Energy Under Hacktivist Threat

 

In a conference recently held in the state of Wyoming, US, an FBI official of the criminal and national cyber security squad said that in light of the number of cyber attacks which has occurred lately, the state, and especially the energy companies in its territory, must take seriously the possible dangers for facilities supplying energy to residents. 

According to him, any company or business that use computers are exposed to cyber threats, but the energy companies even more so, as they are part of the state’s infrastructure which means they are in more dangers than anyone else. He specified and said that potential attackers, which pose the most number of hack threat are the ones inside the system, such as disgruntled employees with access to company computers.

A second source for cyber attacks are a group of hackers called Hacktivists, a combination of the words Hacker and Activists, whose goal is to steal information and cause damage in order to bring what they would consider to be a political or social achievement. The FBI official said in his review, during the conference which dealt with the issue of energy and was arranged by the Wyoming Infrastructure Authority, that Hacktivism hold serious dangers since hacktivists can’t be characterized by any single or special personality patterns – the group contains activists from any political and social affiliation – and so it’s next to impossible to recognize them in advance.
One of the worst dangers for the energy field by cyber activists is stealing professional information which is defined as “intellectual property” such as a proprietary way to drill a well, but an even more substantial danger, one which the law enforcement authorities are losing sleep over, is a cyber attack meant to disrupt the factory’s manufacturing process, thus causing damage in the real world.

One pattern of action used to penetrate the computer network is by sending a software to an employee who unknowingly activates it and with it allows the penetration of hostile factors. After penetrating, they stay in the system and integrate into the company’s routine so they’re hard to detect as standing out. The spokesperson concluded and emphasized that in order to deal with cyber attacks on energy companies, action must be taken mainly in two ways: paying attention to revealing too much information in social networks and creating a response plan in case of a cyber attack taking place.
But dealing with results is not enough. Another spokesperson involved in matter and national and public security in the communications field in the United States claims that preventive actions must also be taken to minimize risks for a cyber attack in the future. 

Defending against hacktivist is a matter that may cost a lot of money, but eventually it is about a secured work place that rests mostly on using non-banal passwords that cannot be revealed easily.
I-HLS: http://bit.ly/1GWKaiz

 

 

« Who Is In Charge if a Massive Cyber Attack Strikes the U.S?
Essential Cyber Security Tips to Stay Safe Travelling »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Fieldfisher

Fieldfisher

Fieldfisher's Technology, Outsourcing & Privacy Group has class-leading expertise in privacy, data & cybersecurity, digital media, big data, the cloud, mobile payments and mobile apps.

Cyber Exchange

Cyber Exchange

Cyber Exchange provides a focal point for UK organisations connected with, or with an interest in, cyber security to connect, engage and collaborate.

Hitachi Systems Security

Hitachi Systems Security

Hitachi Systems Security provides customized services for monitoring and protecting the most critical and sensitive IT assets in our clients’ infrastructures 24/7.

Prevalent

Prevalent

Prevalent takes the pain out of third-party risk management. Companies use our services to eliminate the security and compliance exposures that come from working with vendors and suppliers.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

Critical Start

Critical Start

Critical Start provides Managed Detection and Response services, endpoint security, threat intelligence, penetration testing, risk assessments, and incident response.

Privacyware

Privacyware

Privacyware's ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted IIS traffic and web application threats.

CyberRisk Alliance (CRA)

CyberRisk Alliance (CRA)

CyberRisk Alliance is a business intelligence company created to serve the rapidly evolving cybersecurity and information risk management marketplace.

NetScout Systems

NetScout Systems

NetScout assures digital business services against disruptions in availability, performance, and security.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.