{"id":74555,"date":"2025-10-17T15:00:31","date_gmt":"2025-10-17T14:00:31","guid":{"rendered":"https:\/\/www.cxtoday.com\/?p=74555"},"modified":"2025-10-19T09:57:26","modified_gmt":"2025-10-19T08:57:26","slug":"how-automotive-cyberattacks-are-disrupting-b2b-customer-experience","status":"publish","type":"post","link":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/","title":{"rendered":"How Automotive Cyberattacks Are Disrupting B2B Customer Experience"},"content":{"rendered":"<p>Cybersecurity has become an unexpected speed bump on the road to digitalizing the automotive industry.<\/p>\n<p>Recent cyber attacks on Jaguar Land Rover and Stellantis have exposed how vulnerable the sector is in its ability to deliver on the customer experience it promises to the consumers and business clients across its sprawling supply chain.<\/p>\n<p>Typically, the conversation in automotive CX centers on showroom experience, mobile apps, and increasingly, infotainment systems. But behind the scenes, a vast B2B ecosystem powers the industry: OEMs, Tier 1 suppliers, dealerships, fleet operators, and logistics partners all rely on secure digital infrastructure to manage their relationships and keep things moving.<\/p>\n<p>These business customers expect seamless access to portals, real-time order tracking, and reliable service delivery. When a cyberattack hits, the effects reverberate through a vast B2B ecosystem, touching business partners whose operations depend on trust and uptime.<\/p>\n<p>\u201cThe recent cybersecurity breaches at Jaguar Land Rover and Stellantis highlight the threats that can disrupt the modern automotive supply chain,\u201d <strong>Jeff Collins, CEO of WanAware<\/strong> told CX Today.<\/p>\n<p>\u201cThese attacks underscore the significant vulnerabilities inherent in the industry&#8217;s vast web of interconnected software and service partners. Together they reveal a critical industry-wide exposure; the automotive ecosystem is not only susceptible to production-halting attacks on core manufacturing but also to data breaches through its extended digital supply chain, eroding confidence, necessitating a more holistic and collaborative security strategy.\u201d<\/p>\n<p>Stellantis stated on September 21 that it had recently detected \u201cunauthorized access to a third-party service provider\u2019s platform that supports our North American customer service operations.\u201d<\/p>\n<p>The personal customer information involved was limited to contact information, the company said. \u201cImportantly, the affected platform does not store financial or sensitive personal information, and none was accessed.\u201d Stellantis notified the appropriate authorities and informed affected customers directly.<\/p>\n<p>The incident raised alarms about third-party risk and the fragility of integrated platforms that underpin B2B relationships.<\/p>\n<p>Jaguar Land Rover faces a different kind of breach, the effects of which are still ongoing. The automaker was hit by a cyberattack in late August, which forced the company to shut down its IT networks and suspend production at its factories in the UK, Slovakia, Brazil and India.<\/p>\n<p>The company initially said there was no evidence that customer data had been stolen, but later stated that \u201cwe now believe that some data has been affected.\u201d<\/p>\n<p>The impact of the attack was so extensive that the company halted production on September 1 and subsequently delayed its restart into October, a symptom of the increasingly interconnected and automated approach to car manufacturing that can make it difficult to isolate individual systems.<\/p>\n<p>The disruption has spread far beyond JLR\u2019s factory floors. Suppliers have reported cancelled orders and delayed payments, and dealers have been left unable to access parts ordering systems or complete customer transactions.<\/p>\n<p>JLR set up a help desk for suppliers and has been trying to share information on the extent of its supply chain, which may include more than 700 companies manufacturing the 30,000 parts that can make up a luxury car, the Guardian reported.<\/p>\n<p>For instance, JLR is the main customer of Autins, an automotive insulation supplier, and the production halt \u201chas had a material effect\u201d on its operations, the company stated in its <a href=\"https:\/\/autinsgroup2024eutfm1.q4web.com\/news\/news-details\/2025\/AGM-Trading-Update\/default.aspx\">trading update on September 17<\/a>.<\/p>\n<p><strong>Cando Wango, National Cybersecurity Solutions Architect at AllCovered<\/strong>, the IT services division of Konica Minolta, told CX Today:<\/p>\n<p>\u201cIt was startling to learn that Jaguar was brought to a complete standstill a full month after its breach, with projections of another month of downtime to follow\u2014losses compounding without a clear resolution in sight.\u201d<\/p>\n<p>\u201cIt raised pressing questions: Had their incident response plan been tested? Were disaster recovery drills conducted? Were their recovery time objectives (RTOs) and recovery point objectives (RPOs) clearly defined? It is difficult to comprehend how an organization of such stature and history could be left so exposed.\u201d<\/p>\n<p>JLR <a href=\"https:\/\/media.jaguarlandrover.com\/news\/2025\/10\/jlr-restarts-manufacturing-and-introduces-new-financing-solution-pay-jlr-suppliers\">announced a phased restart<\/a> of its manufacturing operations starting at its facilities in the West Midlands, UK, as well as plants in Castle Bromwich, Halewood and Solihull, UK, and Slovakia. \u201cFurther updates on the next steps of the controlled, phased restart will follow,\u201d the company said. This gradual return to production highlights the extent of disruption caused by the cyber attack, suggesting that the incident affected critical operational systems and supply chain coordination.<\/p>\n<h2>The Ripple Effect Across the Supply Chain<\/h2>\n<p>\u201cAutomotive manufacturers have become as much software as transportation companies, facing all the challenges inherent to software security,\u201d according to a <a href=\"https:\/\/legacy.sae.org\/binaries\/content\/assets\/cm\/content\/topics\/cybersecurity\/securing_the_modern_vehicle.pdf\">report<\/a> by professional transport association SAE International.<\/p>\n<p>While automakers still produce some equipment, their focus is increasingly on research and development, supply chain management, and final product assembly, all of which are managed by multi-layered software systems.<\/p>\n<p>A staggering 84% of respondents to an SAE survey said that they were concerned cybersecurity practices are not keeping pace with evolving technologies in the industry, and 73% expressed concern about the cybersecurity posture of automotive technologies supplied by third parties. And 63% test less than half of hardware, software, or other technologies for vulnerabilities.<\/p>\n<p>Cyber attacks on automotive companies don\u2019t just cause temporary headaches\u2014they trigger a cascade of CX failures along the supply chain.<\/p>\n<ul>\n<li>Customer portals or connected vehicle services can be disrupted, affecting clients\u2019 business operations and eroding trust.<\/li>\n<li>Suppliers and dealerships can lose access to key systems like inventory and order management, throwing off delivery schedules and service appointments.<\/li>\n<li>Missed service-level agreements (SLAs) and late deliveries can come with financial penalties, strained partnerships, and pressure to renegotiate contracts.<\/li>\n<li>Fleet managers and logistics companies depend on connected platforms for real-time tracking and diagnostics. If those systems are breached or go offline, fleets can be left in the dark.<\/li>\n<li>Businesses can suffer reputational damage if their clients perceive a lack of transparency or resilience in crisis response, prompting them to reconsider relationships.<\/li>\n<\/ul>\n<p>\u201cThis incident also highlights broader industry and supply chain concerns. Is this an isolated case, or a warning sign of what\u2019s to come?\u201d Wango said. \u201dIf Jaguar\u2019s experience is any indication that the automotive sector is a \u201cglass house,\u201d then we may soon see more cracks\u2014and eventually shattered glass. Threat actors are opportunistic; once they spot vulnerabilities, they move quickly to exploit them.\u201d<\/p>\n<p>Cybersecurity is no longer just an IT concern; it\u2019s a core component of customer experience. Business clients want to know that their data is safe, their operations won\u2019t be disrupted, and that contingency plans are in place.<\/p>\n<h2>Recovery is a CX Strategy<\/h2>\n<p><strong>Jonathon Ellison, NCSC Director of National Resilience<\/strong>, <a href=\"https:\/\/www.ncsc.gov.uk\/blog-post\/why-resilience-matters-as-much-as-defence\">highlighted in a recent blog post<\/a> that beyond prevention, recovery hinges on preparation:<\/p>\n<p>\u201cThe organizations that handle incidents best are the ones that have rehearsed them. They understand what they need to do to keep their operations going without some or all of their technology estate.\u201d<\/p>\n<p>Enterprises should know their IT systems inside and out, conduct impact assessments, define roles, establish communication plans, and regularly run incident response exercises.<\/p>\n<p>The NCSC also highlights the importance of collaboration and transparency across industries. By participating in sector-wide information-sharing groups and being open about cyber incidents and lessons learned, organizations can collectively strengthen their resilience and better protect the wider business ecosystem.<\/p>\n<p>Once a security breach has occurred, it is important that a company not simply breathe a sigh of relief and move on. Recovery involves more than patching systems. Rebuilding relationships requires transparent communication with affected partners, restoration of services and access as quickly as possible, and clear timelines and accountability.<\/p>\n<p>And it is crucial that the company make long-term improvements in data governance and third-party oversight.<\/p>\n<p>Stellantis made the right moves in the immediate aftermath of its attack: \u201cUpon discovery, we immediately activated our incident response protocols, initiated a comprehensive investigation, and took prompt action to contain and mitigate the situation,\u201d the automaker stated. \u201cWe encourage customers to remain vigilant against potential phishing attempts and avoid clicking on suspicious links or sharing personal information in response to unexpected emails, texts, or calls.\u201d<\/p>\n<p>This is key, as malicious actors that have customer data in hand can use it to conduct phishing and social engineering attacks, as well as identity theft.<\/p>\n<h2>Cybersecurity as a Differentiator<\/h2>\n<p>As automotive companies continue to digitize, from connected vehicles to cloud-based supply chains, cybersecurity will become a key differentiator in B2B CX. Vendors and OEMs that can demonstrate robust data protection, secure integrations and resilience in the face of threats will stand out.<\/p>\n<p>\u201cIn my recent work with organizations across industries, one fact has become increasingly clear: cybersecurity is the defining challenge of our era,\u201d Wango said.<\/p>\n<blockquote><p>A strong security posture must be comprehensive, coordinated, integrated, and continuously optimized. Just as importantly, organizations must ensure they are not seen as \u201clow-hanging fruit\u201d for attackers. Given the extensive dialogue in recent years around cyber resilience, it is astonishing that any enterprise could overlook these fundamentals so completely.<\/p><\/blockquote>\n<p>\u201cI hope this serves as a wake-up call across industries: cutting corners on cybersecurity does not save money\u2014it only accelerates risk and, ultimately, puts the future of the business at stake.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity has become an unexpected speed bump on the road to digitalizing the automotive industry. Recent cyber attacks on Jaguar Land Rover and Stellantis have exposed how vulnerable the sector is in its ability to deliver on the customer experience it promises to the consumers and business clients across its sprawling supply chain. Typically, the [&hellip;]<\/p>\n","protected":false},"author":11074,"featured_media":74556,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[61014,62064],"class_list":["post-74555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crm","category-service-management-connectivity","tag-crm","brands_to_track-cx-today","editorial_type-feature","intent-loyalty","target_audience-industry-professional"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.3.1 (Yoast SEO v25.3.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Automotive Cyberattacks Are Disrupting B2B Customer Experience - CX Today<\/title>\n<meta name=\"description\" content=\"CX Today covers CRM &amp; Customer Data Management news including CRM and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Automotive Cyberattacks Are Disrupting B2B Customer Experience\" \/>\n<meta property=\"og:description\" content=\"CX Today covers CRM &amp; Customer Data Management news including CRM and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\" \/>\n<meta property=\"og:site_name\" content=\"CX Today\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CXTodayNews\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-17T14:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-19T08:57:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicole Willing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:site\" content=\"@cxtodaynews\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicole Willing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\"},\"author\":{\"name\":\"Nicole Willing\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc\"},\"headline\":\"How Automotive Cyberattacks Are Disrupting B2B Customer Experience\",\"datePublished\":\"2025-10-17T14:00:31+00:00\",\"dateModified\":\"2025-10-19T08:57:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\"},\"wordCount\":1510,\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg\",\"keywords\":[\"CRM\"],\"articleSection\":[\"CRM &amp; Customer Data Management\",\"Service Management &amp; Connectivity\"],\"inLanguage\":\"en-GB\",\"copyrightYear\":\"2025\",\"copyrightHolder\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\",\"url\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\",\"name\":\"How Automotive Cyberattacks Are Disrupting B2B Customer Experience - CX Today\",\"isPartOf\":{\"@id\":\"https:\/\/www.cxtoday.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg\",\"datePublished\":\"2025-10-17T14:00:31+00:00\",\"dateModified\":\"2025-10-19T08:57:26+00:00\",\"description\":\"CX Today covers CRM &amp; Customer Data Management news including CRM and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg\",\"width\":850,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cxtoday.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CRM &amp; Customer Data Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cxtoday.com\/#website\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"name\":\"CX Today\",\"description\":\"Customer Experience Technology News\",\"publisher\":{\"@id\":\"https:\/\/www.cxtoday.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cxtoday.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cxtoday.com\/#organization\",\"name\":\"CX Today\",\"url\":\"https:\/\/www.cxtoday.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"contentUrl\":\"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png\",\"width\":2606,\"height\":1154,\"caption\":\"CX Today\"},\"image\":{\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CXTodayNews\/\",\"https:\/\/x.com\/cxtodaynews\",\"https:\/\/www.linkedin.com\/company\/69192959\/\",\"https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc\",\"name\":\"Nicole Willing\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g\",\"caption\":\"Nicole Willing\"},\"description\":\"Nicole Willing is B2B journalist with expertise spanning the technology and financial industries. For more than 20 years, she has reported extensively on the key issues affecting business operations and supply chains, and she has developed a keen interest in how emerging technologies like AI are reshaping the way enterprises work. She has a passion for translating complex innovations into engaging stories that inform business decision-makers and inspire new ideas.