GPS trackers provide valuable data for business efficiency and secure vehicles against thefts. At the same time, the tracking devices can be stolen with a purpose to sell them, sabotaged by reconfiguring with fault parameters, or hacked to steal sensitive data. To prevent unauthorized access to the trackers, it is necessary to have additional security measures for logging in through all possible devices. When a login fails, the user is denied access and trackers remain safe.
Vehicle trackers store sensitive data for business and thanks to various features help to arrange optimal routes to avoid delays, reduce fuel consumption, get timely maintenance, and secure cargo with a vehicle. When losing a tracker or the control of it, business forfeits the possibility to monitor a vehicle and that can lead to serious consequences.
Stealing a tracker or overtaking its control can cause major issues for big businesses and small companies alike. You can do a lot to improve the security of your trackers, though. While there are no absolute guarantees, you should make it as hard as possible for the thieves to overtake the trackers that you have invested time to install and configured for an efficient data collection and monitoring. Otherwise, losing a tracker will also mean losing your income.
Our tracking solutions offer much more than just a simple tracking. A wide range of functionalities is available and – what is most important – we provide secure connectivity for all our devices.
Setting up a password, pin, or keyword before using the tracker is a must. Installing a tracker out of the box without reconfiguring it for security purposes is one of the most common mistakes that integrators make. However, it is easy to correct this by creating strong passwords (at least 8 characters: a mix of uppercase and lowercase letters, numbers, and minimum one special character). Failing to make these changes makes it simple for the thieves to gain access to the trackers since they might know or find out the original settings.
With Teltonika options for secure connections, it becomes hard to steal or sabotage the trackers. All Teltonika tracking devices support the safety measures listed below, including FMB130, which is a perfect choice for miscellaneous use scenarios.
Access to the configurator should be limited only to those who need to use it. For company employees to configure trackers via computer, a keyword is required if connecting via USB. In case of accessing tracker configuration via Bluetooth connection, a pin is used to pair with the device in addition to a keyword.
You can use SMS login and SMS password to access Teltonika trackers. Besides, it is also possible to configure devices via SMS commands.
For an additional security via SMS, you can add telephone numbers to the authorized number list in the Teltonika configurator. The trackers will ignore all commands coming from the numbers that are not listed in the configurator, thus, nobody else will be able to configure the devices or sabotage them.
By using Teltonika FMBT application on smartphones and filling up a pin for pairing with a tracker or adding your device to configurator authorized devices MAC list, you can see every detail about your device, including primary information, GNSS, GSM, I/O elements status, OBD, and LV-CAN200/ALL-CAN300 live data. To set up tracker via Bluetooth connection, you need to insert keyword and the application will allow you to change your server IP address, port, and APN data on the device.
With FOTA WEB, you will have an easy access to your fleet anywhere in the world. To upgrade firmware or make configuration changes, you just need to fill up a login and password in your browser that uses HTTPS protocol – it means all communication between your browser and the website are encrypted! For safety reasons, be sure not to disclose your login data to unauthorized personnel.
SECURE CONNECTION TO SERVER (TLS/DTLS)
For a direct connection from your server, you can use custom firmware that will allow you to set up configuration. With a custom firmware, Teltonika trackers can send encrypted data with TLS or DTLS protocols that ensure the security of server and tracker communication.
There are safety concerns about personal smartphones and mobile devices connecting to trackers. Private phones are more vulnerable to hacker attacks than servers connected to a company network. Many companies offer inexpensive mobile software that encrypts data traffic or monitors phones for suspicious activity. While the threats have been minimal and more of an annoyance so far, they are something to keep an eye on. For a secure connection, you can use a SIM card with VPN connection support. VPN allows you to create a safe connection to another network over the Internet and secure your browsing activity.