Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

ABI Research releases a special report for CIOs & CTOs identifying the 6 biggest cybersecurity risks facing the utilities industry

May 2019 by ABI Research

The utilities industry is rapidly modernizing its infrastructure, adding more
digitized equipment and connectivity across devices, plants, and systems. This
evolution to “smart infrastructure” represents a positive, paradigm shift for
the industry. Unfortunately, the security policies of many utilities have not
evolved along with it, leaving them incredibly vulnerable. In its new whitepaper,
The 6 Biggest Cybersecurity Risks Facing the Utilities Industry, ABI Research identifies the 6 most prevalent
security weaknesses in the Utilities Industry and offers best practices to utility
companies looking to steer clear of cybercriminals and threats.

Utilities are investing heavily to modernize infrastructure. In fact, ABI Research
projects that the industry will spend $14 billion a year between 2018 and 2023 — a
total of $84 billion over that time period. While investments in digital
infrastructure will remain very high over the next several years, investments in
securing that infrastructure will lag behind. Unfortunately, there is a growing gap
between threats and spending — only 55% of the total security spend in the next 5
years will be spent on securing smart infrastructure.

By 2023, connected utility infrastructure will have essentially doubled in size,
exposing utility companies to a myriad of cybersecurity risks. These are the 6 most
critical, and pressing, risks:
 1. Boundary Protection (undetected unauthorized activity in critical systems)
 2. Physical Access Control (unauthorized physical access to maliciously
 3. Allocation of Resources
 4. Least Functionality (increased vectors for malicious party access)
 5. Identification and Authentication (lack of accountability and traceability)
 6. Account Management (compromised unsecured password communications)

As these threats continue to mount, it’s imperative for companies within the
utility space to deploy secure IT/OT solutions. In the whitepaper, considerations
and recommendations for shoring up IoT architecture and integrated security
capabilities are offered as well.

The complimentary report can be downloaded at
http://bit.ly/2Jw91PJ?utm_source=Media&utm_campaign=6af658c937-EMAIL_CAMPAIGN_2019_05_14_07_38&utm_medium=email&utm_term=0_9dd6bf6d80-6af658c937-45155881.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts