Cyber Threat Moves from Data Breach to Critical Infrastructure

[ Return to Our Blog ]

ID-10015432_300X300Technology running the world’s critical infrastructure is increasingly at risk of cyber attack, according to research by Lloyd’s of London insurer Aegis London, writes Warwick Ashford at ComputerWeekly.com.

 

The study, conducted by BAE Systems, covers the evolution of cyber risk in the energy sector and its impact on critical infrastructure businesses in the UK, Europe, US and Canada.

Researchers found that state-sponsored cyber attacks are a serious and evolving threat to power and utility companies, Ashford writes.

 

A survey of energy and utility companies showed that most respondents believe a cyber attack of major significance and impact on critical operational infrastructure is highly likely.

 

The researchers said these organisations have a good understanding of the cyber threats they face, and one of the biggest challenges energy companies and utilities face are constraints outside their control. These include things like a lack of adequate and mature technology systems.

 

© 2014 PropertyCasualty360, A Summit Professional Networks website.

Image credit: jscreationzs / FreeDigitalPhotos.net


Contact Us

For more information, contact us today! Our Risk Advisors and Employee Benefit Consultants are available to answer any questions you may have. We look forward to working with you!

Subscribe

For the latest updates on pending legislation, emerging risks and other vital issues that impact your business, subscribe to our Risk Advisor & Benefits Advisor newsletters.

Seminars

Find an upcoming Loss Prevention Seminar near you! View our full schedule of Loss Prevention Seminar topics for information about our Loss Prevention Services.


Learn more about how Tolman & Wiker helps our clients succeed by lowering their total cost of risk:
Our Process | Performance Based Insurance


Blog Topics: [ Employee Benefits ] [ Health & Wellness ] [ Property & Casualty ] [ Risk Management ] [ Leadership ] [ Security ]

Blog | No Comments

Comments are closed.