Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Securing Utilities Has to Be a Priority

Securing Utilities Has to Be a Priority

It’s been reported that a hacker virtually broke into a Floridian water treatment facility and briefly increased the levels of sodium hydroxide in the Pinellas County water supply. Fortunately, onsite operators noticed the spike and reduced it right away, keeping the public from risk of increased levels of poison in their water. This is just the latest story in a seemingly never-ending supply of them that have to do with public utilities being at risk from cyberattacks. Today, we will take a look at this issue. 

Protecting Online Utilities

Today, most systems are not only run through the use of computers, they are perpetually online so that remote operators have access to manage these systems. This provides hackers a wider-range of opportunities to carry out attacks against public infrastructure. Despite the massive amount of capital invested to ensure that these systems remain secure and reliable, all it takes is one situation to cause a great deal of public harm. The event in Florida just accentuates how important the security protecting these systems is. 

The Shifting Utilities Landscape

Over the past year, more people have been asked to work remotely to help keep the COVID-19 pandemic from spreading. This has not only led to more people working remotely at jobs that would typically require on-site staff, it also has helped push a degree of automation (using artificial intelligence and machine learning) to help identify incongruencies and threats to critical IT systems. This means that more people are relying on unfamiliar tools to do their jobs remotely. One can understand how this can lead to some confusion when trying to thwart very specific and targeted attacks. 

Threats Against Utilities and Infrastructure Are More Severe

A recent report from the Ponemon Institute suggests that threats against utilities are becoming shockingly more sophisticated. 54 percent of utility managers stated that they expect to have to deal with at least one cyberattack on critical infrastructure in 2021. That means that half of the people that work in electricity, water treatment, solar and wind, and gas think that they will be directly dealing with a major event triggered by a cyberattack this year. That’s completely unsettling considering how important these systems are to the sustainability of our society. 

What is Being Done?

This is where it gets a little tricky. Utility companies spend a lot of time and resources securing infrastructure. There’s a reason most of these places are surrounded by razor wire. To secure themselves against cyberattacks, however, they are taking much the same approach that your average enterprise would. They will try to secure systems by learning from past mistakes, innovating the tools they use, and simply being more vigilant.

Some innovations to speak of are similar to the ones you might see at your business. Using the integration of AI to actively search for and identify threats can end up being quite beneficial. AI can go through a lot of data extraordinarily quickly, meaning that it can identify potential problems quicker and thwart bad actors’ attempts at sabotage. Another technology that is being used in energy distribution is the Internet of Things. Utility companies are starting to utilize smart meters that modulate the flow of electricity and water. While you’d think that the integration of IoT devices would actually make the systems less secure, utility companies identified that from the outset and spent time and resources securing those systems before they were ever deployed in the field. 

Protecting our utilities has to be essential not only for utility companies, but also for society as a whole. What are your thoughts? Should the public subsidize utility companies for their cybersecurity? What moves would you make? Leave your thoughts in the comments section below.

AI Can Help You Run Your Business Efficiently
Tip of the Week: The Guide to Optimal Password Eff...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 07 2021

