Protecting our critical water utility infrastructure from attack

Smart Energy | January 27, 2020

Protecting our critical water utility infrastructure from attack
It is not just electric utilities that need to be cyber aware. Increasingly connected water utilities need to understand the threat landscape too. As a high-growth, increasingly connected industry, the energy, gas and water utilities market faces a problem of growing vulnerability to cyberattacks. Because of the critical role of water and power infrastructure in our society, in addition to their increasing reliance on connected systems, they are an especially appealing target for multiple attack vectors such as insider, outsider and supply chain attackers.

Spotlight

The “Internet of Things” (IoT) links intelligent machines, sensors and analytics online to form a productivity-enhancing revolution. By 2020, Gartner says it will connect 26 billion devices (excluding PCs, smartphones and tablets).The IoT is already under attack, and the following four scenarios highlight the security challenge.

Related News

HYPER-CONVERGED INFRASTRUCTURE

Vuzix Announces Agreement with Verizon to Deliver Augmented Reality with 5G and Mobile Edge Compute

Vuzix | December 28, 2021

Vuzix® Corporation a leading supplier of Smart Glasses and Augmented Reality (AR) technology and products, today announced that the Company has entered into an agreement with Verizon to leverage the power of Verizon's 5G and edge computing technologies to deliver a first-of-its-kind augmented reality experience for sports and gaming. The agreement between Vuzix and Verizon will focus on the technology advancement and commercialization aspects of delivering immersive augmented reality training experiences powered by Verizon's 5G Ultra Wideband service and edge compute platform and Vuzix Shield™ smart glasses, a CES® 2022 Innovation Awards Honoree. This agreement between Vuzix and Verizon will leverage a proof-of-concept program that was completed earlier this year, which demonstrated the power of Verizon's 5G and edge computing platform to run applications at the edge of the network using Vuzix smart glasses to deliver improved response time, longer battery life and increased computing capacity. "By leveraging Verizon's 5G Edge and ultra-light weight AR smart glasses from Vuzix, we are delivering immersive technology in the field of sports training and fan experience," Brian Mecum, Vice President of Device Technology at Verizon "5G and edge compute are important elements to ultimately deliver low latency and optimal performance of powerful smart glasses-based applications. We're excited to further our relationship with Verizon to leverage Verizon's 5G Ultra Wideband network and our award winning Vuzix Shield smart glasses to deliver new cutting-edge augmented reality experiences to sports and games," said Paul Travers, President and Chief Executive Officer at Vuzix. About Vuzix Corporation Vuzix is a leading supplier of Smart Glasses and Augmented Reality (AR) technologies and products for the consumer and enterprise markets. The Company's products include personal display and wearable computing devices that offer users a portable high-quality viewing experience, provide solutions for mobility, wearable displays and augmented reality. Vuzix holds 243 patents and patents pending and numerous IP licenses in the Video Eyewear field. The Company has won Consumer Electronics Show (or CES) awards for innovation for the years 2005 to 2021 and several wireless technology innovation awards among others.

Read More

Reeling from Ransomware Attack, eHealth Saskatchewan Says Restructuring IT Infrastructure

eHealth Saskatchewan | June 12, 2020

Five months after a ransomware attack locked the computer systems storing eHealth Saskatchewan says it’s going to take a while to restructure its IT infrastructure. It wasn’t long after the agency’s IT team discovered files from some of its servers had been sent to suspicious IP addresses. Additional steps taken to protect its computer systems better since the initial attack include updating password protocols, updated protection software. Five months after a ransomware attack locked the computer systems storing confidential medical data of Saskatchewan residents, eHealth Saskatchewan says it’s going to take a while to restructure its IT infrastructure, and that it’s still unsure who stole the data or where it is. The health agency’s chief executive officer Jim Hornell confirmed in February that the virus first entered the eHealth system on December 20, 2019. Employees didn’t discover there was a problem until they tried to open files on Jan. 6 and were asked to hand over bitcoin in exchange for the encrypted data. As we outlined publicly in early February, eHealth discovered some files were sent to IP addresses outside of eHealth’s environment. Those files were encrypted and password protected by the attacker. This makes it difficult to determine the exact content of those files,” wrote Ian Hanna, director of communications for eHealth Saskatchewan in an email to IT Word. “Longer-term work on re-organizing and restructuring eHealth’s IT architecture will continue for several more months. Read more: COMPARING SIX LEADING CONVERGED INFRASTRUCTURE VENDORS' PRODUCT eHealth Saskatchewan in an email to IT Word. “Longer-term work on re-organizing and restructuring eHealth’s IT architecture will continue for several more months. ~ Ian Hanna, director communications eHealth Saskatchewan Law enforcement and privacy officials have been kept up-to-date on the forensic investigation, wrote Hanna. He also confirmed that eHealth had hired outside help to determine if any files were illegally sold. As of now, no trace of such activity has been found. The agency’s website says, should it be determined that personal health information has left the organization, the public will be advised. Additional steps taken to protect its computer systems better since the initial attack include updating password protocols, updated protection software the introduction of multi-factor authentication for crucial systems, added Hanna. There was a total lack of visibility of the health agency’s computer network, according to David Masson, director of enterprise security at Darktrace. Unfortunately, it’s a common problem with many companies, he said. It’s too late to really do much once you discover there’s a problem because by then, the damage is done, One of the other disturbing details of the attack against eHealth Saskatchewan. With eHealth, there was never any ransom paid, but we’ve seen that the data has left [the data centre] and turned up in various other places,” said Masson. When it comes to action items on the part of residents whose data might be compromised, Masson suggested additional vigilance. Be wary of strange emails, text messages and phone calls. And it doesn’t hurt to check bank statements every once in a while, he added. One of the other disturbing details of the attack against eHealth Saskatchewan is how files from some of its servers had been sent to suspicious IP addresses, he indicated. This could reflect a more sophisticated ransomware attack akin to the one that crushed an agricultural services company earlier in June. In that case, a website called “Happy Blog” run by threat group dubbed REvil auctioned off data it says was stolen from a London, Ont., company that offers crop advisory and protection services. The auction notice said the data available included accounting documents and customer accounts for the last three months. Read more: HELIX TECHNOLOGIES BREAKS GROUND IN DATA ANALYTICS FOR CANNABIS PRODUCTION, UNVEILS BI TOOL

Read More

Kasten Introduces New Kubernetes Data Management Capabilities to Scale Cross-Border Hybrid Cloud Deployments

Cision PR Newswire | August 18, 2020

Kasten, the market leader for Kubernetes Data Management, today unveiled new automation and infrastructure portability capabilities for its flagship solution, the K10 Enterprise Data Management platform at KubeCon and CloudNativeCon Europe 2020. Purpose-built for Kubernetes, K10 provides enterprise operations teams with easy-to-use, scalable, and secure Kubernetes backup and restore, disaster recovery, and application mobility. The new capabilities will help organizations scale their cloud native infrastructure and Kubernetes applications in order to support global business growth and ensure compliance with regional data sovereignty laws, including GDPR.

Read More

Spotlight

The “Internet of Things” (IoT) links intelligent machines, sensors and analytics online to form a productivity-enhancing revolution. By 2020, Gartner says it will connect 26 billion devices (excluding PCs, smartphones and tablets).The IoT is already under attack, and the following four scenarios highlight the security challenge.