\",\"url\":\"https:\/\/www.cxtoday.com\/author\/nicole-willingcxtoday-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Automotive Cyberattacks Are Disrupting B2B Customer Experience - CX Today","description":"CX Today covers CRM &amp; Customer Data Management news including CRM and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/","og_locale":"en_GB","og_type":"article","og_title":"How Automotive Cyberattacks Are Disrupting B2B Customer Experience","og_description":"CX Today covers CRM &amp; Customer Data Management news including CRM and more.","og_url":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/","og_site_name":"CX Today","article_publisher":"https:\/\/www.facebook.com\/CXTodayNews\/","article_published_time":"2025-10-17T14:00:31+00:00","article_modified_time":"2025-10-19T08:57:26+00:00","og_image":[{"width":850,"height":425,"url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg","type":"image\/jpeg"}],"author":"Nicole Willing","twitter_card":"summary_large_image","twitter_creator":"@cxtodaynews","twitter_site":"@cxtodaynews","twitter_misc":{"Written by":"Nicole Willing","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#article","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/"},"author":{"name":"Nicole Willing","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc"},"headline":"How Automotive Cyberattacks Are Disrupting B2B Customer Experience","datePublished":"2025-10-17T14:00:31+00:00","dateModified":"2025-10-19T08:57:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/"},"wordCount":1510,"publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"image":{"@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg","keywords":["CRM"],"articleSection":["CRM &amp; Customer Data Management","Service Management &amp; Connectivity"],"inLanguage":"en-GB","copyrightYear":"2025","copyrightHolder":{"@id":"https:\/\/www.cxtoday.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/","url":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/","name":"How Automotive Cyberattacks Are Disrupting B2B Customer Experience - CX Today","isPartOf":{"@id":"https:\/\/www.cxtoday.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage"},"image":{"@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg","datePublished":"2025-10-17T14:00:31+00:00","dateModified":"2025-10-19T08:57:26+00:00","description":"CX Today covers CRM &amp; Customer Data Management news including CRM and more.","breadcrumb":{"@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#primaryimage","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2025\/10\/20251007-Automotive-cybersecurity.jpg","width":850,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.cxtoday.com\/crm\/how-automotive-cyberattacks-are-disrupting-b2b-customer-experience\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cxtoday.com\/"},{"@type":"ListItem","position":2,"name":"CRM &amp; Customer Data Management"}]},{"@type":"WebSite","@id":"https:\/\/www.cxtoday.com\/#website","url":"https:\/\/www.cxtoday.com\/","name":"CX Today","description":"Customer Experience Technology News","publisher":{"@id":"https:\/\/www.cxtoday.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cxtoday.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cxtoday.com\/#organization","name":"CX Today","url":"https:\/\/www.cxtoday.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","contentUrl":"https:\/\/www.cxtoday.com\/wp-content\/uploads\/2022\/03\/CX_Today_FullLogo.png","width":2606,"height":1154,"caption":"CX Today"},"image":{"@id":"https:\/\/www.cxtoday.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CXTodayNews\/","https:\/\/x.com\/cxtodaynews","https:\/\/www.linkedin.com\/company\/69192959\/","https:\/\/www.youtube.com\/channel\/UCZSpkvnZtjGc7UAP1r-MRoA"]},{"@type":"Person","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/8e1bd49fc15db705ae5c169d08ebe3cc","name":"Nicole Willing","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cxtoday.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f0a6caa39ad8b38b6b329e6edd0fb162be6bd696067957e094e1757f8673c5c?s=96&d=mm&r=g","caption":"Nicole Willing"},"description":"Nicole Willing is B2B journalist with expertise spanning the technology and financial industries. For more than 20 years, she has reported extensively on the key issues affecting business operations and supply chains, and she has developed a keen interest in how emerging technologies like AI are reshaping the way enterprises work. She has a passion for translating complex innovations into engaging stories that inform business decision-makers and inspire new ideas.","url":"https:\/\/www.cxtoday.com\/author\/nicole-willingcxtoday-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/74555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/users\/11074"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/comments?post=74555"}],"version-history":[{"count":5,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/74555\/revisions"}],"predecessor-version":[{"id":74916,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/posts\/74555\/revisions\/74916"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media\/74556"}],"wp:attachment":[{"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/media?parent=74555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cxtoday.com\/wp-json\/wp\/v2\/categories?post=74555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}