Hackers can shut down critical energy systems via the internet

Everyone knows that energy and water are two of the most central critical infrastructures. Both sectors have seen many improvements necessary to keep the peace with the latest technology. This kind of improvements is needed for better harness and distribution of the resources.
Looking at this latest technology that uses Human Interface Systems (HMI), which are found in thousands of utilities worldwide, researchers say that they are vulnerable and can be exploited.

They further highlight the variety of challenges that industrial control system organizations are facing today.
The challenges of protecting ICS are real because attacks targeting critical infrastructure are on the rise and the use of better cybersecurity solutions will defiantly have a major impact on the uptime of the critical systems in a time of needs.

Remember everything can be hacked. In order to stay away from any threats related to the cyber world, we recommend the install of antivirus for Windows or antivirus for Mac on every device that you own, depending on which OS your device is running. If you are a company, it is also recommended to hire every year a specialized cybersecurity company that will run annual tests on your company’s network. These tests include penetration testing and ethical hacking tests;

Experts say that Human Interface Systems (HMI), in particular, represent a key risk as they help human operators interact with control or SCADA systems and as a result can give cybercriminals access to the network.
In the case of an attack, the starting point probably will be an operator from the water utility that will open a browser and clicking on an advertising link causing a malware download to an HMI device. Hackers continue to successfully exploit the human element to gain access to networks all over the world.

Researchers conclude that every company should give a high priority to re-assessing their cybersecurity programs, evaluate where they are in relation to government recommendations, and inform themselves about current technologies available for protection.

We would continue to monitor this cybersecurity problem. Meanwhile, users should keep a keen eye out for any cyber attacks. Remember to use an antivirus for Windows or antivirus for Mac in every device that you own, depending on which OS your machine is running, If you are a company we recommend to hire every year a specialized cybersecurity company that will run annual tests on your company’s network, tests like this include: penetration testing and ethical hacking.