Please get in touch using the form below
The dependency of today’s digitised and interconnected global economies on the energy sector has made it an attractive target for cybercriminals.
Several recent high-profile cyber-attacks have been designed specifically to damage and disrupt critical infrastructure, so protecting providers of essential services is of paramount importance.
Common cyber security challenges in the energy sector include:
• Maintaining continuity of essential services and operations
• Reducing cyber risks across the energy supply chain
• Building cyber resilience into antiquated network infrastructure
• Managing risks posed by Internet of Things devices like smart meters
• Balancing continuous digitisation and interconnectivity with security
• Demonstrating security commitments in line with new NIS Regulations
• Preventing and eliminating ransomware attacks
Security questions organisations in the energy sector should be asking:
The NIS Regulations are designed to raise the security and resilience of network and information systems across the EU. Operators of Essential Services (OESs) and Digital Service Providers (DSPs) are required to have appropriate security measures in place to manage cyber risk, protect critical systems, detect cyber events, minimise risk and maintain continuity. OESs will be regularly audited to ensure their compliance, with fines as high as £17 million for incidents resulting in significant economic disruption or threat to life.
Any organisation in the energy sector that processes personal data is also subject to the requirements of both the General Data Protection Regulation (GDPR) and Data Protection Act 2018 (DPA). To achieve compliance, organisations must continually assess data security risk and ensure that any personal data processed is protected against unauthorised processing, accidental loss or destruction. Non-compliance and failure to report breaches within 72 hours could lead to a huge fine.
€20 million or 4% of global turnover (whichever is greater)
The maximum GDPR penalty for a cyber security breach.
Redscan has experience working with organisations in energy sectors including mining, oil & gas, and utilities, helping them to better understand their security risks, identify and eliminate vulnerabilities, proactively detect and respond to threats and achieve hassle-free regulatory compliance.
Functioning as an extension of in-house IT resources, ThreatDetect™ is an award-winning MDR service supplying the capabilities needed to monitor, hunt for and remediate cyber-attacks and breaches 24/7.
Experience a real-world cyber-attack simulation to identify the weaknesses an attacker could exploit, quantify the value of data that could be exfiltrated and assess the effectiveness of security investments.
Our CREST-approved, fully customisable pen test engagements enable you to identify vulnerabilities and exposures in your infrastructure, applications, people and processes in order to reduce security risk.
"If you want a solution where someone will look after you 24/7 and give you a very flexible, professional and agile service – you want Redscan"
"Redscan gave us the professional service and quick turnaround that we needed to meet our tight deadlines."
"Our partnership with Redscan has been one of the most successful that we have ever undertaken"
“I can offer a higher level of assurance at board level about our information security now. Redscan gives us a broader lens on a complex and changing environment.”
"We have been very impressed by the quality of Redscan’s engagement, communication and reporting. We will not hesitate to use them for any future testing requirements."
We’re pleased to announce that Redscan has been shortlisted as a finalist in two categories at the TEISS Awards 2020. We have been nominated in two categories: …
A private hospital with royal patronage chose ThreatDetect™, Redscan’s Managed Detection and Response service, to protect patient data through proactive network and endpoint monitoring.
The Microsoft threat research team has discovered 44 million compromised Azure AD and Microsoft Services Accounts in the three billion leaked credentials available online.
US authorities have filed charges against two Russian nationals alleged to be running a global cyber crime organisation named Evil Corp.
New research indicates a rising threat is coming from new super-stealthy exploit kits, especially in browser-based drive-by attacks.
US retailer hit by a Magecart data breach as malicious scripts steal payment information of customers.
The 2019 (ISC)2 Cybersecurity Workforce Study estimates that the current cyber security workforce of 2.8 million professionals needs to increase by 145% to meet global demand.
Cybercriminals defraud media corporation Nikkei out of £22 million in a single transaction through a Business Email Compromise.
This content is blocked. Accept cookies to view the content.