• Home
  • Diver BI Group
    • Diver | BI
    • Customer Commendations
    • Videos
    • Case Studies & Customers
    • Documents and Brochures
    • Training
    • Diver BI Group Privacy Policy
  • Articles
    • News
    • Accolades
    • Blog
    • Ask Anthony
  • The Team
    • Key Experts
    • Members
      • Dynamic Business Informatics
      • Envisage
      • Chartwell IT
      • Data Management Business Insight
      • Manitex
      • Equiniti ICS
      • Pinnula
      • Dataweave Solutions
    • Partners
      • Dimensional Insight US
      • Dimensional Insight EU
      • Dimensional Insight Asia
      • DI Panama
      • ID Technology (Brazil)
      • Infotool (Nordic Countries)
      • BIMAXIS – DI France
      • Vision IT
      • Zight -Partner for Transport
  • Applications
    • Property
      • Property Prices Portal
    • Supply Chain
      • Retail
      • Distributor
      • Wholesale
      • Manufacturing
      • Produce
      • Beverage Alcohol Suppliers
      • Beverage Alcohol Distributors
      • Autoparts
      • Transport
      • Public Transport
      • DI Program Advisor
    • Healthcare
      • Healthcare
      • DI Surgery Advisor
      • Pharma BI Applications of Diver
    • Finance
      • Finance
      • DI GL Advisor
    • Mobile & SaaS
      • Diver BI SaaS
      • SaaS for Sales Gap Analysis
      • BI designed for Tablet
      • DiveTab – Mobile BI
    • Diverse Industries
      • Travel & Tourism
      • Colleges & Universities
      • Waste Management
      • Parking
      • Telecom Brokerage
      • Economic Trends
      • Maps
      • Carbon Emissions Management
  • Workbench
  • Contact
    • Free Consultation with One of Our Experts
    • Add a New Revenue Stream as a Partner

DiverBIGroup

Business Intelligence Experts

Diver BI Group Blog The Most Surprising Danger to Your Water Supply? Hackers.

The Most Surprising Danger to Your Water Supply? Hackers.

8th June 2021

by Meredith Galante

Consumers have grown accustomed to online hacks that affect credit cards or personal information, but after a recent hack of a Florida’s town’s water supply and a Texas gas line, a new fear has arisen…as well as a new frontier to protect.

In 2021, 12% of all cybersecurity attacks were focused on energy and utilities, according to Cobalt.

Cybersecurity experts have long warned that insecure remote work software presents a significant source of weakness vulnerable to hacking. Hacking utilities can be inconvenient at best or dangerous and deadly at worst.

Technology will only continue to control more of the utility space, but what are the risks?

Recent hackings pose public health issues

Earlier this year, hackers jeopardized the water supply of Oldsmar, Florida, gaining access to a water treatment facility by using a dormant remote access software. In simpler terms, the bad guys weren’t even there when they took control of the precious water supply.

According to CNN, the treatment plant utilized multiple computers running on an aging version of Microsoft Windows to help monitor the facility remotely. All of the computers shared a single password to manage the plant.

The hackers briefly changed the levels of lye in the drinking water—which could have poisoned the drinking water of thousands of Florida residents.

Sheriff Bob Gualtieri of Pinellas County said in a press conference following the event that the level of sodium hydroxide—the main ingredient in drain cleaner—was changed from 100 parts per million to 11,100 parts per million. If the 15,000 residents of Oldsmar drank the water at this level, they could have been poisoned.

“This is dangerous stuff,” Mr. Gualtieri said. “It’s a bad act. It’s a bad actor. It’s not just a little chlorine or a little fluoride—you’re basically talking about lye.”

The cyber breach lasted less than 5 minutes, and luckily the town averted danger.

In the past, “You had to get past the guards with the guns, the fences, the video cameras, all the physical security measures in order to get access,” Eric Cole, a former CIA cybersecurity expert and author of the upcoming book Cyber Crisis told CNN. But 2020 forced the majority of Americans to work from home. “These systems were never designed for that purpose, and proper security was never put in place.”

“I think what this shows us is it doesn’t matter who you are, whether you’re an individual, a small company or a large company, if you have vulnerabilities you’re going to be discovered, and you are a target, and cybersecurity is your responsibility,” Cole said.

Hacked gas pipeline causes run on pumps

Colonial Pipeline, the largest petroleum pipeline between Texas and New York, temporarily needed to shutter its operations after a ransomware attack in early May.

The private company admitted a hacker held its data hostage and demanded ransom to return access.

A shutdown of the 5,500-mile pipeline was another example of how the United States’ utilities face danger from cybersecurity breaches. The shutdown left airlines worried they’d be low on gas and average consumers sitting in line to ensure their gas tanks were filled.

“Even a temporary shutdown will likely drive already rising national retail gas prices over $3 per gallon for the first time since 2014,” Jay Hatfield, chief executive of Infrastructure Capital Management and an investor in natural gas and oil pipelines and storage, told The New York Times.

Within two days of the shutdown, the national average for a gallon of regular gasoline rose by 2 cents.

What utilities can do to protect themselves from hackers

Siemens and the Ponemon Institute released a report in 2019 stating 56% of utilities faced a cyberattack that year. So, more than half have already been put at risk.

Regardless if the utility is a public entity or a privately-held company, updating the software the system runs on and regularly running pen-tests can help protect against hackers and cybersecurity breaches.

Many companies may feel pressured to move operations to cloud-based solutions to accommodate remote work, but it’s essential not to migrate the data until it’s secure.

Investing in software that monitors for breaches can also help ensure any hacks are detected and quickly stopped.

 

Meredith Galante

Meredith Galante
Meredith Galante is a freelance writer based in New York City. She has been published in USA Today, amNewYork, Newsday, Square and more. She’s interviewed then-Mayor Cory Booker, Ryan Seacrest, and other New Jersey folks who made their community better. She’s covered breaking news, sports, features, and now frequently writes about small businesses.

Tags: Meredith Galante, Software hackers

Articles

  • News
  • Accolades
  • Blog
  • Ask Anthony
  • Diver | BI
  • Customer Commendations
  • Videos
  • Case Studies & Customers
  • Documents and Brochures
  • Training
  • Diver BI Group Privacy Policy

Dynamic Business Informatics Ltd

Distributors of The Diver Platform, providing business consultancy services, products and applications derived from Diver Gateway & Diver Platform.
14 Mellifont Avenue
Dun Laoghaire
Co. Dublin

+353 1 2302022

10 Kenyon Street
Nenagh
Co Tipperary

+353 67 43309

Contact Us

We would love to hear from you! Please submit your query and we will get in touch with you shortly.

Email addresses are never sold, rented, or shared. See our Privacy Policy.

  • This field is for validation purposes and should be left unchanged.

Accolades

  • High Praise for Dimensional Insight for 14th Straight Year in 2023 Wisdom of Crowds Business Intelligence Market Study
  • Best in Klas Report 2023 – Straight A Grades for Dimensional Insight
  • Dimensional Insight Named an Overall Leader by Dresner Advisory Services in 2022 Industry Excellence Awards
  • Dresner Wisdom of Crowds 2022 – Best in Class Results
  • Klas 2022 – A Grades for Dimensional Insight

Copyright © 2023 Diver BI Group · Privacy Policy · website by cubecolour

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.


What Are Cookies?


As is common practice with almost all professional websites this site uses cookies, which are tiny files that are downloaded to your computer, to improve your experience. This page describes what information they gather, how we use it and why we sometimes need to store these cookies. We will also share how you can prevent these cookies from being stored however this may downgrade or 'break' certain elements of the sites functionality.


For more general information on cookies, please read "What Are Cookies".


How We Use Cookies


We use cookies for a variety of reasons detailed below. Unfortunately in most cases there are no industry standard options for disabling cookies without completely disabling the functionality and features they add to this site. It is recommended that you leave on all cookies if you are not sure whether you need them or not in case they are used to provide a service that you use.


Disabling Cookies


You can prevent the setting of cookies by adjusting the settings on your browser (see your browser Help for how to do this). Be aware that disabling cookies will affect the functionality of this and many other websites that you visit. Disabling cookies will usually result in also disabling certain functionality and features of the this site. Therefore it is recommended that you do not disable cookies.


The Cookies We Set




  • Account related cookies


    If you create an account with us then we will use cookies for the management of the signup process and general administration. These cookies will usually be deleted when you log out however in some cases they may remain afterwards to remember your site preferences when logged out.




  • Login related cookies


    We use cookies when you are logged in so that we can remember this fact. This prevents you from having to log in every single time you visit a new page. These cookies are typically removed or cleared when you log out to ensure that you can only access restricted features and areas when logged in.




  • Forms related cookies


    When you submit data to through a form such as those found on contact pages or comment forms cookies may be set to remember your user details for future correspondence.




  • Site preferences cookies


    In order to provide you with a great experience on this site we provide the functionality to set your preferences for how this site runs when you use it. In order to remember your preferences we need to set cookies so that this information can be called whenever you interact with a page is affected by your preferences.




Third Party Cookies


In some special cases we also use cookies provided by trusted third parties. The following section details which third party cookies you might encounter through this site.




  • This site uses Google Analytics which is one of the most widespread and trusted analytics solution on the web for helping us to understand how you use the site and ways that we can improve your experience. These cookies may track things such as how long you spend on the site and the pages that you visit so we can continue to produce engaging content.


    For more information on Google Analytics cookies, see the official Google Analytics page.




More Information


Hopefully that has clarified things for you and as was previously mentioned if there is something that you aren't sure whether you need or not it's usually safer to leave cookies enabled in case it does interact with one of the features you use on our site.


However if you are still looking for more information then you can contact us through our contact page

Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT