So far, 2021 has seen some serious cyberattacks – with significant consequences. First there was the massive SolarWinds attack. Soon after, the Florida Municipal Water supply was attacked, with hackers tampering with the internal controls and attempting to poison the water supply in the city of Oldsmar with massive amounts of lye. “It was a wake-up call,” Pinellas County Sheriff Bob Gualtieri said. “Water systems, like other public utility systems, are part of the nation’s critical infrastructure and can be vulnerable targets when someone desires to adversely affect public safety.”
There are lessons from this water breach for the electric sector and other utilities. According to Utility Dive, there are similarities between electric and water utilities – including shared vulnerabilities, like software that allowed hackers to access the water plant’s supervisory control and data acquisition systems.
Local Florida media reported that, according to Sheriff Gualtieri, “a hacker (or hackers) gained remote access to a plant operator’s computer Friday, February 5 and within a few minutes had increased the levels of sodium hydroxide dramatically from about 100 parts per million to 1,100 parts per million.” In addition, the plant’s computers shared passwords and ran outdated operating systems, according to a Massachusetts government warning to water companies, a warning that should be heeded by everyone in the utility industry.
According to Frank Cilluffo, director of the Auburn University Center for Cyber and Homeland Security, it’s a “physical-cyber convergence.” And it’s something that should have everyone worried.
We’ve been hacked in major ways, so how can companies become more cyber secure? How will actions taken in Washington – driven by these latest infractions – impact people on the ground who make decisions about what to do at their companies? In other words: How can companies protect themselves? And how might federal policies support or hinder those efforts?
One thing is clear. A total rethink of cybersecurity is needed. SiliconAngle reports that “top security pros say the SolarWinds hack and the COVID-19 pandemic have accelerated a change in their cybersecurity spending patterns.” The challenges are steep. Chief information security officers must secure an increasingly dispersed workforce. They also need to be mindful and wary of software code – even code coming from reputable vendors and the very patches that are designed to protect against cyberattacks. Businesses and organizations are developing what is being called “zero-trust” approaches that include better identity access management and improved endpoint protection and cloud security.
What can the Biden Administration do in its first 100 days to support these cyber security efforts? The Washington Post’s Tonya Riley highlights six priorities in “Here's what cybersecurity experts think Biden should prioritize in his first 100 days,” based on responses to a survey administered to top cyber security experts. The bottom line is that “if the President takes cybersecurity seriously then others will take it seriously,” said Jeff Moss, founder of the DEF CON cybersecurity conference.
Here are the six priorities, as reported by Riley in The Washington Post:
Partnerships with the private sector could take center stage: “Improving cybersecurity also means strengthening relationships and the private sector and building partnerships in the tech industry, which is on the front line of fighting this battle every minute of every day,” said Jay Kaplan, co-founder of Synack. “Ethical hackers and researchers inside cybersecurity firms, cloud providers or online retailers understand what it takes to defend against the threat and can help build better cyber defenses.” The surveyed experts called for joint efforts to tackle growing ransomware attacks.
Appearing before a Senate committee on February 23, Brad Smith, president of Microsoft, said its researchers believed “at least 1,000 very skilled, very capable engineers” worked on the SolarWinds hack. “This is the largest and most sophisticated sort of operation that we have seen,” Smith told senators.
We will all need to work together to stop future cyberattacks. The challenge of reskilling – on an individual level, on a corporate level, on a national level, and on an international level – is front of mind. This might be a silver lining of the pandemic. We are all taking a critical look at our use of technology and where and how we do our jobs to evaluate what is working, what needs to be reformed, and how we can better protect ourselves. When we work together, our shared vulnerabilities – whether they be due to the pandemic or due to cybersecurity attacks – can only make us stronger.
In a word, Yes. And we’ve got training on several issues that were exploited in the SolarWinds and recent Florida water supply attacks including:
If you have the unfortunate incident and you do get hacked, we even have forensics training that will help you analyze your system and understand at a deep level, what went wrong, and how to protect yourself against future attacks.
It’s all here. You just have to use the tools. If you think training is expensive or time consuming, consider the alternative. Contact us now – and you might be part of the group that says – we missed that one. We’re fortunate that our training was up-to-date, that our staff and systems were ready. Situation normal, we’re open for business.
Don’t let it happen to you. Contact us.