{"id":10037,"date":"2018-10-09T14:42:13","date_gmt":"2018-10-09T19:42:13","guid":{"rendered":"https:\/\/www.openintl.com\/ambienteWordpress\/?p=10037"},"modified":"2023-06-09T10:22:35","modified_gmt":"2023-06-09T15:22:35","slug":"cybersecurity-for-utilities","status":"publish","type":"post","link":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/","title":{"rendered":"Cybersecurity for Utilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10037\" class=\"elementor elementor-10037\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-b5975d3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"83739\" data-id=\"b5975d3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3684d124\" data-eae-slider=\"77318\" data-id=\"3684d124\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-59985293 elementor-widget elementor-widget-text-editor\" data-id=\"59985293\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><script src=\"https:\/\/platform.linkedin.com\/in.js\" type=\"text\/javascript\"> lang: en_US<\/script><br \/><script type=\"IN\/FollowCompany\" data-id=\"2292873\" data-counter=\"right\"><\/script><\/p><h4>With the advent of cryptocurrencies, the vast number of privileged inter-company interactions, and the digitization of critical operations, the utility sector is under greater threat than ever from cyberattacks. To combat these new risks, utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.<\/h4><h4><strong>But what are the new risks facing utility companies?<\/strong><\/h4><p>Ransomware is quickly on the way up, with this type of attack now constituting a whopping <strong>39% of all malware cases <\/strong>according to Verizon\u2019s report.<a href=\"#_ftn1\" name=\"_ftnref1\"><sup>1<\/sup><\/a> This strategy involves locking down critical systems and demanding payment for the release of data.<\/p><p>The city of Atlanta was the victim of a highly-publicized ransomware attack demanding a little over $50,000 worth of bitcoin; however, the city refused to pay the ransom and instead carried out its own emergency system recovery for a total cost of $2.6M.<a href=\"#_ftn2\" name=\"_ftnref2\"><sup>2<\/sup><\/a> This example is common of ransomware operations in that the payment demanded was well below the costs of carrying out the emergency repairs. While paying up may seem like the best option, there is no guarantee that the cybercriminals will honor the terms of the ransom (see what happened to <a href=\"https:\/\/www.digitaltrends.com\/computing\/ransomware-hospital-hackers-demand-more-money\/\">Kansas Hospital<\/a>).<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-10039 size-medium_large\" src=\"https:\/\/www.openintl.com\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-1-768x523.jpg\" alt=\"\" width=\"768\" height=\"523\" srcset=\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-1-768x523.jpg 768w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-1-300x204.jpg 300w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-1-1024x698.jpg 1024w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-1-600x409.jpg 600w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-1.jpg 1440w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/p><p>According to the FBI, ransomware attacks have been on the rise over the past three years, especially against organizations that serve the public.<a href=\"#_ftn3\" name=\"_ftnref3\"><sup>3<\/sup><\/a> This is driven by the increasingly critical role digital systems play in large organizations and the anonymity afforded by cryptocurrency payments. The FBI advises against paying up in ransomware attacks unless absolutely necessary.<a href=\"#_ftn4\" name=\"_ftnref4\"><sup>4<\/sup><\/a><\/p><p><strong><u>Cryptojacking<\/u><\/strong> is a new type of cyber-attack that infects computer systems and uses their resources to mine cryptocurrency. This threat can be considered more as a parasite than a direct attack, as the goal is to leach off the system rather than shut it down or rob funds.<\/p><p>A water utility in Europe was recently the victim of cryptojacking; the malware made its way into the system through the SCADA network and operated for approximately three weeks before being detected.<a href=\"#_ftn5\" name=\"_ftnref5\"><sup>5<\/sup><\/a> This type of threat slows down computing operations and may lead to an unacceptable delay of SCADA communications, causing serious problems for time-critical operations such as the operation of circuit-breakers on power distribution networks.<\/p><p><strong><u>Spear Phishing Attacks<\/u><\/strong> are a modern twist on an old classic. Traditional phishing attacks cast the net as wide as possible to trick any member of the public into giving up sensitive information such as credit card details. These attacks have become easy to identify, leading cybercriminals to move on to the more sophisticated method of spear phishing, which involves researching and attacking a select group of targets. This is an important technique to watch out for considering that <strong>91% of cyber-attacks begin with a spear phishing email<\/strong>.<a href=\"#_ftn6\" name=\"_ftnref6\"><sup>6<\/sup><\/a><\/p><h4><strong>Spear Phishing<\/strong><\/h4><p><strong><u>Critical Infrastructure Attacks<\/u><\/strong> are a growing risk as foreign governments start to take advantage of the digitalization of key infrastructure. According to the Department of Homeland Security and the FBI, Russian government cyber actors have been targeting government entities and critical infrastructure (including energy and water) since March 2016.