By Eric Richards

Dealership Cybersecurity: Protecting Your Business and Your Customers

TLDR: The CDK Global breach proved that cybersecurity is a business-critical risk for every dealership – and the regulatory and insurance landscape now demands action, not just awareness.

  • The CDK breach shut down 15,000 dealerships, cost the industry over $1 billion, and individual dealers lost $30,000-$50,000 per day during a two-to-three-week outage
  • The FTC Safeguards Rule (effective June 2023) requires nine specific security elements including MFA, encryption, a written incident response plan, and annual reporting to senior leadership – with fines up to $50,120 per violation
  • Canadian dealers must comply with PIPEDA mandatory breach notification, Quebec Law 25 (penalties up to $25 million or 4% of worldwide turnover), and provincial PIPA requirements in Alberta and BC
  • Deploying multi-factor authentication is the single most impactful step – it is required by the FTC, mandated by most cyber insurers, and blocks the majority of credential-based attacks
  • Cyber insurance premiums now run $5,000-$15,000 per year for single-rooftop dealers, and MFA is a hard prerequisite for coverage – post-breach premiums jump 200-300%
  • Human error drives 68-74% of breaches, making regular staff training, simulated phishing, and a no-blame reporting culture essential defenses

On June 19, 2024, BlackSuit ransomware operators hit CDK Global, the DMS provider serving roughly 15,000 North American dealerships. Within hours, dealers across the continent lost access to their core operating system. Sales froze. F&I couldn’t print contracts. Service advisors couldn’t look up repair orders. Parts departments couldn’t check inventory. The outage lasted two to three weeks.

Anderson Economic Group estimated the total industry loss at more than $1 billion. Individual dealers reported losses of $30,000 to $50,000 per day. AutoNation disclosed a $1.50-per-share impact on earnings. Sonic Automotive reported $30 million in lost gross profit. CDK reportedly paid $25 million in ransom. Multiple class-action lawsuits followed.

Dealers who had built their entire operation around a single platform reverted to pen and paper. Some couldn’t deliver vehicles. Others couldn’t process warranty claims. The ones who weathered it best were the ones who had thought about this scenario before it happened.

The CDK breach was not an anomaly. It was a warning. And the threat environment has only intensified since.

The Threat Landscape for Dealerships

Dealerships are attractive targets for cybercriminals, and the reasons are straightforward. You handle high volumes of sensitive personal and financial data: credit applications, Social Security numbers, driver’s licenses, bank account information, insurance details. You process large financial transactions daily. You operate with dozens of interconnected technology systems, many of which are managed by third-party vendors. And, candidly, most dealerships have limited in-house IT expertise relative to the value of the data they hold.

A 2023 CDK study found that 17% of dealers had experienced a cyber incident in the prior year. Only 50% had a formal incident response plan. Those numbers should concern every dealer principal reading this.

The most common attack vectors targeting dealerships include:

Phishing. This remains the number one entry point. An employee clicks a link in an email that looks like it came from the DMS provider, a lender, or even the OEM. That click can install malware, harvest credentials, or open a backdoor into your network. The Verizon Data Breach Investigations Report consistently finds that the human element is involved in 68% to 74% of breaches.

Business Email Compromise (BEC). An attacker impersonates a manager, vendor, or lender and requests a wire transfer or bank account change. The FBI’s Internet Crime Complaint Center reports average losses of $125,000 to $150,000 per BEC incident. Dealerships, with their large daily transaction volumes and fast-moving F&I processes, are particularly vulnerable.

Ransomware. The CDK breach is the highest-profile example, but smaller dealership groups and individual rooftops get hit regularly. Attackers encrypt your data and demand payment to restore access.

Vendor compromise. When your DMS, CRM, or website provider gets breached, you get breached. You inherit the security posture of every vendor that touches your data.

Weak or reused passwords. Shared logins for DMS terminals, generic passwords that never change, the same password used across personal and business accounts. These are still pervasive in dealerships and they provide easy entry for attackers.

IBM’s 2024 Cost of a Data Breach Report puts the average breach cost at $4.88 million across all industries. For smaller organizations, the average is $2.98 million. Either number is enough to fundamentally damage a dealership’s financial position.

What the CDK Breach Taught the Industry

The CDK incident crystallized several lessons that apply to every dealership, regardless of size or DMS provider.

Vendor concentration is a business risk. When your DMS, your CRM, your desking tool, and your customer communication all run through a single provider, a single point of failure can shut down your entire operation. This does not mean you should avoid integrated platforms — in fact, thoughtful DMS integration with proper failover planning is a best practice. It means you need to understand what happens when that platform goes down and have a plan for continuity.

Your incident response plan cannot assume your systems are available. If your response plan lives on a server that just got encrypted, you do not have a response plan. Critical documents, contact lists, and procedures need to exist in a format you can access when your network is down.

Cyber risk is a board-level issue. The CDK breach did not discriminate between publicly traded groups and single-point dealers. It affected everyone on the platform equally. Dealer principals and GMs who had delegated cybersecurity entirely to their IT person or MSP learned that the financial exposure warranted direct executive attention.

Insurance alone is not a strategy. Dealers with cyber insurance fared better financially, but insurance did not restore their DMS access faster. It did not prevent the reputational damage. And post-breach, their premiums went up dramatically.

The FTC Safeguards Rule: What You Are Required to Do

If you are a dealer in the United States, the FTC Safeguards Rule is not optional. It applies to any financial institution under FTC jurisdiction, which includes motor vehicle dealers. The amended rule, which took effect in June 2023, is significantly more prescriptive than the original version. It requires nine specific elements in your information security program.

1. Designate a Qualified Individual

You must designate a single person responsible for overseeing your information security program. This can be an employee or an outsourced provider, but someone must own it. “The IT guy” is not a designation. It needs to be documented and that person needs the authority and resources to do the job.

2. Conduct a Risk Assessment

You must identify reasonably foreseeable internal and external risks to customer information. This is not a one-time exercise. It needs to be written, it needs to be updated, and it needs to cover every area where customer data is collected, stored, or transmitted.

3. Design and Implement Safeguards

Based on your risk assessment, you must put controls in place. The rule specifically requires:

  • Access controls that limit who can access customer information based on business need
  • Encryption of customer data both in transit and at rest
  • Multi-factor authentication (MFA) for anyone accessing customer information
  • A data inventory identifying what customer information you hold, where it is stored, and how it flows
  • Secure disposal of customer information no longer needed, within two years of last use

4. Monitor and Test

Your safeguards need to be tested, not just implemented. The rule requires either continuous monitoring or, at minimum, annual penetration testing and semi-annual vulnerability assessments.

5. Train Your Staff

Every employee who handles customer information must receive security awareness training. This is not a check-the-box exercise. Training must be relevant to each employee’s role, and it needs to be updated as threats evolve.

6. Monitor Your Service Providers

You are responsible for the security practices of your vendors. The rule requires that you assess the security posture of service providers that access customer information, include security requirements in your contracts, and periodically reassess their practices.

7. Keep Your Program Current

Your information security program must be evaluated and adjusted based on changes to your operations, threat landscape, and risk assessments. A plan written in 2023 and never updated does not satisfy this requirement.

8. Maintain a Written Incident Response Plan

You must have a documented plan for responding to a security event. The plan must address containment, investigation, notification, and recovery. It cannot be theoretical. If your team has never walked through a tabletop exercise, your plan is untested.

9. Report to Senior Leadership

Your Qualified Individual must provide a written report to the board of directors or equivalent senior leadership at least annually. This report must cover the overall status of the information security program and material matters, including risk assessments, incidents, and program changes.

Penalties are significant. The FTC can impose fines of up to $50,120 per violation and has the authority to issue consent orders lasting up to 20 years. Dealers with fewer than 5,000 customer records are exempt from some requirements, but not all. The core obligations around risk assessment, safeguards, training, and incident response apply to dealerships of every size.

Canadian Privacy and Breach Notification Requirements

Canadian dealers operate under a different regulatory framework, but the obligations are no less serious.

PIPEDA

The Personal Information Protection and Electronic Documents Act has required mandatory breach notification since November 2018. If your dealership experiences a breach that creates a “real risk of significant harm” to individuals, you must:

  • Report the breach to the Office of the Privacy Commissioner of Canada (OPC)
  • Notify affected individuals
  • Maintain records of all breaches for 24 months, regardless of whether notification was required

The threshold is not limited to massive data exfiltration events. A single misrouted credit application containing a customer’s SIN, date of birth, and financial information could qualify.

Quebec Law 25

Quebec’s privacy legislation now carries penalties of up to $25 million or 4% of worldwide turnover, whichever is greater. Law 25 introduced a private right of action, mandatory privacy impact assessments for certain projects, and stricter consent requirements. Dealers operating in Quebec face the most stringent provincial privacy regime in Canada.

Alberta and British Columbia

Both provinces have their own Personal Information Protection Act (PIPA), which operates alongside PIPEDA. Alberta’s PIPA includes its own breach notification requirements. Dealers in these provinces must comply with both the provincial and federal frameworks.

Understanding your data handling and privacy obligations is essential, particularly as customer data flows through an increasing number of systems and integrations.

The Most Common Vulnerabilities in Your Dealership Right Now

Most breaches do not start with sophisticated zero-day exploits. They start with basics that are within your control to fix.

Phishing susceptibility. Your staff receives convincing emails every day. Without regular training and simulated phishing exercises, click rates remain dangerously high.

Weak and reused passwords. Shared DMS logins, passwords written on sticky notes at the reception desk, the same password used for the dealership Wi-Fi and the DMS. These are real conditions in real dealerships.

Unsecured customer Wi-Fi. If your customer Wi-Fi and your business network share the same infrastructure without proper segmentation, a visitor with basic tools can reach your internal systems.

Unpatched systems. Computers, servers, and network equipment running outdated software with known vulnerabilities. Patching is unglamorous but essential.

Physical security gaps. Credit applications left on desks. Key drop envelopes containing customer information in unlocked boxes. Deal jackets sitting in open bins in the F&I office. Data security is not purely digital.

No network segmentation. When your security cameras, your DMS terminals, your customer Wi-Fi, and your service department tablets all sit on the same flat network, an attacker who compromises any one device can move laterally to everything else.

Shadow IT. Employees using personal file-sharing accounts, unauthorized messaging apps, or personal email to send customer documents. These systems sit outside your security controls entirely.

Vendor access. Third-party providers with remote access to your systems, sometimes with credentials that have not been changed in years. Every vendor connection is an entry point.

What to Ask Your Technology Vendors

The Safeguards Rule requires you to assess your vendors’ security posture. Here are eight questions you should be asking every technology provider that touches your customer data:

  1. Do you hold a SOC 2 Type II certification? This is the standard third-party audit for service organizations. Type II means the controls were tested over a period of time, not just documented at a point in time.

  2. Do you conduct regular penetration testing? A vendor who tests their own defenses is a vendor who takes security seriously. Ask for the frequency and whether they use independent testers.

  3. Is customer data encrypted in transit and at rest? Both are required under the Safeguards Rule. Your vendor should be able to confirm this without hesitation.

  4. What is your incident response timeline? If your vendor is breached, how quickly will they notify you? CDK’s communication during their breach was widely criticized. Establish expectations in advance.

  5. Where does our data reside? For Canadian dealers, data residency matters under PIPEDA and provincial privacy laws. Know whether your customer data is stored in Canada, the US, or elsewhere.

  6. What access controls are in place? How does the vendor limit which of their employees can access your data? Role-based access, audit logging, and principle of least privilege are baseline expectations.

  7. Do you have a business continuity and disaster recovery plan? If your vendor’s infrastructure goes down, what is the recovery time? The CDK breach proved that this question is not theoretical.

  8. Do you carry cyber insurance? A vendor without cyber insurance is a vendor that may not be able to meet its obligations to you after a breach.

When evaluating platforms like READY HUB, these questions should be part of your standard due diligence. Centralizing your operational workflows through fewer, well-vetted platforms reduces the number of vendor connections handling sensitive data and simplifies your compliance posture.

Cyber Insurance: What You Need and What Insurers Now Require

Cyber insurance has gone from a nice-to-have to a hard requirement in the dealership world. Here is the current landscape.

Cost. A single-rooftop dealership should expect to pay $5,000 to $15,000 per year for $1 million to $2 million in coverage. Premiums have increased 50% to 100% since 2020, driven by the surge in ransomware claims.

MFA is now a hard prerequisite. Most cyber insurers will not issue or renew a policy without confirmation that multi-factor authentication is in place for email, remote access, and administrative accounts. If you do not have MFA deployed, you may not be able to obtain coverage at all.

Post-breach premium increases. Dealerships that file a claim can expect premium increases of 200% to 300% at their next renewal. Some may lose coverage entirely.

Vendor concentration risk. Following the CDK breach, insurers are now asking about DMS vendor concentration. If your entire operation depends on a single provider, underwriters view that as elevated risk.

What a policy typically covers:

  • Breach investigation and forensics
  • Legal fees and regulatory defense
  • Customer notification costs
  • Business interruption losses
  • Ransomware negotiation and payment (in some policies)
  • Third-party liability

What it typically does not cover:

  • Reputational damage
  • Loss of future business
  • Penalties for pre-existing non-compliance
  • Costs to upgrade systems after a breach

The takeaway: cyber insurance is essential, but it is not a substitute for having a real security program. Insurers are tightening underwriting standards precisely because they have learned that policies without controls behind them generate claims.

What to Do in the First 24 Hours of a Breach

If you receive a ransom demand, discover unauthorized access, or identify that customer data may have been compromised, the first 24 hours are critical. Having a plan before the crisis arrives is the single most important thing you can do.

Activate your response team. Your incident response plan should name specific people with specific roles: decision-maker, IT lead (internal or MSP), legal counsel, insurance contact, communications lead.

Contain, but do not turn off systems. Your instinct will be to shut everything down. Resist it unless specifically advised by your forensics team. Powering off systems can destroy volatile evidence that investigators need to determine what happened and what data was affected.

Do not pay a ransom without guidance. Paying does not guarantee recovery. It may violate OFAC sanctions regulations. Engage legal counsel and, if you have cyber insurance, your insurer’s incident response team before making any payment decisions.

Preserve evidence. Do not wipe, reformat, or reinstall anything. Document what you see. Take photos of ransom screens. Save log files if accessible. Your forensics team and your insurer will need this.

Notify your insurer. Most policies require notification within 24 to 72 hours. Late notification can jeopardize your coverage. Call, do not email, and follow up in writing.

Engage legal counsel. An attorney experienced in data breach response can advise on notification obligations under federal and state law (or PIPEDA and provincial law for Canadian dealers), coordinate with law enforcement, and manage privilege over the investigation.

Do not make public statements until you have facts. Internal communication to staff is important and should happen quickly. External communication to customers and the public should be coordinated with legal counsel. Premature or inaccurate statements create liability.

Building a Security-Aware Culture

Technology controls matter, but culture determines whether those controls hold. The Verizon data showing that humans are involved in 68% to 74% of breaches means your people are both your greatest vulnerability and your strongest defense.

Make security training regular, not annual. A once-a-year compliance video does not change behavior. Monthly or quarterly micro-trainings, combined with simulated phishing campaigns, build real awareness. Track click rates over time. Celebrate improvement.

Remove the stigma from reporting. If an employee clicks a suspicious link and is afraid to report it because they will be punished, you have created an incentive for concealment. You want your people to report immediately, before damage spreads. That requires a no-blame reporting culture for good-faith mistakes.

Assign ownership. The Safeguards Rule requires a Qualified Individual, but ownership should extend further. Every department manager should understand their team’s role in protecting customer data. Make it part of job descriptions and performance conversations.

Include security in onboarding and offboarding. New employees should receive security training before they access any systems. Departing employees should have their access revoked on their last day, not whenever someone remembers to submit the request.

Test your incident response plan. Run a tabletop exercise at least annually. Walk your leadership team through a scenario: a ransomware attack hits your DMS provider on a Saturday morning. Who calls whom? Where is the plan? Can you operate for 48 hours without your DMS? The exercise will expose gaps that a written plan alone cannot.

Platforms like READY HUB that consolidate operational workflows and reduce the number of systems handling sensitive data can simplify your security posture. Fewer systems means fewer access points to manage, fewer vendor security assessments to conduct, and clearer audit trails when you need them.

The Bottom Line

Cybersecurity is not an IT project. It is a business risk management discipline that requires executive attention, ongoing investment, and a culture that takes data protection seriously.

The CDK breach cost the industry over a billion dollars and proved that no dealer is immune. The FTC Safeguards Rule has made compliance a legal obligation with meaningful enforcement teeth. Canadian privacy laws carry penalties that can threaten a dealership’s viability. And cyber insurers are raising the bar on what they require before they will underwrite your risk.

The good news: the majority of the actions required to protect your dealership are within your control. Enforce MFA. Train your staff. Vet your vendors. Segment your network. Build and test an incident response plan. Review your insurance coverage. These are not exotic technical initiatives. They are operational fundamentals.

If your dealership needs help evaluating how your current technology stack affects your security posture, or if you want to understand how consolidating your operational workflows through READY HUB can reduce your attack surface and simplify compliance, reach out to our team.

Frequently Asked Questions

How much does a dealership data breach typically cost?

IBM’s 2024 Cost of a Data Breach Report puts the average cost at $4.88 million across industries and $2.98 million for smaller organizations. During the CDK breach, individual dealerships reported operational losses of $30,000 to $50,000 per day, with the outage lasting two to three weeks. Beyond direct costs, dealers face regulatory fines (up to $50,120 per violation under the FTC Safeguards Rule), premium increases of 200% to 300% on cyber insurance, potential class-action liability, and reputational damage that is difficult to quantify.

Does the FTC Safeguards Rule apply to small dealerships?

Yes. The Safeguards Rule applies to all motor vehicle dealers that are financial institutions under FTC jurisdiction, regardless of size. Dealerships with fewer than 5,000 consumer records are exempt from certain requirements, such as the written risk assessment, the annual penetration test, and the annual report to senior leadership. However, the core requirements – including designating a Qualified Individual, implementing safeguards like MFA and encryption, training staff, maintaining an incident response plan, and monitoring service providers – apply to every dealership.

What is the single most important cybersecurity step a dealership can take today?

Deploy multi-factor authentication across every system that accesses customer data, starting with email and remote access. MFA is now a hard requirement for cyber insurance eligibility, it is explicitly mandated by the FTC Safeguards Rule, and it stops the majority of credential-based attacks. If you do nothing else after reading this article, confirm that MFA is active on your email platform, your DMS, and any remote access tools your staff or vendors use.

What should a Canadian dealership do differently from a US dealership regarding cybersecurity?

The core security practices are the same, but the regulatory framework differs. Canadian dealers must comply with PIPEDA’s mandatory breach notification requirements, which include reporting breaches that pose a “real risk of significant harm” to the Office of the Privacy Commissioner and maintaining breach records for 24 months. Quebec dealers face additional obligations under Law 25, including penalties of up to $25 million or 4% of worldwide turnover. Alberta and British Columbia have their own PIPA legislation with separate requirements. Rather than the FTC Safeguards Rule, Canadian dealers should look to PIPEDA’s ten fair information principles and any applicable provincial privacy legislation as their compliance framework. For a comprehensive breakdown of these obligations, see our Canadian dealership compliance guide.