Remove Access Remove Authentication Remove Computer and Electronics Remove Energy and Utilities
article thumbnail

FERC issues notice of proposed rulemaking to extend reporting requirements for cyberattacks targeting the energy sector

Data Protection Report

DHS’ webinar explained that the hackers obtained access to vendors providing computer services to electric utilities companies. This initial access enabled the hackers to gain entry to power company control systems through a complex series of security compromises lasting quite some time. electrical grids and power plants.

article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

A string of Governmental announcements have increasingly sounded the alarm about the growing cybersecurity threat facing the energy sector. Among other things, these reports have announced that state-sponsored cyber actors have successfully gained access to the control rooms of utilities. Procedural History.

Risk 68
article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

Consumer electronics, business, network appliances, and industrial IoT (IIoT) devices are all driving the exponential growth of IoT systems. Insecure implementations may result in unauthorized access to threat actors and potential data breaches.” To be successful, an attacker must gain access to the 5G Service Based Architecture.

Risk 136