The recent cyber event that shut down the largest pipeline operator in the US, Colonial Pipeline, is a perfect example of how hackers can, and will continue to, target oil and gas companies.
A recent article from the New York Times states that a confidential assessment prepared by the Energy and Homeland Security Departments discovered that the country would have only been able to afford another 3 to 5 days with the Colonial Pipeline shut down before buses and other mass transit would have to limit operations because of a lack of diesel fuel. The report findings also found that chemical factories and refinery operations would have had to shut down because there would be no way to distribute what they produced.
However, it’s not just the large operators that cyber criminals are targeting; it is the small business owners as well. Cyber criminals enjoy attacking smaller companies as they have identified these businesses to be easier to penetrate as they typically do not have the proper safety measures in place and invest less in cyber security.
Did you know…
- If you hold reservoir or exploration data, you have a cyber exposure
- If you have an email address or bank account information, you have a cyber exposure
- If you rely on any 3rd parties to operate your business, you have a cyber exposure
There is no question that cyber-attacks are on the rise and there are no signs of it slowing down. According to the FBI’s 2020 Internet Crime Report, the number of social engineering attacks more than doubled since 2019, and increased more than 900% compared to 2018 levels.
We advise working with your risk management advisor to perform an assessment of your business’s potential liabilities to cyber-attacks and identify ways to mitigate your exposure.
About the Author
Share This Story
Related Blogs
Enhancing School Security: Practical Strategies for Safer Campuses
Enhancing school security is one of the most pressing responsibilities for education leaders today. As school campuses evolve, so too must the systems that protect them. For administrators, safety professionals, and district decision-makers, creating a secure learning environment means taking a proactive, layered approach that includes physical security, training, technology, and community involvement.
5 Common Cybersecurity Mistakes and How to Avoid Them
All organizations, regardless of their size or industry, are at risk of being targeted by cybercriminals. These malicious actors can conduct cyberattacks, leading to significant financial, operational and reputational damage that can be difficult or impossible to recover from. Fortunately, solid cyber hygiene practices can reduce the likelihood of data breaches and other cyber incidents from occurring, and many of these practices are relatively low-cost and easy to implement.
Insurance Coverage Basics For Boatowners
A small boat, such as a canoe or other un-motorized boat, is typically covered under the personal property portion of your homeowners insurance policy. If you own a larger, faster boat, you'll need a separate boatowners insurance policy. A typical boatowners insurance policy is designed to protect your boat, motor, equipment, and passengers. It affords similar coverages to those you typically have for your car including: