Article | April 7, 2024

Cybersecurity Toolkit For Water Utilities To Adopt CISA, FBI, And EPA Guidance

follow-epa-guidelines-2

A quick cybersecurity pop quiz. Which of these three events is based on an actual occurrence?

  • A malicious cyber actor deploys a SCADA-based ransomware attack against a water and wastewater system.
  • A hacker accesses the computer systems for a water treatment facility, modifying the sodium hydroxide (lye) levels from 100 ppm to an extremely poisonous 11,100 ppm.
  • A former employee at a water treatment plant remotely accesses a computer and shuts down the cleaning and disinfecting procedures that make water potable.

The correct answer, unfortunately, is “all of the above”. These were all actual events in CaliforniaFlorida, and Kansas that were thankfully stopped in their tracks by attentive employees. To date, there has been no successful attempt by hackers to poison an American community’s water supply.

However, these types of attacks will inevitably become more sophisticated over time, which has prompted the US government to raise a cybersecurity alarm for the US’s 148,000+ public drinking water systems and 16,000+ publicly owned wastewater treatment systems.

access the Article!

Get unlimited access to:

Trend and Thought Leadership Articles
Case Studies & White Papers
Extensive Product Database
Members-Only Premium Content
Welcome Back! Please Log In to Continue. X

Enter your credentials below to log in. Not yet a member of Water Online? Subscribe today.

Subscribe to Water Online X

Please enter your email address and create a password to access the full content, Or log in to your account to continue.

or

Subscribe to Water Online