Skip to main content

Why Public Utilities Invest in Cybersecurity Solutions

Upgrading electrical grids and water infrastructure around the world with new capabilities -- such as network communications, remote and automated management of elements in the field, and new utility management functionalities -- continues to gain momentum.

However, smart infrastructure demand means increased dependence on new technology and communications connectivity, which greatly introduces IT security risks.

Smart Utility Market Development

The new infrastructure can expand the number of threat vectors, rendering smart utilities vulnerable to cyber attacks. Maintaining resilient electrical power generation and transmission -- as well as water distribution and treatment -- are key to protecting the public utility environment.

Therefore, effective cybersecurity must be a function of hardware, software, data, and networks.

The modernization of utility infrastructures is enabling increased efficiencies and reliability through digitization, connectivity, and IT-based approaches. Smart cyber assets are transforming public utilities, allowing them to deploy and leverage a new generation of functionality and customer services.

However, smart utilities are also highly vulnerable to cyber threats, and IT security is a primary concern, according to the latest worldwide market study by ABI Research.

Digital security is often unimplemented during utility modernization due to cost, resource, and time constraints. This is exasperated by issues with adapting cybersecurity to OT environments and an overall lack of knowledge and expertise in bridging these divides.

Furthermore, public sector efforts have declined since 2012-2013, when both the United States and European Union markets were actively driving national cybersecurity strategies.

The current U.S. government dropped cybersecurity from its list of priorities, and the European Commission is struggling to get its NIS Directive deployed and obtain the funding for ENISA to fulfill its mandate.

"It seems that the United States and the European Union have forgotten that cybersecurity needs to be a continuous effort, not a one-time announcement to tick all the boxes,” said Michela Menting, research director at ABI Research.

Both electric power and water utilities have reported advanced persistent threats which exploit flaws in industrial control systems. More critically, the typical cyber threats -- such as ransomware and DDoS attacks -- are increasingly affecting utility infrastructure cyber-assets, both on the back and front-end.

While power and water infrastructure stakeholders will spend over $8 billion globally on cyber-securing utility infrastructures in 2018, only a small portion of that will be dedicated to operational technologies and smart systems.

Outlook for Smart Utilities Investment

Grid modernization efforts are an ideal time to start designing and integrating digital security and provide an opportunity for adapting existing mechanisms and processes -- from industrial control systems to smart meters.

"Utility organizations should remain firm in their commitment to cybersecurity, despite the backseat public support. Fortunately, from a private sector perspective, a growing vendor ecosystem is emerging to hopefully address these key issues," Menting concludes.

Popular posts from this blog

Securing the Future of Cellular IoT Apps

The Internet of Things (IoT) continues to expand. According to the latest worldwide market study by Juniper Research, they forecast a 90 percent growth in cellular IoT devices by 2028, with the global number reaching 6.5 billion. This exponential rise presents both exciting opportunities and significant challenges. While the growth of cellular IoT unlocks a vast potential for innovation in smart cities, industrial automation, and remote monitoring, it also requires device management and security advancements. Cellular IoT Market Development Juniper's research highlights the critical role of intelligent infrastructure management solutions. These platforms will empower the users to automate critical tasks such as device configuration, real-time security management, and optimized wireless connectivity. The surge in cellular data usage, projected to reach 46 petabytes by 2028 compared to 21 petabytes today, further underscores the need for automation. This is where federated learning i