Cybersecurity in the Utilities industry
From switching the light on, to pouring the water for a cup of tea, we all take for granted and rely on the essential utility services that we use every day. As we go about our business, we rarely stop to think about the fact that these utilities are under constant threat from cyber-attacks. In extreme cases, major outages could quickly escalate way beyond inconvenience to a breakdown of society. Popular fiction, such as the international bestseller Blackout, describe in scary detail the lightening quick breakdown of society in such as circumstance, as the lights and power go out and drinking water becomes scarce.
In a survey of 1,700 utility companies last year, 56 percent said they experienced at least one shutdown or operational data loss in the past 12 months. In addition, only 42 percent of the survey respondents rated their cyber readiness as high, and only 31 percent were fully ready to respond.
In the past, the complex and isolated nature of utility infrastructure had protected organisations from these cyber-attack. Operational infrastructure wasn’t connected directly to centralised IT systems or the internet. However, there has been a natural progression to bring the infrastructure into the 21st century with the use of automation and the Internet of Things to secure efficiencies. This has integrated IT infrastructure with operational technology, and as an unhappy consequence, opened up the networks to the cyber threat.
The reasons for these attacks are wide-ranging from anarchy and terrorism to criminality for commercial gain but all have the ability to bring societies to a stand-still. Some of the worst attacks were recently reported in Power Technology. They include hackers targeting safety systems, cutting power to cities and even stealing and publishing plans for nuclear power reactors.
But utility companies are fighting back. In a global survey, by management and technology consultancy Accenture, they found investment in security innovation was growing in utility companies. They also reported a 27% reduction in the average number of security breaches over the past year. But this battle is still an ongoing struggle with 73% agreeing staying ahead of the attackers was difficult and the costs unsustainable.
So, what practical steps are utility companies taking to secure their environments? Cyber security has to be considered at every level from intrusion attacks at the network perimeter, to monitoring of operation infrastructure and authentication access, right through to protection of the mobile devices the workforce uses.
It’s in the area of secure mobile devices that Panasonic, with its rugged TOUGHBOOK computing, tablet and handheld devices, is leading the way in the utilities sector. For example, the TOUGHBOOK 55 notebook is one of the world’s first Secured-core PCs developed with Microsoft and is currently being rolled out to the mobile workforce of one of the UK’s largest water utility companies.
As well as being built to withstand the everyday challenges of the utility worker, the TOUGHBOOK 55 is one of the most secure mobile computing devices on the planet. Designed with deep integration between hardware and software and featuring the most advanced CPUs available, Secured-core PCs are intended to handle mission-critical data in the most data-sensitive industries, such as utilities.
A Secured-core PC is a modern Windows device that comes with the highest level of hardware, software and identity protection ready right out-of-the-box. It enables users to boot securely, protect their device from firmware vulnerabilities, shield the operating system from attacks and prevent unauthorised access to devices and data with advanced access controls and authentication systems.
In addition, Panasonic ProServices offers custom engineering support for utilities companies for additional security. In a recent example, the team designed a custom BIOS for one organisation that disabled the Wi-Fi and Bluetooth functionality of its devices. This meant that the only way the device could interact with the network was physically via a LAN cable, limiting opportunities for cyber intrusions.
It's through these types of initiative, protecting the mobile workforce as well as the offices, data centres and operational infrastructure, that security is being addressed to combat the ever increasing ingenuity of the cyber attackers.
Read more insights…
article
PANASONIC TOUGHBOOK PIVOTAL TO TURNER TWINS’ ELECTRIC PARAMOTOR WORLD RECORD ATTEMPT
Professional adventurers Hugo and Ross Turner are relying on TOUGHBOOK rugged devices during their historic world altitude record attempt for a tandem electric paramotor in the French Alps.
article
REALISE WHAT’S POSSIBLE WITH PANASONIC TOUGHBOOK AT THE EMERGENCY SERVICES SHOW 2024
Panasonic’s customisable rugged TOUGHBOOK solutions, including the latest 33 and G2 devices, will be demonstrated at the UK’s premier emergency services event.
blog
5G networks now – opportunities, challenges, and hopes for the future
The emergence of 5G technology has been a hot topic in the tech world for the past five years. With promises of faster download speeds, better connectivity, and the potential to revolutionise our industries, it offers clear benefits to businesses. Chris Turner took the opportunity to speak to James Weaver from Cradlepoint, a division of Ericsson, about 5G networks today, the challenges with adoption, and its potential going forward.
blog
Visionaries at Work: How Strategic Thinkers are Shaping Tomorrow's Tech
In the heart of a repurposed Japanese TV studio, two forward-thinkers from different corners of the globe come together to mould the future of technology at Panasonic TOUGHBOOK. Tucked away in an old Japanese television studio converted into technology labs, an Englishman and an American are paid to think about the future. Responsible for Strategic Foresight at rugged device manufacturer Panasonic TOUGHBOOK, they are at first glance an unlikely pairing.
Sorry there was an error...
The files you selected could not be downloaded as they do not exist.
You selected items.
Continue to select additional items or download selected items together as a zip file.
You selected 1 item.
Continue to select additional items or download the selected item directly.
Share page
Share this link via:
Twitter
LinkedIn
Xing
Facebook
Or copy link: