Energy Under Hacktivist Threat

 

In a conference recently held in the state of Wyoming, US, an FBI official of the criminal and national cyber security squad said that in light of the number of cyber attacks which has occurred lately, the state, and especially the energy companies in its territory, must take seriously the possible dangers for facilities supplying energy to residents. 

According to him, any company or business that use computers are exposed to cyber threats, but the energy companies even more so, as they are part of the state’s infrastructure which means they are in more dangers than anyone else. He specified and said that potential attackers, which pose the most number of hack threat are the ones inside the system, such as disgruntled employees with access to company computers.

A second source for cyber attacks are a group of hackers called Hacktivists, a combination of the words Hacker and Activists, whose goal is to steal information and cause damage in order to bring what they would consider to be a political or social achievement. The FBI official said in his review, during the conference which dealt with the issue of energy and was arranged by the Wyoming Infrastructure Authority, that Hacktivism hold serious dangers since hacktivists can’t be characterized by any single or special personality patterns – the group contains activists from any political and social affiliation – and so it’s next to impossible to recognize them in advance.
One of the worst dangers for the energy field by cyber activists is stealing professional information which is defined as “intellectual property” such as a proprietary way to drill a well, but an even more substantial danger, one which the law enforcement authorities are losing sleep over, is a cyber attack meant to disrupt the factory’s manufacturing process, thus causing damage in the real world.

One pattern of action used to penetrate the computer network is by sending a software to an employee who unknowingly activates it and with it allows the penetration of hostile factors. After penetrating, they stay in the system and integrate into the company’s routine so they’re hard to detect as standing out. The spokesperson concluded and emphasized that in order to deal with cyber attacks on energy companies, action must be taken mainly in two ways: paying attention to revealing too much information in social networks and creating a response plan in case of a cyber attack taking place.
But dealing with results is not enough. Another spokesperson involved in matter and national and public security in the communications field in the United States claims that preventive actions must also be taken to minimize risks for a cyber attack in the future. 

Defending against hacktivist is a matter that may cost a lot of money, but eventually it is about a secured work place that rests mostly on using non-banal passwords that cannot be revealed easily.
I-HLS: http://bit.ly/1GWKaiz

 

 

« Who Is In Charge if a Massive Cyber Attack Strikes the U.S?
Essential Cyber Security Tips to Stay Safe Travelling »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

SecurityMetrics

SecurityMetrics

SecurityMetrics is leader in data security, PCI, and HIPAA compliance solutions

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

SentinelOne

SentinelOne

SentinelOne is a pioneer in delivering autonomous security for the endpoint, datacenter and cloud environments to help organizations secure their assets with speed and simplicity.

Advanced Systems International SAC

Advanced Systems International SAC

Advanced Systems international is a global company dedicated to data security software design, development, support, and licensing.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

GlobalPass

GlobalPass

Covering 200+ countries with 78 000 databases, GlobalPass provides sophisticated facial biometrics verification and deep screening, delivering peace of mind to every client.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Censinet

Censinet

Censinet provides the first and only third-party risk management platform for healthcare organizations to manage the threats to patient care that exist within an expanding ecosystem.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Tryaq

Tryaq

Tryaq are a group of cybersecurity experts and enthusiasts who share the mission to make the world feel safer online.

HaystackID

HaystackID

HaystackID provides industry-leading computer forensics, eDiscovery, and attorney document review experts to help with complex, data-intensive investigations and litigation.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.