Tripwire Inc., a provider of advanced threat, security and compliance solutions, found that 82 percent of the respondents said a cyber attack on the operational technology in their organization could cause physical damage.
However, when asked if their organization has the ability to accurately track all the threats targeting their OT networks, 65 percent replied, “no.”
According to the results of a study conducted for Tripwire by Dimensional Research on the cybersecurity challenges faced by organizations in the energy sector:
· More than three out of four respondents (76 percent) believe their organizations are targets for cyber attacks that could cause physical damage.
· 78 percent of respondents said their organizations are potential targets for nation-state cyber attacks.
· 100 percent of energy executive respondents believe a kinetic cyber attack on operational technology would cause physical damage.
The study was carried out in November 2015, and respondents included over 150 IT professionals in the energy, utilities, and oil and gas industries.
“The incredibly high percentages of these responses underscores the need for these industries to take material steps to improve cyber security,” said Tim Erlin, director of IT security and risk strategy for Tripwire. “These threats are not going away. They are getting worse.”
According to the Department of Homeland Security, the energy sector faces more cyber attacks than any other industry, and attacks on industrial control system networks are on the rise. If successful, these energy sector cyber attacks could have a dramatic physical impact. In December 2015, BlackEnergy malware was used in an attack against a power plant in the Ukraine and left over 700,000 customers without electricity.
Erlin continued: “We’ve already seen the reality of these responses in the Ukraine mere months after this survey was completed. There can be no doubt that there is a physical safety risk from cyber attacks targeting the energy industry today. While the situation may seem dire, in many cases there are well understood best practices that can be deployed to materially reduce the risk of successful cyber attacks.”