Connect with us

Hi, what are you looking for?

News

It’s time to enforce strict cybersecurity measures on infrastructure companies

It's time to enforce strict cybersecurity measures on infrastructure companies

On May 7, the pipeline system that carries nearly half of the fuel consumption on the east coast of the United States was paralyzed by a major cyber attack. 

Virginia, North Carolina, and Florida declared a state of emergency, the five-day closure of the colonial pipeline caused an extensive shortage of fuel and panic purchases. 

This attack shows how fragile critical infrastructures such as fuel pipelines are even in times of increasing cybersecurity threats.

 Wthink it’s time to make it a must-have for companies with critical infrastructure to adopt serious cybersecurity measures.

Fatalities

The risk of cyber attacks on important infrastructures is not unfamiliar.

After the events of September 11, 2001, research has shown that global security risks must be considered when analyzing critical infrastructure risks and security challenges. We also suggested systems to protect critical supply chain infrastructure, such as seaports and practices, including container transportation. 

As ransomware attacks increase, so does the risk, where attackers hijack sensitive data from company systems and ask for a ransom. 

Advertisement. Scroll to continue reading.

These attacks may have unintended consequences.

There is evidence that the closure of the colony was the result of one such attack on the data. The company seems to have stopped the pipeline network and other operations to prevent the spread of malware. 

That caused a series of unexpected consequences and collateral damage in the entire community. 

In fact, the attacker may be surprised at the extent of the damage and now seems to have suspended his actions.

We have seen how critical supply chain infrastructure can be severely damaged and how serious can be the consequences of a direct attack.

 Cyber risk frameworks are usually based on traditional risk management methods, in which potential cyberattacks are considered normal risks. These risk management methods weigh the cost of preventing network attacks and the cost of preventing them.

 In some industries, this estimate takes into account the cost of a lost customer base that may never come back. 

However, providers of basic services such as transportation, healthcare, electricity, water, and food do not see the risk of loss. 

After the colonization incident, the customer returned to the gas station as soon as possible and continued to buy fuel. 

Advertisement. Scroll to continue reading.

As a result, compared with companies in other industries, key industries can bring lower downtime costs because their customers return.

Cybersecurity work is coordinated by the Australian Cyber Security Centre (ACSC) under the Australian Government Management Bureau of Larian Signal. ACSC works with public and private sector organizations to share threat intelligence and best practice security recommendations. 

ACSC documents such as “Basic Eight” provide guidelines for organizations to implement basic security measures.

However, our research shows that even the Australian government does not always follow best practices. The problem is not the lack of knowledge. 

ACSC generally understands and documents security best practices well. ACSC also provides specific guidelines for key sectors and industries, such as the Safety framework for the energy sector.

These are just guidelines.

Companies can choose whether to follow these guidelines. Australia needs a cybersecurity compliance program. 

It means that companies that manage critical infrastructure (such as ports or pipelines) must comply with certain rules. 

The first step for these companies may be to comply with existing guidelines and require basic cybersecurity certifications. 

Advertisement. Scroll to continue reading.

Lessons from the U.S. 

The U.S. government issued an executive order to improve network security and federal government networks in response to colonial cyber attacks. 

The contract proposes a series of measures to modernize the standards and improve communication and reporting requirements. 

These are valuable actions, many of which are already within Australia’s existing commitments.

It's time to enforce strict cybersecurity measures on infrastructure companies

image credit: The Next Web

OVERVIEW:

On May 7, the pipeline system that carries nearly half of the fuel consumption on the east coast of the United States was paralyzed by a major cyber attack. There is evidence that the closure of the colony was the result of one such attack on the data. The company seems to have stopped the pipeline network and other operations to prevent the spread of malware.

Content Protection by DMCA.com
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like

News

The impact of attacks using various forms of ransomware is widespread, but it must be noted that the actual impact in the real world...

News

A vulnerability was recently discovered in macOS that could allow malware to bypass permissions and gain access to devices such as desktop microphones and...

Security

For while ransomware was the talk of the town as scammers and hackers took to exploiting users using this undetectable atrocity. Now, they have...

Security

Hackers are using Google and Microsoft for their malicious activities. The technology is there to make things easier for people but the hackers are...