Cybersecurity in the Utilities industry
From switching the light on, to pouring the water for a cup of tea, we all take for granted and rely on the essential utility services that we use every day. As we go about our business, we rarely stop to think about the fact that these utilities are under constant threat from cyber-attacks. In extreme cases, major outages could quickly escalate way beyond inconvenience to a breakdown of society. Popular fiction, such as the international bestseller Blackout, describe in scary detail the lightening quick breakdown of society in such as circumstance, as the lights and power go out and drinking water becomes scarce.
In a survey of 1,700 utility companies last year, 56 percent said they experienced at least one shutdown or operational data loss in the past 12 months. In addition, only 42 percent of the survey respondents rated their cyber readiness as high, and only 31 percent were fully ready to respond.
In the past, the complex and isolated nature of utility infrastructure had protected organisations from these cyber-attack. Operational infrastructure wasn’t connected directly to centralised IT systems or the internet. However, there has been a natural progression to bring the infrastructure into the 21st century with the use of automation and the Internet of Things to secure efficiencies. This has integrated IT infrastructure with operational technology, and as an unhappy consequence, opened up the networks to the cyber threat.
The reasons for these attacks are wide-ranging from anarchy and terrorism to criminality for commercial gain but all have the ability to bring societies to a stand-still. Some of the worst attacks were recently reported in Power Technology. They include hackers targeting safety systems, cutting power to cities and even stealing and publishing plans for nuclear power reactors.
But utility companies are fighting back. In a global survey, by management and technology consultancy Accenture, they found investment in security innovation was growing in utility companies. They also reported a 27% reduction in the average number of security breaches over the past year. But this battle is still an ongoing struggle with 73% agreeing staying ahead of the attackers was difficult and the costs unsustainable.
So, what practical steps are utility companies taking to secure their environments? Cyber security has to be considered at every level from intrusion attacks at the network perimeter, to monitoring of operation infrastructure and authentication access, right through to protection of the mobile devices the workforce uses.
It’s in the area of secure mobile devices that Panasonic, with its rugged TOUGHBOOK computing, tablet and handheld devices, is leading the way in the utilities sector. For example, the TOUGHBOOK 55 notebook is one of the world’s first Secured-core PCs developed with Microsoft and is currently being rolled out to the mobile workforce of one of the UK’s largest water utility companies.
As well as being built to withstand the everyday challenges of the utility worker, the TOUGHBOOK 55 is one of the most secure mobile computing devices on the planet. Designed with deep integration between hardware and software and featuring the most advanced CPUs available, Secured-core PCs are intended to handle mission-critical data in the most data-sensitive industries, such as utilities.
A Secured-core PC is a modern Windows device that comes with the highest level of hardware, software and identity protection ready right out-of-the-box. It enables users to boot securely, protect their device from firmware vulnerabilities, shield the operating system from attacks and prevent unauthorised access to devices and data with advanced access controls and authentication systems.
In addition, Panasonic ProServices offers custom engineering support for utilities companies for additional security. In a recent example, the team designed a custom BIOS for one organisation that disabled the Wi-Fi and Bluetooth functionality of its devices. This meant that the only way the device could interact with the network was physically via a LAN cable, limiting opportunities for cyber intrusions.
It's through these types of initiative, protecting the mobile workforce as well as the offices, data centres and operational infrastructure, that security is being addressed to combat the ever increasing ingenuity of the cyber attackers.
Read more insights…
blog
Panasonic TOUGHBOOK at BAPCO 2024 – Key Learnings
As a leading provider of rugged computing and communication solutions for the emergency services sector, BAPCO’s annual event in Coventry was the only place to be for Panasonic TOUGHBOOK in March, giving it direct access to the full spectrum of blue light decision makers.
blog
Panasonic’s latest TOUGHBOOK G2 and 33 tablets push the boundaries of rugged computing
Panasonic’s new TOUGHBOOK G2mk2 and 33mk3 provide the modern mobile worker with a perfectly balanced solution, regardless of the task, application or environment.
Case Study
Panasonic TOUGHBOOK indispensable for Circet field service engineers
Circet is the European market leader in building and maintaining the vital telecom fiber optic networks. In the energy world, they focus on smart energy, such as charging stations for electric vehicles and digital electricity meters in office and residential buildings. Circet Benelux is an installation company for all major players in the market. Especially in the smart energy business unit, the company makes widespread use of Panasonic's TOUGHBOOK notebooks and tablets.
blog
Celebrating the Women of Panasonic Connect Europe
International Women’s Day provides us all with an opportunity to celebrate the key women in each of our lives, and how they positively impact society, whether it’s in one company, a department, an industry or the wider world. At Panasonic Connect Europe, we’ve spoken to five fantastic females on what it means to be working at the forefront of innovation and technology.
Sorry there was an error...
The files you selected could not be downloaded as they do not exist.
You selected items.
Continue to select additional items or download selected items together as a zip file.
You selected 1 item.
Continue to select additional items or download the selected item directly.
Share page
Share this link via:
Twitter
LinkedIn
Xing
Facebook
Or copy link: