{"id":3170,"date":"2022-02-28T15:24:06","date_gmt":"2022-02-28T15:24:06","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3170"},"modified":"2022-09-12T14:47:44","modified_gmt":"2022-09-12T14:47:44","slug":"how-electricity-organizations-can-minimize-the-possibility-of-a-hack","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/","title":{"rendered":"How Electricity Organizations Can Minimize the Possibility of a Hack"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p>The <a href=\"https:\/\/itegriti.com\/kw022024\/2021\/cybersecurity\/supply-chain-risk-management-in-electric-grid-utilities\/\" target=\"_blank\" rel=\"noopener\">SolarWinds hack<\/a> testifies to the rising sophistication of digital threats confronting the North American electric grid. The incident began when malicious actors infiltrated a software update distribution channel used by the IT network management solutions provider for one of its products. The attackers then pushed out a malicious update along that compromised distribution channel to approximately 18,000 of the product\u2019s users. A quarter of electric utilities on the North American power grid were among them, noted <a href=\"https:\/\/www.voanews.com\/a\/usa_us-trying-insulate-electrical-grid-cyberattacks\/6204844.html\" target=\"_blank\" rel=\"noopener\">VOA News<\/a>.<\/p>\n<p>Once installed on a machine, the malware contacted to its command and control (C&amp;C) server, allowing the campaign\u2019s operators to hack their victims\u2019 networks and perform follow-up attacks like installing additional malware payloads. Of the 18,000 victims affected in the incident, nearly 2,000 domains suffered a Sunburst malware infection. A third of those entities were electric utilities and other industrial organizations.<\/p>\n<p>Law enforcement officials and security experts attributed the attack to Nobelium, a threat group sponsored by Russia. Acknowledging this fact, the SolarWinds supply chain attack builds on a long history of state-sponsored actors targeting electric utilities and causing blackouts along the way. One of the most well-known cases is when state actors believed to be from Russia targeted a Ukrainian substation and shut off power to 225,000 people for several hours, wrote <a href=\"https:\/\/www.rpc.senate.gov\/policy-papers\/infrastructure-cybersecurity-the-us-electric-grid\">Senate RPC<\/a>. In the years that followed, digital actors associated with the Russian government targeted a Saudi Arabian petrochemical company and shut off safety systems as well as penetrated multiple critical infrastructure facilities in the United States.<\/p>\n<h2>Why Is This a Problem?<\/h2>\n<p>Many organizations along with other critical infrastructure sectors depend on electric power for their business, noted the <a href=\"https:\/\/www.cisa.gov\/energy-sector\" target=\"_blank\" rel=\"noopener\">U.S. Cybersecurity &amp; Infrastructure Security Agency<\/a> (CISA). Without it, they might not be able to carry out their business. The ensuing disruption could threaten a host country\u2019s national security and\/or damage the global economy.<\/p>\n<p>This possibility emphasizes the need for electric organizations to try to minimize the likelihood of a hack occurring in the first place. Here are some recommendations for how they can do that.<\/p>\n<h2>Patch Vulnerabilities on a Timely Basis<\/h2>\n<p>When it comes to preying on electric utilities and other organizations, <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/threat-actors-often-choose-the-path-of-least-resistance\/\" target=\"_blank\" rel=\"noopener\">threat actors often choose the path of least resistance<\/a>. One of the ways they do that is by seeking to weaponize unpatched software vulnerabilities. Those weaknesses aren\u2019t always recent discoveries, either. Many organizations don\u2019t have a robust vulnerability management program in place; many security teams aren\u2019t prioritizing and remediating bugs. This leaves organizations susceptible to vulnerabilities that are years if not decades old.<\/p>\n<p>To protect themselves against vulnerability attacks, organizations need to <a href=\"https:\/\/itegriti.com\/kw022024\/2021\/compliance\/6-steps-to-nerc-cip-013-1-compliance-the-ultimate-checklist\/\" target=\"_blank\" rel=\"noopener\">scan their software components for known vulnerabilities and exploits<\/a>. They can make sure they remain aware of new software flaws by signing up to receive alerts and advisories from CISA. They can also proactively search known vulnerabilities databases such as the MITRE <a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\">Common Vulnerabilities and Exposure<\/a> (CVE) notices for relevant bugs.<\/p>\n<h2>Cultivate OT Security Skills Within<\/h2>\n<p>The <a href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/working-with-cni-requires-your-employees-to-be-on-top-of-security\/\" target=\"_blank\" rel=\"noopener\">cybersecurity skills gap remains an ongoing problem<\/a>\u2014especially when it comes to organizations\u2019 OT environments. An increase in responsibilities and network complexity is taxing OT security personnel, elevating burnout levels, and driving professionals from the industry. This is leaving electric utilities and their OT environments vulnerable to attack.<\/p>\n<p>In response, organizations everywhere need to focus on cultivating their OT security skills.<\/p>\n<p>\u201cMore effort will be needed to develop the OT Security skill pool,\u201d explained Applied Risk and Ponemon in a joint study. \u201cThere is a growing demand for professionals with OT Security skills. These do not all need to be OT Security specialists, but OT Security needs to be embedded in the profiles of managers, engineers, operators, procurement specialists, and others. Workforce development will be one of the most important means of achieving this goal.\u201d<\/p>\n<h2>Set up Early Warning Systems<\/h2>\n<p>Every electric utility wants to prevent malicious actors from infiltrating their systems. But regardless of the tools they have in place, they can\u2019t prevent every attack attempt. That\u2019s why they need to have early warning systems in place for automatically detecting anomalies that could be indicative of a security incident and for proactively alerting administrators of suspicious activity. These types of solutions can free infosec personnel from manually investigating threat alerts and wasting their time on false positives, wrote <a href=\"https:\/\/www.powermag.com\/three-things-utility-companies-need-to-do-to-prevent-the-next-cyberattack\/\" target=\"_blank\" rel=\"noopener\">POWER Magazine<\/a>. In doing so, they enable security professionals to focus on more meaningful job duties.<\/p>\n<h2>Mitigate Physical Security Risks<\/h2>\n<p>A computer isn\u2019t the only means through which malicious actors can target electric utilities. Digital attackers can use a lack of appropriate safeguards to physically gain access to substations and other assets for the purpose of tampering with the electric grid. To prevent these types of threats, organizations need to combine physical security measures such as security cameras and fencing with security awareness training programs to deter physical attacks.<\/p>\n<h2>Conduct Risk Assessments<\/h2>\n<p>Electric organizations can\u2019t protect themselves against digital threats if they don\u2019t know the types of risks confronting them. Subsequently, they need to conduct risk assessments on an ongoing basis to evaluate their systems for potential vulnerabilities. They can then use the results of those assessments to drive their security planning and investments going forward.<\/p>\n<h2>Conduct Ethical Hacking Exercises<\/h2>\n<p>Finally, electric utilities need to realize that they can\u2019t always uncover all their systems\u2019 weaknesses on their own. That\u2019s why they might consider staging an ethical hacking engagement. These exercises provide insight into how digital attackers can chain system vulnerabilities together for the purpose of infiltrating victims\u2019 assets.<\/p>\n<h2>How Itegriti Can Help<\/h2>\n<p>Not all organizations can do all the above on their own. Not only that, but they can\u2019t choose when or where they will be attacked. That&#8217;s why they need to be on the top of their security posture 24\/7 and make sure there is a recovery plan set in place for when it happens.<\/p>\n<p>With the help of Itegriti, organizations can get that level of coverage. Itegriti\u2019s teams of <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\">security<\/a> and <a href=\"https:\/\/itegriti.com\/kw022024\/compliance\/\">compliance<\/a> professionals can help organizations to patch their software weaknesses, cultivate their employees\u2019 levels of security awareness, converge their digital and physical security efforts, as well as participate in pentests through managed offerings like vCISO and vCompliance.<\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/managed-services\/\">Learn how Itegriti can help you to prevent a hack at your electric utility<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The SolarWinds supply chain attack testifies to the rising sophistication of digital threats confronting the North American electric grid. The incident began when malicious actors infiltrated a software update distribution channel used by the IT network management solutions provider for one of its products.<\/p>\n","protected":false},"author":12,"featured_media":3176,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2180],"tags":[2188,2193],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Electricity Organizations Can Minimize the Possibility of a Hack<\/title>\n<meta name=\"description\" content=\"The SolarWinds hack testifies to the rising sophistication of digital threats confronting the North American electric grid.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Electricity Organizations Can Minimize the Possibility of a Hack\" \/>\n<meta property=\"og:description\" content=\"The SolarWinds hack testifies to the rising sophistication of digital threats confronting the North American electric grid.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-28T15:24:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-12T14:47:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Bisson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DMBisson\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Bisson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\"},\"author\":{\"name\":\"David Bisson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\"},\"headline\":\"How Electricity Organizations Can Minimize the Possibility of a Hack\",\"datePublished\":\"2022-02-28T15:24:06+00:00\",\"dateModified\":\"2022-09-12T14:47:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\"},\"wordCount\":1312,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\"],\"articleSection\":[\"Managed Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\",\"name\":\"How Electricity Organizations Can Minimize the Possibility of a Hack\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg\",\"datePublished\":\"2022-02-28T15:24:06+00:00\",\"dateModified\":\"2022-09-12T14:47:44+00:00\",\"description\":\"The SolarWinds hack testifies to the rising sophistication of digital threats confronting the North American electric grid.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg\",\"width\":800,\"height\":450,\"caption\":\"hack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Electricity Organizations Can Minimize the Possibility of a Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\",\"name\":\"David Bisson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"caption\":\"David Bisson\"},\"description\":\"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/\",\"https:\/\/x.com\/DMBisson\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Electricity Organizations Can Minimize the Possibility of a Hack","description":"The SolarWinds hack testifies to the rising sophistication of digital threats confronting the North American electric grid.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/","og_locale":"en_US","og_type":"article","og_title":"How Electricity Organizations Can Minimize the Possibility of a Hack","og_description":"The SolarWinds hack testifies to the rising sophistication of digital threats confronting the North American electric grid.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-02-28T15:24:06+00:00","article_modified_time":"2022-09-12T14:47:44+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg","type":"image\/jpeg"}],"author":"David Bisson","twitter_card":"summary_large_image","twitter_creator":"@DMBisson","twitter_site":"@itegriti","twitter_misc":{"Written by":"David Bisson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/"},"author":{"name":"David Bisson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807"},"headline":"How Electricity Organizations Can Minimize the Possibility of a Hack","datePublished":"2022-02-28T15:24:06+00:00","dateModified":"2022-09-12T14:47:44+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/"},"wordCount":1312,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg","keywords":["Cybersecurity","Energy Sector"],"articleSection":["Managed Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/","name":"How Electricity Organizations Can Minimize the Possibility of a Hack","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg","datePublished":"2022-02-28T15:24:06+00:00","dateModified":"2022-09-12T14:47:44+00:00","description":"The SolarWinds hack testifies to the rising sophistication of digital threats confronting the North American electric grid.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/02\/itegriti_blog85_electrichack.jpg","width":800,"height":450,"caption":"hack"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/managed-services\/how-electricity-organizations-can-minimize-the-possibility-of-a-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"How Electricity Organizations Can Minimize the Possibility of a Hack"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807","name":"David Bisson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","caption":"David Bisson"},"description":"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.","sameAs":["https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/","https:\/\/x.com\/DMBisson"],"url":"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3170"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3170"}],"version-history":[{"count":6,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3170\/revisions"}],"predecessor-version":[{"id":3579,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3170\/revisions\/3579"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3176"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}