Maritime Surveys: Problems Vs Cybersmart

The International Maritime Organization (IMO) has developed many international conventions to protect the safety of the crew, cargo, and the environment. Nonetheless maritime accidents still happen resulting in losses of lives, property, and damage to the marine environment.

The main reasons for these accidents include:

  1. human error,
  2. ageing ships,
  3. improper maintenance on board ships to reduce costs,
  4. increasing lack of experienced crew due to shortage of trained manpower and non-compliance with minimum international safety standard.


According to the European Maritime Safety Administration’s Annual Overview of Maritime Casualties and Incidents 2020 report: The total number of reported marine casualties and incidents over the period 2014-2019 is 19418. These incidents led to 493 very serious casualties, 496 fatalities and 6210 persons injured. This data combined with decades of maritime related serious environmental disasters, latest being the Oil spill from Crimson Polaris that had about 1,550 metric tonnes of heavy oil and about 130 metric tonnes of diesel oil on board.

Despite strict controls by classification societies, flag states, port state controls, insurers and brokers, inferior ships continue to operate and pose serious risks to human life and the environment. This is illustrated by the ship detention records recorded annually in the annual reports of all MOUs and the U.S. Coast Guard. Port state control is not a substitute for effective flag state control and by itself it is unlikely that inferior ships will be eliminated. The existence of inferior ships calls into question the way in which the condition of ships is checked, recorded and shared among stakeholders by port and flag states.

In this blog we focus on the critical role of ship inspection and data sharing in improving safety and environmental protection at sea. Various Inspection like, Annual Flag State Safety Inspection, Port State Control (PSC) Inspections, Classification Society Routine Inspections, Owners/ Charterers/ Insurance Vessel Condition Inspection, have been the primary mode to ascertain condition of vessel and the data collected forms the basis of many important decisions within the industry which has serious implication for Safety of life at Sea and the Maritime Environment.

Investigation reports into various Maritime Accidents as compiled on IMO GISIS points to human error – related to quality control and inspections – as one of the leading contributing factors. The below table shows the leading factors for ship deficiency as recorded under Paris MOU annual report for the year 2020.



Source: Paris MOU Annual Report 2020, P 45

Fire Safety and Safety of Navigation being the top categories of deficiencies underscores the importance of precise recording, reporting, data access for reference and follow up across jurisdictions to avoid impending loss of life and potential marine pollution. This record of deficiencies together with the recurring nature of maritime accidents begs for a deeper analysis and understanding of the tools, methods and process in place.

 Common pain points of a Manual Technical Survey include:

  1. Loss of life and irreparable environmental damage due to the manual surveying and control methods used in the shipping industry for centuries.
  2. On an average it takes up to seven days of planning, liaison with various parties and physical survey for each vessel to produces PDF reports like the ones below that usually sits dormant in PDF files.
  3. Historical data on ship conditions and defects are incomprehensible (static PDF reports). The lack of precise data often leads to incorrectly calculated political decisions. One such example is the PSC inspection report for all MOUs in PDF format with little or no follow-up to the deficiencies found. As soon as a ship is allowed to sail after a warning and recommendation from a PSC officer, the written text in PDF files is seldom detailed in the existing online data exchange systems (e.g., Equasis and Paris MOU detention list) which provides a brief on the vessel detention.
  4. In addition, much of the critical ship inspection information is lost due to its non-digital nature which inherits easy sharing and is prone to misunderstanding when read by other participating port state administrations. This practice sometimes results in substandard ships failing to meet regulatory requirements.

There are several important factors that deserve attention and improvement; We need a solution to address the problem of human error and data loss and to improve the currently mostly manual format of inspection and PDF-based reporting that is practiced in the maritime industry.

 Cyber Smart – The Solution!

Solving this problem of dangerous oversight, human error and data loss in the shipping industry through Cyber Smart – a web and mobile-based e-survey platform that ensures that inspection authorities are equipped with a digital survey tool that enables them to digitally transmit the survey data an app.

Cyber Smart – A Web and Mobile Application for Survey Planning, Conduct of Survey, Survey Report Generation. It is an advanced format agnostic SaaS platform taking data collection and analysis to the next level. It leverages the most advanced cloud computing infrastructure running our proprietary algorithm to spin out trends, using both collected and historical data.

We use our proprietary algorithm and the most advanced cloud computing infrastructure to generate trends from collected and historical data. The platform is revolutionizing the way inspections are performed in the shipping industry and has the potential to revolutionize data collection and analysis across industries. This mobile application is more suitable for Surveyors as there are no physical documents involved to delay the process.

Why choose Cyber Smart?

  1. Ground Surveyor uses mobile app to collect data while onboard the ship, our mobile application allows users to achieve the highest degree of digital visualization and offers the capability of collecting all types of data.
  2. One click report generation in any format. Time and effort saved.
  3. More time to focus on the critical check items that matter, thus reducing the human error that contributes to 58% of Marine incidents.
  4. Consolidation of crucial data sets through smart analytics to inform sectoral policy formulation
  5. Better protection of Marine environment and life at sea through advanced pre-emptive maintenance of vessel thus avoiding shipping related environmental disasters.


Features of Cyber Smart:

  1. The Web based version of CyberSmart positions the users to access survey data, monitor deficiency trends through customised data analytics and to extract key reports in all required format – this feature allows for seamless integration with the present system in place. CyberSmart takes away the human error element in recording of key survey data and can generate customised reports through a mouse-click.
  2. Our Mobile app allow surveyors to conduct digital inspections, and one of the key features of the application is that the mobile app communicates with web application
  3. Digital Survey Management reduces manhour spent in planning, allocation, conduct and report generation.
  4. Vessel tracking and survey allocation to ground surveyor using online dashboard
  5. Various report formats are generated digitally once all data is synced to the cloud server
  6. Secure Data Repository feeds into AI driven key visualization displayed on user interface

Still want to know more about Cyber Smart. Request a demo at:


Deepthi Bennan & Richa Dutt Nandan

Marketing Managers,

Cyberwaves B.V. & Varuna Marine B.V

Cybersecurity in 2021

Due to pandemic, cyberattacks are becoming common. The absence of a network perimeter in this new world accelerated the adoption of SASE (secure access service edge), zero trusts, and XDR (expanded identification and reaction) to guarantee remote clients and their information is ensured.

Keep reading to know more about cybersecurity in 2021. Cyber security experts predict there will be a cyberattack every 11 seconds, which is four times the rate of five years. Cyberattacks are not only increasing, the companies are also costing large financial losses.

History of Cyber Crimes

In the beginning 1970’s, the malicious link was the first document hacking when early computerized phones became the target. The techies called “ Pherakers”, who were the first hackers, discovered that the telephone system in America functioned on the basis of certain tones and tones that would result in free long distance service.

Top 8 Biggest Cyber Attacks in History

Common Types of Cyber Crimes

  1. Web attacks
  2. Malware
  3. Ransomware
  4. Password attacks
  5. Trojan Horse
  6. Insider threats
  7. Teardrop attacks
  8. Ping to the death attacks
  9. SQL injection
  10. AI powered attacks
  11. DDoS attacks
  12. PuP’s
  13. Eavesdropping Attacks
  14. Man in Middle attacks
  15. Drive by attacks
  16. Phishing attacks
  17. Spear phishing attacks
  18. Whale phishing attacks
  19. Cross Site scripting
  20. Brute force and Dictionary Network Attacks
  21. Cyberstalking
  22.  Illegal/Prohibited content

Top Industries which affect in 2021

The industries most vulnerable to cyber attacks:

  • Small businesses
  • Healthcare institutions
  • Government agencies
  • Energy companies
  • Higher education facilities
  • Information and technology complained
  • Maritime Industry

How to prevent cyber crimes in 2021?

“Precaution is better than cure.”

Prevention is more important in this case, so we are explaining the prevention of cyberattacks.

1. Common ways to prevent cyber attacks

  • Install spam filter and anti-malware software
  • Develop cybersecurity policies
  • Implement cybersecurity awareness training
  • Deploy next-generation firewalls
  • Install Endpoint detection and response (EDR)

2. Advanced protection

  • Perform A Successful Network Security Vulnerability Assessment
  • Conduct Different Types Of Penetration Testing
  • Create a data loss prevention program
  • Implement SIEM (Security Information and event management) Solution
  • Bring intrusion detection & prevent software (IDS and IPS)

We can help with prevention, mail us at

Next Articles: Maritime Technical Surveys: Problem VS Solutions


Deepthi Bennan

Marketing Manager, Cyberwaves B.V.

Cybersecurity Awareness Trainings – The Human Firewall

Cybersecurity is all over the news channels and media these days. The subject even finds extensive mention on the governmental budgets and expenses.

A major chunk of the cybersecurity spend is driven by the fear of keeping external threats from stealing organizations’ most valuable asset- the information

However, according to McKinsey, 50% of the data breaches in 2017 were caused by insiders.
In a report earlier this year, Gartner sees “the trend in buyer interest in insider threats with buyer inquiries for insider threats in 2019 on pace to double the inquiries on the topic since 2018.”

The need of cybersecurity awareness trainings is imperative with the advent of diversification at the workplaces to include remote workers, contractors, part time employees, suppliers.

Add to the mix various platform integrations, managed services that promise to have a seamless experience for our users resulting in increased productivity, the insider threat risks will continue to grow.

The field of technologies traditionally used to combat insider threats is relatively siloed, and may include:

User Entity Behavior Analytics (UEBA) which is focused on detecting threats by analyzing massive amounts of “log” information

Data Loss Prevention (DLP) that approaches the problem from a “data” perspective by classifying and defining preventative controls based on content inspection

User Activity Monitoring (UAM) that focuses on only analyzing “user activity” to identify threats.

Legacy siloed technologies can’t keep up with the insider threats, unless there is measures to combat the lack of a user’s awareness.

The decision makers of today, (mis)guided by the concept of defense in depth continue to deploy the layered yet siloed solutions, where each new layer solves only a piece of the puzzle.

Where the most important aspect and the weakest link of this puzzle – Our Users gets lost in the technology centric view imposed upon them.

The insider threat and especially the lack of a user’s awareness to safeguard the information requires a more holistic approach that must include the functions such as the HR, Legal, Physical Security and not just the IT or Compliance.

User Awareness trainings must also be linked to a user’s mandatory induction or appraisals and reinforced by the management.

Now, If only the employees at the hospital understood the responsibility of handling the patient information, our neighborhood hospital could have saved the efforts and funds of a post data breach cleanup*Cybersecurity is all over the news channels and media these days. The subject even finds extensive mention on the governmental budgets and expenses.

A major chunk of the cybersecurity spend is driven by the fear of keeping external threats from stealing organizations’ most valuable asset- the information

However, according to McKinsey, 50% of the data breaches in 2017 were caused by insiders.

In a report earlier this year, Gartner sees “the trend in buyer interest in insider threats with buyer inquiries for insider threats in 2019 on pace to double the inquiries on the topic since 2018.” 


 About the Author


.Settled in The Hague, Punita is an electronics and telecom engineer by education. She has run Information Security programs and Audits for French/Indian multinational firms across the Middle east, Europe, India and Malaysia.