Energy Under Hacktivist Threat

 

In a conference recently held in the state of Wyoming, US, an FBI official of the criminal and national cyber security squad said that in light of the number of cyber attacks which has occurred lately, the state, and especially the energy companies in its territory, must take seriously the possible dangers for facilities supplying energy to residents. 

According to him, any company or business that use computers are exposed to cyber threats, but the energy companies even more so, as they are part of the state’s infrastructure which means they are in more dangers than anyone else. He specified and said that potential attackers, which pose the most number of hack threat are the ones inside the system, such as disgruntled employees with access to company computers.

A second source for cyber attacks are a group of hackers called Hacktivists, a combination of the words Hacker and Activists, whose goal is to steal information and cause damage in order to bring what they would consider to be a political or social achievement. The FBI official said in his review, during the conference which dealt with the issue of energy and was arranged by the Wyoming Infrastructure Authority, that Hacktivism hold serious dangers since hacktivists can’t be characterized by any single or special personality patterns – the group contains activists from any political and social affiliation – and so it’s next to impossible to recognize them in advance.
One of the worst dangers for the energy field by cyber activists is stealing professional information which is defined as “intellectual property” such as a proprietary way to drill a well, but an even more substantial danger, one which the law enforcement authorities are losing sleep over, is a cyber attack meant to disrupt the factory’s manufacturing process, thus causing damage in the real world.

One pattern of action used to penetrate the computer network is by sending a software to an employee who unknowingly activates it and with it allows the penetration of hostile factors. After penetrating, they stay in the system and integrate into the company’s routine so they’re hard to detect as standing out. The spokesperson concluded and emphasized that in order to deal with cyber attacks on energy companies, action must be taken mainly in two ways: paying attention to revealing too much information in social networks and creating a response plan in case of a cyber attack taking place.
But dealing with results is not enough. Another spokesperson involved in matter and national and public security in the communications field in the United States claims that preventive actions must also be taken to minimize risks for a cyber attack in the future. 

Defending against hacktivist is a matter that may cost a lot of money, but eventually it is about a secured work place that rests mostly on using non-banal passwords that cannot be revealed easily.
I-HLS: http://bit.ly/1GWKaiz

 

 

« Who Is In Charge if a Massive Cyber Attack Strikes the U.S?
Essential Cyber Security Tips to Stay Safe Travelling »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BMS Group

BMS Group

BMS is an independent, employee-owned specialist insurance broking group. Broking solutions include Cyber and Technology.

Swimlane

Swimlane

Swimlane is a leader in security automation and orchestration (SAO). Our platform empowers organizations to manage, respond and neutralize cyber threats with adaptability, efficiency and speed.

Cryptovision

Cryptovision

cv cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

GlassSquid

GlassSquid

glasssquid.io simplifies your cyber security job search. We want to help you find your next perfect fit opportunity by removing the confusion.

Snode Technologies

Snode Technologies

Snode's Guardian cybersecurity platform uses AI and machine learning to monitor, detect and proactively respond to all threats on every device within your network.

AnyTech365

AnyTech365

AnyTech365 is a leading European IT Security and Support company helping end users and small businesses have a worry-free experience with all things tech.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

Association of Azerbaijani Cyber Security Organizations (AKTA)

Association of Azerbaijani Cyber Security Organizations (AKTA)

The Association of Azerbaijani Cyber Security Organizations (AKTA) is a non-commercial organization aimed at strengthening the country's cybersecurity system.

Eleos Labs

Eleos Labs

Eleos Labs' suite of security tools prevent Web3 cyber attacks, reduce economic risks, and protect digital assets.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Disecto Technologies

Disecto Technologies

At Disecto, we provide SaaS based Data Discovery, Classification and a remediation solution for data privacy compliance.

Evolve Business Group

Evolve Business Group

Evolve is an independently-owned managed network solutions provider, creating bespoke packages for customers globally since 2005.

Cribl

Cribl

Cribl, the Data Engine for IT and Security, empowers organizations to transform their data strategy.

Hydden

Hydden

Hydden gives security teams the ability to create a solid foundation to build a truly next-gen identity security practice by bridging the gaps between siloed teams and technologies.