Cyber SecuritySecurity Culture

Water Sector Faces Cyberthreats; Lack of Funding Can’t Be an Obstacle to Preventative Measures

The Wall Street Journal recently published an alarming article that noted the severe lack of federal funding for improving cybersecurity measures and infrastructure for U.S. water facilities. While water facilities don’t immediately come to mind when considering potential cyberattack targets, that very lack of visibility makes them even more vulnerable. It’s not difficult to imagine the grave harm to Americans if a water facility’s security is compromised: contamination or supply shortages come to mind.

Cyber-attacks have increased a staggering 300% since the onset of COVID-19. And since just 2019 there have been a recorded five attacks on water facilities. The threat is real; but what are we doing about it?

The Environmental Protection Agency (EPA) is responsible for overseeing all 52,000 drinking-water and 16,000 wastewater systems across the United States. As of November 2021, the EPA has not standardized cybersecurity requirements for these water facilities. Many must conduct their own risk assessments and incidence response plans.

Cybersecurity is not a “nice-to-have.” It’s a vital part of every organization.

Even though constrained budgets might prevent U.S. water facilities from making sizeable investments, there are cost-effective options available for improving cyber defense.

Analyze your cybersecurity situation with these 5 questions

  1. What is your biggest security concern as it relates to your environment?
  2. When was your last security assessment; and what did it include?
    • A strong, updated security assessment should be performed annually and include the following aspects:
      • Policy Review
      • Network Penetration Testing
      • Asset Review and Classification
      • Access Control
      • Incident Response
  3. Do you have a current incident response (IR) plan?
    • Typically, IR plans are updated every 18 to 24 months and, with the ever-changing cyber threat landscape, should be reviewed more frequently. An IR tabletop exercise is recommended at least once annually to validate the effectiveness of the plan.
  4. How realistic is your IR plan to address the risks and mitigate the impacts of a cyber-attack?
    • Here are some aspects to consider when realistically addressing your IR plan:
      • Labor resources: Do you have enough staff on hand to jump onto an identified threat?
      • Cost resources: If the cyberattack damages operations more than expected, do you have the right teams in place? If not, how much will additional contracting cost?
      • Streamlined procedures: Do you have to engage with multiple vendors/contractors? How much operational damage is being done while coordinating?
  5. On a scale of 1—10, how confident are you in the ability to demonstrate security compliance (1 – low; 10 – high)?
    • If you answered anywhere below 10, you should strongly consider assessing your IT environment and creating steps to improve your cybersecurity posture.
    • CAI can help you by performing an initial assessment of your IT environment and making suggestions to help you raise your cybersecurity confidence.

How to jumpstart your cyber posture

CAI understands the challenges and threats faced by America’s local infrastructure departments. We are determined to provide cost-effective cybersecurity services without sacrificing service quality and operational performance. To provide an end-to-end, flexible cybersecurity suite, CAI has teamed up with proven, experienced partners enabling us to deliver maximum value to our clients. Additionally, clients can expect cyber threats to be detected faster and incidence response to rapidly deploy to stop cyber threats before they have a significant operational impact. 

Our cybersecurity service starts with an initial assessment of your IT environment and, based on the findings, we prescribe only the services you need and advise you on the next steps towards protecting your department and constituents. To start your assessment, please complete the contact form, and our cybersecurity experts will reach out to you shortly.

Related Articles

Back to top button
X

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.