094 90 48200    Get SUPPORT

Aniar IT Services Blog

Are Utilities as Secure as They Should Be?

Are Utilities as Secure as They Should Be?

Recently, a story broke in Florida that sounds like something out of a terse action film: a hacker managed to access a water treatment facility and subjected the Pinellas County water supply with increased levels of sodium hydroxide. While onsite operators were able to correct the issue right away and keep the public safe from danger, this event is the latest in a line of cyberattacks directed at public utilities. Let’s consider this unpleasant trend.

Keeping Utilities Safe

Many of today’s systems run via the assistance of computers and are hosted online to embrace remote capabilities. Unfortunately, this nature leaves them vulnerable to hackers—despite the huge investments made into protecting the public infrastructure that runs on these systems.

As the event in Pinellas County proves, it just takes one time to cause great damage. Therefore, we can see why it is so important to keep these systems secure.

How Utilities Have Changed

With more people than ever suddenly working remotely, many jobs that once required on-site staff have shifted to automated solutions—especially in terms of seeking out IT threats and issues. However, with all this “newness”, many people aren’t familiar with the toolkits they are working with.

As a result, more employees are vulnerable to attacks and less aware of how to prevent them.

Infrastructure and Utility Threats are Increasing in Severity

According to a Ponemon Institute report, the level of sophistication that is used in attacks against utilities has increased sharply. 54 percent of utility managers foresee having to contend with at least one cyberattack this year—meaning that half of those that provide electricity, safe water, and other critical resources anticipate a major event.

When you consider how much our society relies on these systems, this is disconcerting to think about.

What Can Be Done?

Unfortunately, this question is where things can get complicated. It isn’t as though utility companies underestimate the importance of security, after all. However, by modeling their approach upon the one undertaken by the average enterprise, they have adopted a lot of the same practices: revising their practices as they go, continuing to innovate, and being increasingly vigilant.

For instance, many providers are integrating options that businesses have had success with. AI has been integrated to help identify potential threats much more efficiently by processing far more data in far less time. The Internet of Things is now used to better track and modulate internal processes and distribution of resources. Even better, these IoT devices (which are usually infamous for their questionable security) have seen the investments necessary to properly maintain their protections thanks to the efforts of the utility companies.

Considering the importance of our utility services, protecting them needs to be a priority… but what do you think? Should more attention be paid to the cybersecurity protecting them? Leave your opinion in the comments.

What Can Be Done to Counter COVID-19-Themed Scams?
Tip of the Week: Keep Track of Your Priority Gmail...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 23 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.aniar.ie/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Productivity Google Email Cloud Privacy Efficiency User Tips Network Security Workplace Tips Internet IT Support Data Mobile Device Hackers Hosted Solutions Innovation Communication Software Microsoft Collaboration Business Android Hardware VoIP Small Business Users Data Recovery Smartphone Smartphones Data Backup IT Services Managed IT Services Phishing Windows 10 Computer Cybersecurity Backup Communications Mobile Devices Tech Term Cloud Computing Network Miscellaneous Quick Tips Managed Service Gadgets Malware Windows Outsourced IT Business Continuity Saving Money Disaster Recovery Business Management Browser Upgrade Covid-19 Passwords Internet of Things Artificial Intelligence Spam Information Facebook BDR Social Media Holiday Save Money Chrome Microsoft Office Server Office 365 Operating System BYOD Blockchain Wi-Fi Automation Router Paperless Office How To Encryption Infrastructure Human Resources Mobile Office Windows 7 Government Patch Management Networking Word Cybercrime Ransomware Computers Data Security Apps Data Storage Applications Machine Learning Display Vulnerability Software as a Service Managed Services Bandwidth Remote Work Staff Information Technology Mobile Device Management History Two-factor Authentication Remote Data Protection HIPAA Remote Monitoring Settings Data Breach Virtualization Health Money Connectivity Telephone System Vendor Big Data Managed IT Compliance Digital Signage Procurement Fraud Cryptocurrency Botnet Bring Your Own Device IT Management Content Management Training Keyboard Wireless Managed IT services Employee/Employer Relationship App VPN Redundancy Meetings Voice over Internet Protocol Password Conferencing Google Drive Telephone Systems Social Engineering Virtual Assistant Audit Avoiding Downtime Processor Augmented Reality Private Cloud IT Plan Business Technology WiFi Comparison OneNote Printing Vendor Management Identity Theft Hard Drive Unsupported Software Google Docs Law Enforcement Net Neutrality Servers Telephony Office Access Control Sports Education Managed Services Provider Scam Website Spam Blocking Business Intelligence CES Update Help Desk Cortana Alert Recycling Devices Supply Chain Management Customer Service HBO FENG Printer Cables Trend Micro SharePoint Authentication SMS Telecommuting Mobile Computing OLED Using Data Apple Cache Cryptomining Batteries PCI DSS Computer Care Practices Remote Computing IT Assessment Skype eWaste Thought Leadership Google Search Outlook Amazon YouTube Mouse Default App Shopping End of Support Safe Mode Security Cameras Virtual Machine AI Solid State Drive Travel Smart Office Biometric Security Windows 10s Tools Work/Life Balance Wireless Internet Remote Worker Database Virtual Private Network Downtime Charger Hosted Computing Shortcuts Windows Server 2008 R2 OneDrive Start Menu Screen Mirroring Legal Save Time Frequently Asked Questions Recovery Amazon Web Services Accountants Microchip IT Infrastructure Social Network Customer relationships Employer-Employee Relationship Sync Multi-Factor Security Password Manager Nanotechnology Smartwatch Hypervisor Physical Security Document Management Camera Manufacturing Computing RMM Copiers Millennials USB Wiring Remote Workers Policy Root Cause Analysis Wireless Charging Inventory Enterprise Content Management Mobility 5G Cast Criminal Twitter Proactive IT Peripheral Excel Search Engine Investment Virtual Desktop Business Mangement Smart Tech Going Green Digital Signature Printers Virtual Reality Professional Services Employees Password Management Social Development The Internet of Things Public Cloud Value Workforce Electronic Medical Records Wire Firewall Managed IT Service Procedure Hacker Flash Google Apps Specifications Addiction MSP Project Management Quick Tip Tip of the week Online Shopping Bing ROI Personal Mobile Data loss Trending Gmail Employee Saving Time Computer Fan Credit Cards PDF Entertainment Warranty Cabling Fiber Optics Sales Workers NIST Messaging Software Tips Data Management Unified Threat Management FinTech HaaS File Sharing ISP Bitcoin Regulations Windows Server 2008 Evernote Cleaning HVAC GDPR Digitize Financial Domains Emergency Managed Service Provider Regulation Hiring/Firing Windows 10 Public Speaking Presentation Fun Company Culture Lithium-ion battery Wireless Technology Tech Support Managing Stress Safety IBM Productivity Marketing Hard Drives Budget Search Competition Customer Relationship Management Personal Information IP Address CrashOverride