<a href=\"#_ftn7\" name=\"_ftnref7\"><sup>7<\/sup><\/a><\/p><p><img decoding=\"async\" class=\"aligncenter wp-image-10040 size-medium_large\" src=\"https:\/\/www.openintl.com\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-3-768x512.jpg\" alt=\"Cybersecurity for utilities\" width=\"768\" height=\"512\" srcset=\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-3-768x512.jpg 768w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-3-300x200.jpg 300w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-3-600x400.jpg 600w, https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities-3.jpg 1000w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><\/p><p>These threats typically begin by first infecting a staging target (a software system closely linked to and trusted by the main target) and then using it to get directly to the intended target. The Russian government appears to be primarily gathering information and probing for weaknesses; however, this behavior could escalate into destructive attacks on key infrastructure leaving parts of the country without energy or water.<\/p><p><strong><u>Supply Chain Attacks<\/u><\/strong> take advantage of trusted digital relationships between companies to get malware into target organizations. In World War II, France invested heavily in fortifying their eastern border only to find that the Germans stormed through Belgium and attacked from the north. Similarly, cyber-attacks can easily get into your company via a third party. No matter how much you secure your own system, compromised third parties with privileged access to your critical systems can provide a pathway for malware to get in.<\/p><h4><strong>Supply Chain Attack<\/strong><\/h4><blockquote><h4><span style=\"color: #003da6;\"><strong>At least 56% of respondents in the Ponemon\u2019s third-party data risk study reported having experienced a third-party data breach<\/strong>.<a style=\"color: #003da6;\" href=\"#_ftn8\" name=\"_ftnref8\"><sup>8<\/sup><\/a><\/span><\/h4><\/blockquote><p>Considering the growing threat posed by these new types of cyber-attacks, it is important that utilities setup a robust cybersecurity strategy focused on <strong>preventing<\/strong> malware getting into their systems, <strong>detecting<\/strong> malware that manages to get in, and <strong>responding<\/strong> quickly to emergency events.<\/p><h4><strong>Prevention<\/strong><\/h4><p>As spear phishing is one of the most common causes of malware infection, utilities should work with their staff to prevent this type of attack. Here are three useful tips:<\/p><ul><li>Avoid putting too much company or personal information online as this could help cybercriminals come up with believable emails<\/li><li>Avoid clicking links in emails. Check the sender of the email and hover over the link to carefully check whether the URL is a trustworthy site before clicking<\/li><li>Invest in anti-malware software for more advanced protection including automatic sandboxing of incoming emails<\/li><\/ul><p>Supply chain attacks also require careful attention as digital relationships with third parties are a big security hole for many utility companies. Do you trust your software vendors? Do you trust your cloud service provider? Do you have a complete list of every organization with privileged access to your system? How secure are their systems? These are the questions you need to start asking yourself if you want to protect yourself.<\/p><p>The utility industry is moving enthusiastically into the cloud; while this technology offers great business benefits, it can also significantly increase exposure to supply chain attacks. When deciding to work with a SaaS (Software as a Service) provider, utilities must ensure themselves that the chosen solution has cybersecurity built in from the bottom up.<\/p><h4><strong>Detection<\/strong><\/h4><p>Even with the best line of defense, there is always a chance that a bad actor will get into your system; new threats such as crypto-mining and surveillance by foreign governments don\u2019t draw attention to themselves by stealing money or demanding ransom, so they could easily operate within your organization for weeks or months without detection.<\/p><p>Crypto-currency mining operations consume a large amount of system resource and require frequent online interactions. A comprehensive system monitoring tool can greatly increase the chance of catching rogue applications operating on your system.<\/p><p>As for hostile foreign governments, the US Computer Emergency Readiness Team has prepared a <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-074A\">detailed list<\/a> of suggested measures for both detection and prevention.<\/p><h4><strong>Response<\/strong><\/h4><p>On top of prevention and detection, utilities must know how to respond to cyber-attacks, which is why the North American Electric Reliability Corp (NERC) held a simulated cyberattack exercise called GridEx, involving 450 participating organizations. One of the key findings was that utilities need a stronger relationship with third-party software vendors; as these organizations were not contacted during the exercise despite their critical role in cybersecurity.<a href=\"#_ftn9\" name=\"_ftnref9\"><sup>9<\/sup><\/a><\/p><p>At Open, we let utilities enjoy our world-class CIS and field service management solution with the confidence that they are protected by our robust cybersecurity strategy. Our cloud-based service is powered by Microsoft Azure, the platform with the most rigorous security standards on the market to prevent intrusion of malware via supply chain attack. Our system monitoring solution, Open Vital Signs, gives you complete visibility of how our solution is running on your system, helping you to detect any rogue activity consuming system resources and catch cryptojacking operations in their tracks. As for response, when you work with us you have the peace of mind that our knowledgeable support team is at your disposal 24\/7 to get your system back up in running in the case of a cyber-attack emergency.<\/p><h4><strong>If you are considering CIS and\/or mobile workforce management solutions with all the benefits of the cloud, <a href=\"https:\/\/www.openintl.com\/the-cis-of-the-future-is-a-holistic-solution\/\">Smartflex<\/a> offers a bulletproof platform that puts cybersecurity front and center.<\/strong><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-c820a34 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"25974\" data-id=\"c820a34\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6f989065\" data-eae-slider=\"32323\" data-id=\"6f989065\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4fc9316d elementor-button-info elementor-mobile-align-center elementor-align-left elementor-widget elementor-widget-button\" data-id=\"4fc9316d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/app.openintl.com\/demo\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">BOOK A DEMO<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-f93ceb8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-eae-slider=\"53736\" data-id=\"f93ceb8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c509aa9\" data-eae-slider=\"87566\" data-id=\"c509aa9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7955a08 elementor-widget elementor-widget-text-editor\" data-id=\"7955a08\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"#_ftnref1\" name=\"_ftn1\">(1)<\/a> https:\/\/www.washingtontimes.com\/news\/2018\/apr\/10\/ransomware-behind-39-percent-malware-cases-verizon\/<\/p><p><a href=\"#_ftnref2\" name=\"_ftn2\">(2)<\/a> https:\/\/www.wired.com\/story\/atlanta-spent-26m-recover-from-ransomware-scare\/<\/p><p><a href=\"#_ftnref3\" name=\"_ftn3\">(3)<\/a> https:\/\/www.npr.org\/sections\/thetwo-way\/2018\/03\/30\/597987182\/as-atlanta-seeks-to-restore-services-ransomware-attacks-are-on-the-rise<\/p><p><a href=\"#_ftnref4\" name=\"_ftn4\">(4)<\/a> https:\/\/www.forbes.com\/sites\/haroldstark\/2017\/02\/28\/when-attacked-by-ransomware-the-fbi-says-you-shouldnt-pay-up<\/p><p><a href=\"#_ftnref5\" name=\"_ftn5\">(5)<\/a> http:\/\/www.eweek.com\/security\/water-utility-in-europe-hit-by-cryptocurrency-malware-mining-attack<\/p><p><a href=\"#_ftnref6\" name=\"_ftn6\">(6)<\/a> https:\/\/digitalguardian.com\/blog\/91-percent-cyber-attacks-start-phishing-email-heres-how-protect-against-phishing<\/p><p><a href=\"#_ftnref7\" name=\"_ftn7\">(7)<\/a> https:\/\/www.us-cert.gov\/ncas\/alerts\/TA18-074A<\/p><p><a href=\"#_ftnref8\" name=\"_ftn8\">(8)<\/a> https:\/\/www.opus.com\/ponemon\/<\/p><p><a href=\"#_ftnref9\" name=\"_ftn9\">(9)<\/a> https:\/\/www.utilitydive.com\/news\/nerc-utilities-failed-to-contact-vendors-during-gridex-cyberattack-simulat\/520697\/<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.<\/p>\n","protected":false},"author":89,"featured_media":10038,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[1473,64],"class_list":["post-10037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry-articles","tag-industry-articles","tag-technical-articles","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-33"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity for Utilities | Smartflex<\/title>\n<meta name=\"description\" content=\"Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for Utilities\" \/>\n<meta property=\"og:description\" content=\"Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/\" \/>\n<meta property=\"og:site_name\" content=\"Open Intelligence\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OpenSmartflex\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-09T19:42:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-09T15:22:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"GrowthMK\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@opensmartflex\" \/>\n<meta name=\"twitter:site\" content=\"@opensmartflex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"GrowthMK\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/\"},\"author\":{\"name\":\"GrowthMK\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/0d317ba2be1e61522428c1e7bd4c222d\"},\"headline\":\"Cybersecurity for Utilities\",\"datePublished\":\"2018-10-09T19:42:13+00:00\",\"dateModified\":\"2023-06-09T15:22:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/\"},\"wordCount\":1340,\"publisher\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg\",\"keywords\":[\"industry articles\",\"technical articles\"],\"articleSection\":[\"Industry articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/\",\"name\":\"Cybersecurity for Utilities | Smartflex\",\"isPartOf\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg\",\"datePublished\":\"2018-10-09T19:42:13+00:00\",\"dateModified\":\"2023-06-09T15:22:35+00:00\",\"description\":\"Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg\",\"contentUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg\",\"width\":1000,\"height\":667,\"caption\":\"Cybersecurity for utilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity for Utilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/\",\"name\":\"Open Intelligence\",\"description\":\"Software for utility companies\",\"publisher\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization\"},\"alternateName\":\"Open\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization\",\"name\":\"Open Intelligence\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png\",\"contentUrl\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png\",\"width\":974,\"height\":378,\"caption\":\"Open Intelligence\"},\"image\":{\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/OpenSmartflex\/\",\"https:\/\/x.com\/opensmartflex\",\"https:\/\/www.linkedin.com\/company\/weareopenintelligence\",\"https:\/\/www.youtube.com\/channel\/UCHpHSdiqVTs0OvdEYJxCqiQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/0d317ba2be1e61522428c1e7bd4c222d\",\"name\":\"GrowthMK\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity for Utilities | Smartflex","description":"Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for Utilities","og_description":"Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.","og_url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/","og_site_name":"Open Intelligence","article_publisher":"https:\/\/www.facebook.com\/OpenSmartflex\/","article_published_time":"2018-10-09T19:42:13+00:00","article_modified_time":"2023-06-09T15:22:35+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg","type":"image\/jpeg"}],"author":"GrowthMK","twitter_card":"summary_large_image","twitter_creator":"@opensmartflex","twitter_site":"@opensmartflex","twitter_misc":{"Written by":"GrowthMK"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#article","isPartOf":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/"},"author":{"name":"GrowthMK","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/0d317ba2be1e61522428c1e7bd4c222d"},"headline":"Cybersecurity for Utilities","datePublished":"2018-10-09T19:42:13+00:00","dateModified":"2023-06-09T15:22:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/"},"wordCount":1340,"publisher":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization"},"image":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg","keywords":["industry articles","technical articles"],"articleSection":["Industry articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/","name":"Cybersecurity for Utilities | Smartflex","isPartOf":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage"},"image":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg","datePublished":"2018-10-09T19:42:13+00:00","dateModified":"2023-06-09T15:22:35+00:00","description":"Utilities must protect themselves with a comprehensive cybersecurity strategy focused not only on prevention but also on detection and emergency response.","breadcrumb":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#primaryimage","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg","contentUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2018\/10\/cybersecurity-for-utilities.jpg","width":1000,"height":667,"caption":"Cybersecurity for utilities"},{"@type":"BreadcrumbList","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/cybersecurity-for-utilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.openintl.com\/ambienteTrabajo2\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity for Utilities"}]},{"@type":"WebSite","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#website","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/","name":"Open Intelligence","description":"Software for utility companies","publisher":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization"},"alternateName":"Open","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.openintl.com\/ambienteTrabajo2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#organization","name":"Open Intelligence","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/","url":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png","contentUrl":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-content\/uploads\/2022\/09\/cropped-color-open-intelligence-logo-1.png","width":974,"height":378,"caption":"Open Intelligence"},"image":{"@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OpenSmartflex\/","https:\/\/x.com\/opensmartflex","https:\/\/www.linkedin.com\/company\/weareopenintelligence","https:\/\/www.youtube.com\/channel\/UCHpHSdiqVTs0OvdEYJxCqiQ"]},{"@type":"Person","@id":"https:\/\/www.openintl.com\/ambienteTrabajo2\/#\/schema\/person\/0d317ba2be1e61522428c1e7bd4c222d","name":"GrowthMK"}]}},"_links":{"self":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/posts\/10037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/comments?post=10037"}],"version-history":[{"count":1,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/posts\/10037\/revisions"}],"predecessor-version":[{"id":31604,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/posts\/10037\/revisions\/31604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/media\/10038"}],"wp:attachment":[{"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/media?parent=10037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/categories?post=10037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.openintl.com\/ambienteTrabajo2\/wp-json\/wp\/v2\/tags?post=10037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}