The Growing Cyber Threat To Renewable Energy

Cyber attacks such as ransomware and denial-of-service remain significantly under-reported in the renewable energy industry.

This has recently added to the already significant demand for non-damage cyber risk insurance product as increasing numbers of firms seek to mitigate their potential exposure to business interruption and other cyber losses. 

The emergence of Covid-19 has led to an unprecedented lockdown worldwide, leading many renewable energy companies to take advantage of remote monitoring systems and working practices to try and ensure ‘business as usual’ despite the disruption.

Yet there have been recent high-profile examples in the UK, the US and Portugal, which have provided additional public demonstration of the need for asset owners to invest in cyber insurance products which can provide financial cover in these ‘non-physical damage’ events.

A spokesman at specialist insurance firm GCube, said: “Digitalisation of course drives significant efficiency gains for businesses and is now a necessity for renewable energy companies looking to maintain continuity during the Covid-19 pandemic....But with portfolios now at greater risk of cyber-attacks, we are seeing even greater demand for our cyber insurance product as project owners are increasingly realising the very real threat that cyber-attacks pose.”

Numerous businesses have approached GCube in recent weeks seeking a means to mitigate their financial exposure to cyber-attack. These include wind projects owned by leading firms such as Eolenerg and Molly Wind Ltd, who have either procured the coverage outright or included the product as part of their insurance renewal.

GCube’s research suggests that though cyber attacks are estimated to be responsible for over $3trn in losses annually, and are set to rise, the cyber insurance market last year was only worth approximately $5bn, with many insurers not yet providing cyber cover.

GCube Insurance:    Renewable Energy Magazine:   Wind Power Monthly

You Might Also Read: 

Cyber Threats Are The Top Insurance Risk:

 

« British Telcos Will Be Told To Strip Huawei Out Of Their Networks
Cyber Warfare, Intelligence & Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Kroll

Kroll

Kroll provides clients a way to build, protect and maximize value through our differentiated financial and risk advisory and intelligence.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.

ABCsolutions

ABCsolutions

ABCsolutions is dedicated to assisting businesses and professionals achieve compliance with federal anti-money laundering regulations in an intelligent and pragmatic way.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

GoTo

GoTo

At GoTo we help people and businesses to connect and collaborate simply and securely – from anywhere. We’re the trusted partner for companies of all sizes.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.