols, and treat cybersecurity as a shared responsibility."} /-->
<!-- wp:reyrey-js/paragraph {"content":"Strong partnerships strengthen your defenses. Weak ones put them at risk."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003e5. Failing to Plan is Planning to Fail\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"If cybercriminals locked your systems using a ransomware attack, what would happen next? Who would lead the response? What gets restored first? Who communicates with customers?"} /-->
<!-- wp:reyrey-js/paragraph {"content":"If the answer is “we’d figure it out,” that’s a red flag."} /-->
<!-- wp:reyrey-js/paragraph {"content":"An \u003ca href=\u0022https://protontechs.com/blog/how-to-create-an-incident-response-plan/\u0022 target=\u0022_blank\u0022\u003eincident response plan\u003c/a\u003e outlines how your dealership reacts, recovers, and communicates during a cyber event. It should be clear, practiced, and updated regularly. With a plan in place, your team can respond to an attack with speed and confidence."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003eWhat You Can Do Now\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/list -->
<!-- wp:reyrey-js/list-item {"content":"Audit your environment for blind spots like outdated training, device sprawl, and vendor gaps."} /-->
<!-- wp:reyrey-js/list-item {"content":"Check out this \u003ca href=\u0022https://app.thecyberscore.com/?id=proton\u0022 target=\u0022_blank\u0022\u003efree cyber audit\u003c/a\u003e that provides you with your cyber score and potential vulnerabilities."} /-->
<!-- wp:reyrey-js/list-item {"content":"Refresh your training program with threat-specific content."} /-->
<!-- wp:reyrey-js/list-item {"content":"Take inventory of all connected devices and systems."} /-->
<!-- wp:reyrey-js/list-item {"content":"Revisit vendor agreements and look at their security practices."} /-->
<!-- wp:reyrey-js/list-item {"content":"Build or update your Incident Response Plan. Test it before you need it."} /-->
<!-- wp:reyrey-js/list-item {"content":"Create a culture where employees are confident asking questions and reporting concerns."} /-->
<!-- /wp:reyrey-js/list -->
<!-- wp:reyrey-js/paragraph {"content":"\u003cbr\u003e\u003cstrong\u003eWant to know where you stand?\u003c/strong\u003e"} /-->
<!-- wp:reyrey-js/paragraph {"content":"The \u003cstrong\u003eState of Cybersecurity in Dealerships 2025\u003c/strong\u003e report from \u003cstrong\u003eProton Dealership IT\u003c/strong\u003e offers an in-depth look at current threats, risks, and trends impacting dealerships right now."} /-->
<!-- wp:reyrey-js/paragraph {"content":"\u003ca href=\u0022https://www.protontechs.com/sites/default/media/2025-10/Proton_Cybersec…\u0022 target=\u0022_blank\u0022\u003eDownload the Proton Report →\u003c/a\u003e"} /--></div>
<!-- /wp:reyrey-js/column -->
<!-- /wp:reyrey-js/row --></div>
<!-- /wp:reyrey-js/section -->