Overview
Since 1990, Shelly Automotive Group has crafted world-class automotive retail experiences for customers seeking luxury vehicles in Southern California. The company operates a network of car dealerships that offers automotive services and specializes in renowned brands such as Lexus, BMW, Rolls-Royce, Mercedes-Benz, and Toyota. With approximately 800 employees and partners accessing its infrastructure and applications, the organization faced the critical task of building a robust security infrastructure for protection against cyber threats while also meeting compliance regulations.
Michael Price, the chief technology officer (CTO) at Shelly Automotive Group, has played a pivotal role in architecting that infrastructure. When Price joined Shelly Automotive in 2007, he brought his experience as a Microsoft-certified systems engineer and a Cisco Certified Network Professional. He quickly became responsible for not only the company's entire IT infrastructure, but for securing it as well.
His hands-on approach allows him to navigate the complexities of the IT landscape and select best-in-class security solutions tailored to the company's industry-specific needs. "I've been fighting hackers my whole career, since the '90s," says Price. "For me, security has always been important."
A call to action—and compliance
In response to the increasing prevalence and rising stakes of cyberattacks, strict security regulations emerged — including those imposed by cyber insurance providers, the California Consumer Privacy Act (CCPA), and the Federal Trade Commission (FTC). Shelly Automotive faced the critical task of fortifying their security infrastructure to comply with these regulations and to bolster its defenses against emerging threats.
Price recognizes the challenging and ever-evolving cybersecurity environment. "It's just unfortunately the world we live in," he says. "We're doing business in a war zone." Despite persistent threats, the organization's employees remain focused on doing their jobs, typically unaware of the potential risks lurking in the digital landscape. "They just want to do their job, but they don't even realize that we're under constant attack, or the potential of attack."
In response to the reality of operating in an always-connected world—as well as running a business that regularly processes large transactions—Price sought a robust and proactive security approach to protect sensitive customer data, help ensure operational continuity, and achieve regulatory compliance. "To meet those requirements," Price says, "I had to beef up our security structure with products to provide multi-factor authentication." Recognizing the critical role of multi-factor authentication (MFA) in thwarting unauthorized access attempts, Price sought a reliable solution that could protect against potential security breaches without placing an undue burden on IT and security staff.