Our world is digitized, networked, and connected. With energy transition and digitization new (remote) technologies, connections and opportunities come. With these technologies, the risk for a cyber-attack increases significantly. And this is not (only) a matter for the Information Technologies (IT) department anymore, our hyper-connected world now allows for sophisticated attacks to be launched on your Electrical Infrastructure affecting its safety and reliability.
Business owners, facilities managers and electrical consultants often are unaware of the cybersecurity risks affecting electrical infrastructures, like electrical distribution systems, building energy management systems, fire detection systems, HVAC systems, and emergency lighting systems. Resilience against cyberattacks in these so called electrical Operational Technologies (OT) is critical.
As organizations expand their digital footprint, it becomes imperative to protect the security, safety & reliability, availability and integrity of their systems. Cybersecurity threats must be taken seriously and met proactively with a system-wide defensive approach aligned to the organizational needs. It is of utmost importance to understand that every component that you introduce into your infrastructure could be an entry point for an attacker into your Electrical Infrastructure making you vulnerable to a cyber attack. With the appropriate security measures, and the right supply chain strategy you can ensure the resilience of your Infrastructure.
Discover how Eaton can help you secure your business continuity.
We're dedicated to establishing cyber-secure processes and innovating technologies that make trusted connections work.
There are several objectives a hacker can have for attacking your business. There are hackers who spy into your business and could potentially have access to, or steal, sensitive data. Data - whether this is personal data or business data - is valuable and hackers can gain money by selling data to third parties. In most cases OT systems allow an easy entry point to the attackers from your OT infrastructure, they are able to hack into the IT infrastructure as a next step. There are examples of attackers that stole credentials and gained remote access to companies network that enabled them to install malware in the IT systems and siphon data. But it is not only data that gain a cyber criminals interest. When it comes to Operation Technology a breach in the cybersecurity chain gives hackers the possibility to create fear and chaos by taking over control of your OT systems. Such a breach results in the compromise of safety and reliability of your Infrastructure.
An effective cybersecurity strategy for facility operational technology requires a comprehensive strategy that covers People, Process and Technology.
People
People are the weakest link in the chain when it comes to Security. Skilled attackers abuse the element of trust and make way into the systems via Social Engineering. Be aware of social engineers - hackers that enter your business through human interactions (e.g. with your employees) . Defending your organisation by training your people, vendors and internal stakeholders becomes the first line of defense. Ensure that you select trustworthy suppliers who understand the importance of Cybersecurity and have a robust Cybersecurity program.
Process
Ensure your processes consider Cybersecurity health of all the components in your Infrastructure and have defined roles, responsibilities. Ensure you have a robust Vulnerability management plan, Incident response plan and a dependable disaster recovery plan.
Technology
Select products, systems and solutions that are designed with cybersecurity in mind and meet industry standards through its full lifecycle and are regurlarlyassessed for potential vulnerabilities and are patched the discovered Security loopholes on a regular basis. Its also imperative that your facility OT network and assets are periodically assessed for Cybersecurity.
Unfortunately there is no common global standard for cybersecurity and therefore for every product development one has to decide what standards are relevant for this particular development. This increases the difficulty to manage system security. Read why Eaton advocates for one global standard.