
In my latest blog post, I take a close look at the global airline industry. What challenges does it face, particularly with regard to cybersecurity? What solutions are available, and how can airlines use them to improve security and resilience
The airline industry has always been a critical infrastructure sector - but in recent years, it has also become a prime target for cyberattacks. In 2025 alone, cyberattacks on airlines rose by 24% globally, driven by increasingly sophisticated phishing, ransomware, and social engineering campaigns. Airlines store and process immense volumes of passenger data, manage global booking systems, and collaborate with numerous third-party providers - making them high-value targets for threat actors.
The consequences of successful attacks range from disrupted operations and grounded flights to extorted ransom payments and reputational damage. Moreover, the regulatory burden is rising. Airlines must comply with international and regional standards such as ICAO, IATA, ISO/IEC 27001, NIS2, EU GDPR, Germany’s BSI regulations, KRITIS, and TTDSG.
Overall, I identified five ongoing cyber risks that airlines face.
In the light of the increasing regulatory pressure - from ICAO and IATA to NIS2 and EU GDPR - airlines must ensure secure authentication across all endpoints without adding complexity.
The global airline industry is facing its greatest challenge in the form of phishing. As demonstrated by the recent case involving Quantas, phishing campaigns have a significant impact on reliability and smooth operations.
1. Employee credentials and privileges: attackers test help-desk staff via fake calls or emails (“vishing”), impersonating staff or contractors to bypass MFA.
2. Third-party / vendor systems: attackers often breach airline partners (e.g., call-center platforms) to circumvent internal security, as demonstrated by the Qantas breach.
3. Passenger data: names, emails, phones, date of birth’s, frequent flyer info are commonly stolen for fraud or resale.
4. Loyalty accounts & booking systems - fraudsters aim to hijack loyalty points, manipulate bookings, or test payment flows.
5. Operational systems - phishing might be a precursor to ransomware or sabotage, targeting scheduling, check-in, or IoT infrastructure.
Swissbit’s iShield Key 2 offers a robust, all-in-one security solution that enables seamless and certified access control.
By combining physical and digital authentication into a single device, companies can reduce complexity and save on device management and support efforts.
The positive effects of integrating iShield Key 2 into airlines IT security infrastructures on their economic success are obvious and convincing.
In summary, reducing security incidents by eliminating password-related vulnerabilities reduces operating costs by providing uniform management of access devices and minimizing IT support costs through simplified authentication processes. These benefits are complemented by compliance with global requirements and avoidance of penalties for regulatory violations.
According to the HYPR 2025 State of Passwordless Identity Assurance Report, hardware authentication devices and FIDO passkeys are expected to become the global gold standard by 2027. Swissbit’s iShield Key 2 is already delivering on that vision - today.
The Swissbit iShield Key 2 is essential for ensuring secure, compliant, and efficient airline operations. As attack surfaces increase and regulations become stricter, airline operators must deploy reliable, integrated solutions that protect people, employees, and data.
The iShield Key 2 series allows airlines to lead this transformation and ensures they are prepared for a passwordless future. With Swissbit, you gain a trusted European partner to accompany you on your digital transformation journey.
We would be happy to show you how you can build a scalable security architecture with a hardware token without compromising productivity. Convince yourself of our expertise.
Receive the latest news and announcements about storage, security and IoT solutions as well as current events and new products -directly to your mailbox
Downloads with a symbol are only available after loginOnly available after login