article thumbnail

EPA Issues Urgent Alert for Water Utilities to Enhance Cyber Defenses

SecureWorld News

In a new Enforcement Alert , the agency is calling on water utilities to immediately enhance their digital defenses to protect public health and safety. It cites cyber incidents such as the 2021 Oldsmar water treatment facility hack as examples of real-world risks.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumers and organizations are enthused about the operational benefits of more robust mobile connectivity, but the shift to 5G networks doesn’t come without risks. Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout.

Risk 136
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Colonial Pipeline attack spotlights risks of geographically dispersed networks in an industry that is ‘far behind’

SC Magazine

demonstrating the unique cybersecurity risks and vulnerabilities associated with geographically distributed networks. ” “These are very large networks covering extensive distances but they are typically ‘flat’ from a network segmentation standpoint,” Cusimano added. Fortress Information Security.

Risk 105
article thumbnail

How Cybersecurity Delays Critical Infrastructure Modernization

Security Boulevard

Cybersecurity concerns relating to the protection of data are having a significant impact on the modernization (or lack thereof) of critical and public utility infrastructure, with many utility companies failing to adopt new tools and technology available to them.

article thumbnail

NIS2

Centraleyes

To enhance Europe’s resilience against existing and emerging cyber threats, the NIS2 Directive introduces new requirements and obligations for organizations in four key areas: risk management, corporate accountability, reporting obligations, and business continuity. Initiate these steps promptly to mitigate the risk of delays.

article thumbnail

Securing the Edge Ecosystem Global Research released – Complimentary report available

CyberSecurity Insiders

Collaboration approaches to connecting and securing the edge ecosystem. Perceived risk and benefit of the common use cases in each industry surveyed. The results focus on common edge use cases in seven vertical industries – healthcare, retail, finance, manufacturing, energy and utilities, transportation, and U.S.

article thumbnail

Adoption of Secure Cloud Services in Critical Infrastructure

CyberSecurity Insiders

In an example from last year, lack of risk-based adoption of cloud software and lack of controls to prevent access to ICS networks caused service disruption at a US drinking water treatment facility, where cyber-attack via poorly controlled cloud software (desktop sharing) had increased sodium hydroxide levels in drinking water [v].

IoT 134