The mission of this group is to bring together utility professionals in the power industry who are in the thick of the digital utility transformation. 

Post

Hardening Your Computer Network Against Threats

image credit: © Poringdown | Dreamstime.com
Julian Jackson's picture
writer and researcher BrightGreen PR

Julian Jackson is a writer whose interests encompass business and technology, cryptocurrencies, energy and the environment, as well as photography and film. His portfolio is here:...

  • Member since 2020
  • 373 items added with 132,042 views
  • May 12, 2022
  • 164 views

Unfortunately we live in an age of increasing threats to computer security. We rely on them more and more, and use of mobile devices is proliferating, for both leisure and business use. Therefore it is important to harden utility computer networks to resist threats and attacks. This is critical where temporary staff, outside contractors, or other third parties are involved, which may involve security vulnerabilities.

Computer security expert, Ivan Yordanov, CEO of Go Live UK, an IT services and cybersecurity consultancy, advises the following:

  • Have secure backups
  • Train staff in security
  • Replace obsolete legacy software
  • Adopt the best security practices
  • Keep informed about security legislation

Legacy software might well have security holes that a hacker can exploit. There are also serious risk management and liability issues for executives if there is a security breach, as it may be that using this obsolete and vulnerable software could be considered a management failure if a lawsuit was involved.

Ransomware is a serious challenge, particularly where the malicious hackers get paid in cryptocurrency, which is harder to trace and recover than if money is paid into a traditional bank account. Ransomware normally attempts to encrypt the entire network, including backup computers, so victims have to pay to restore their computer functioning.

Yordanov says, “This is a serious problem that is constantly evolving, very often difficult to spot by staff and often not mitigated by senior management.” Companies that suffer major malicious attacks lose money, reputation, and can suffer many negative effects from these cyber security issues.

One method to combat Ransomware is to have a backup computer that is isolated from the rest of the network and invisible to hackers: if they can't see it, they can't attack it. Then the whole network can be restored with minimal loss of data.

Yordanov says, “Companies should have a proper, tested Disaster Recovery Plan and ensure that they have regular computer security audits so they can be confident that they are prepared for challenges of this nature.”

Julian Jackson's picture
Thank Julian for the Post!
Energy Central contributors share their experience and insights for the benefit of other Members (like you). Please show them your appreciation by leaving a comment, 'liking' this post, or following this Member.
More posts from this member
Discussions
Spell checking: Press the CTRL or COMMAND key then click on the underlined misspelled word.

No discussions yet. Start a discussion below.

Get Published - Build a Following

The Energy Central Power Industry Network is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.

If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.

                 Learn more about posting on Energy Central »