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Data Backup Network Security Privacy Hosted Solutions Internet Cloud IT Services Software Email Data Recovery Efficiency Managed IT Services Business Mobile Device Innovation User Tips Google Phishing Small Business Malware Collaboration Hardware Outsourced IT Cybersecurity Hackers Upgrade Workplace Tips Business Management Cloud Computing Computer Tech Term Smartphone Managed Service Microsoft Mobile Devices Android Communication Business Continuity Windows 10 VoIp Backup Smartphones Quick Tips Covid-19 Disaster Recovery Ransomware Communications Managed Service Provider Paperless Office Network Passwords Remote Work Encryption Browser Business Technology Data Management Wi-Fi Users Server Saving Money Artificial Intelligence Office 365 Internet of Things Remote Monitoring Managed IT Help Desk BDR Social Media Vulnerability Holiday Save Money Healthcare Document Management Government Microsoft Office Compliance Windows 7 Scam Managed IT services Chrome Miscellaneous Laptops Windows Data Security Automation Facebook Applications Blockchain Infrastructure Two-factor Authentication Virtualization Employer-Employee Relationship Redundancy Tip of the week Wireless Machine Learning Processor Vendor Management Information Analytics Gadgets Avoiding Downtime Bandwidth Antivirus Mobile Office Health Office Project Management Remote Data Loss Net Neutrality Employee-Employer Relationship Software as a Service Router Storage Maintenance VPN Apps Mobility Networking RMM Website IT Management Files Access Control Proactive Virtual Private Network Meetings Customer Relationship Management Company Culture Information Technology BYOD IoT Regulations OneDrive Managed Services Training Hard Drive WiFi Instant Messaging Consulting Downtime Money Spam Alert Vendor Unified Threat Management Customer Service Tablet HIPAA Utility Computing Managed Services Provider Big Data Bring Your Own Device Internet Exlporer Free Resource Remote Workers Password Dark Web Augmented Reality Smart Technology Remote Computing Server Management Search Computing Data Storage Images 101 File Management Recycling Social Network Assessment Voice over Internet Protocol Mobile Security Monitoring Payment Cards Flexibility Network Management Display Remote Worker Unified Communications Remote Monitoring and Management Word Consultation Financial Holidays Operating System Patch Management Data Breach Co-Managed IT Gmail Management Professional Services The Internet of Things File Sharing Time Management Employees Cooperation Electronic Health Records Risk Management Settings Personal Information Heating/Cooling Mouse Language IT Wearable Technology Star Wars 5G Mobile VoIP Peripheral Enterprise Content Management Optimization CES App Manufacturing Trending Break Fix Techology Laptop Identity Theft Enterprise Resource Planning Virtual Assistant Bookmarks Bitcoin ROI Geography Fleet Tracking Zero-Day Threat Batteries Statistics Cyber Monday Staff Video Conferencing Cache Cyberattacks GDPR Social Permissions Banking Transportation Active Directory Servers Computing Infrastructure Business Telephone Wireless Internet Mobile Device Management Microsoft Excel Technology Laws PCI DSS Social Networking Emergency Multi-Factor Security Virtual Machines Screen Reader Smart Devices Outlook Disaster Resistance Remote Working Identity Wasting Time Favorites Current Events Modem High-Speed Internet Asset Tracking CIO applications Backup and Disaster Recovery Bluetooth Biometric Read Only Recovery Security Cameras Google Calendar Fraud Printer Reviews G Suite MSP Finance Windows Server Alerts IT Assessment Tech Support Point of Sale Employer/Employee Relationships Tech Terms Apple Unified Threat Management Conferencing Travel Credit Cards Smart Tech Hard Disk Drives Sensors Shortcut Proactive IT Virtual Reality Budget Mobile Database Development Human Error Firewall Gamification Notes Printing End of Support Motherboard Chromebook Authentication User Management Websites Comparison Lenovo Licensing Digitize IT Technicians Cost Management E-Commerce Proactive Maintenance Theft Solid State Drive CRM Projects Technology Tips Samsung Computers Customer Relationships Connectivity Solid State Drives Electronic Medical Records Data Warehousing IT Consulting Gifts Cookies Cables OneNote Permission Value of Managed Services Distributed Denial of Service Migration eWaste PowerPoint Legislation SharePoint Windows Server 2008 Vulnerabilities Teamwork Authorization SaaS Specifications Superfish Shadow IT Features Cybercrime Cyber security Mail Merge User Error Content Filtering Politics Return on Investment Digital Payment Hotspot Options Telephone Operations Managing Stress Downloads Hacker Nanotechnology Wires How To Touchscreen Test Hacking Managed IT Service Outsource IT Chatbots Private Cloud Mobile Computing WPA3 Shared resources Going Green Black Friday Outsourcing Mirgation Database Management Procurement Address Regulation Education Marketing CEO Printers Students Daniel Stevens Twitter

Latest Blog

A lot of business is being conducted over the Internet right now, in terms of communication and transactions alike, which makes a business’ capability to remain connected to its clientele even more important. Now is not the time to wonder if your business is as connected as ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...