Standard content for Members only

To continue reading this article, please login to your Utility Week account, Start 14 day trial or Become a member.

If your organisation already has a corporate membership and you haven’t activated it simply follow the register link below. Check here.

Become a member

Start 14 day trial

Login Register

Topic: National infrastructure security

Utilities provide services that are essential to everyday life. Without electricity, gas and water, things would quickly grind to a halt.

For a number of unscrupulous characters – in the UK and around the globe – utilities are seen as a target. These individuals and groups have a range of motives, from terrorism to extortion. To achieve their ends, they will attack the assets that utilities own and operate, both physically and, increasingly, digitally as the Internet of Things and the smart revolution grows and takes hold.

In response, utility companies must protect their assets – and protect the country’s national infrastructure. If these defences are breached, it could be disastrous. It would hit customers, who could be cut off from supply or face more dangerous scenarios, and it would hit the companies. They would face significant penalties and repercussions from regulators and the government, as well as from their customers who could demand compensation and move (where possible) to another supplier.

There has been a spate of attacks recently on the digital infrastructure of modern businesses (see box, facing page), be they retailers, utilities or anyone else. They highlight the ongoing arms race between companies and the hackers as the fight for control goes on.

Utilities’ ability keep the hackers at arm’s length depends upon adhering strictly to security protocols. These include the mundane, such as monitoring USB stick use and the opening of emails; and the high end, such as developing strong firewalls and anti-virus systems.

Failure to do these will give the cybercriminals an advantage. Complacency is one of the biggest weapons in the criminal’s armoury.

To download a pdf of full article as if appeared in Utility Week, click here