When you’re trying to decide how you’re going to do remote connectivity, you have to take into consideration security, not just convenience,” says Scott Christensen, GrayMatter’s Cyber Practice Director.
“You always need to be asking, ‘Are we doing this in a way that’s risk averse?'”
Authorities say plant operators in Oldsmar, Fla., immediately noticed the cyber attack when a cursor unexpectedly started to move across a computer screen and increased the amount of lye the system adds to treat drinking water from 100 parts per million to 11,100 parts per million.
An operator who noticed the increase, and saw bizarre activity earlier in the day, prevented plant systems from making the increase.
Officials told Wired that they have uninstalled TeamViewer, a popular remote-access software that allows remote desktop viewing and control. Oldsmar is in Pinellas County, the most densely populated county in Florida and part of the Tampa-St. Petersburg-Clearwater metro area, which just hosted Super Bowl LV.
Christensen said that many times, utilities with limited resources and staffing rely on the default settings of remote-access software, which often does not offer the proper level of security.
“We try to minimize risk but still allow for day-to-day operations, and we do that by ensuring clients have encrypted communications, so both ends of a connection are secured and authenticated so someone can’t take advantage as they did in this case,” Christensen said.
“Another method is through deception technology, which could have diverted this attack to a fake device where no harm can occur,” he said. “That way, you don’t have to hope someone is paying attention to the screen at the very moment a hacker tries to add a dangerous amount of lye to the water.”
This includes who has access, what systems they can access and the methods used to connect.
OT cyber professionals often lament the loss of the “air gap,” the technique of keeping your OT network physically disconnected from other networks. This became impractical with most modernization efforts and can be used against users as it provides a loss of visibility.
By using tools and technologies that focus on hardening and defining the barrier and by implementing compensating controls at the perimeter you can achieve a similar risk level without loss of the efficiencies of modernization. This can include tools such as encryption, segmentation, deception and authentication.
Many times an objective third party can help you evaluate where the gaps in your security program exist and what options exist to close that gap. Finding a partner who can perform a comprehensive review of your OT infrastructure is important.
Schedule a one-on-one, customized cyber briefing to get started.Get Started
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
|cookielawinfo-checbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.