Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Hackers are after your Water and Wastewater Network – big or small!

Remote Operations Blog

Read announcements related to Remote Operations (formerly SCADA & Telemetry). New products, new versions, case studies, videos and other relevant news will be posted in this blog. Keep up-to-date with the challenges that remote sites present and how to ensure reliable communications, monitoring & management to enhance productivity and profitability.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Remote Operations
  • Remote Operations Blog
  • Hackers are after your Water and Wastewater Network – big or small!
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Labels
Top Labels
  • Alphabetical
  • SCADA 111
  • Telemetry 110
  • RTU 59
  • IoT 39
  • Logic 32
  • DNP3 28
  • Radio 16
  • Drivers 15
  • Scripting 9
  • ViewX 9
  • Virtual ViewX 8
  • Mimics 7
  • Trends 5
  • WebX 5
  • WITS 5
  • Redundancy 3
  • Previous
  • 1 of 2
  • Next
Latest Blog Posts
  • March 2025 Updates of Geo SCADA 2023 and 2022
  • Changes on the Exchange Shop
  • SCADAPack Workbench Training manual
  • SCADAPack E Configurator Training manual
  • Telepace Training manual

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
wmoulton
Ensign wmoulton Ensign
Ensign
‎2020-02-25 09:12 AM
1 Like
0
1609
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

‎2020-02-25 09:12 AM

Hackers are after your Water and Wastewater Network – big or small!

Originally published on Remote Operations Blog by wmoulton | February 25, 2020 06:12 PM

“Ours is too small” you say. Is it?

 

For a second, let’s consider what these cybercriminals stand to gain from you: financial, data (operational, client, etc.), bandwidth, processing, and power. You likely thought of the first few – but have you considered how much processing power you could also be offering?

 

Why would processing, power and bandwidth be of interest? Cryptocurrency mining. It’s a constant game of measuring energy input (processing power) versus output of mined currency value. You also must consider the hardware costs involved with having specialized equipment to carry out the mining tasks.

 

Hackers are targeting corporations, utilities, and municipalities that have extensive processing abilities in place to run their business or service. With access to these power, processing and bandwidth resources, hackers can remove the expense side of their profit calculations, where regardless of the cost of energy to mine, when it’s free, it will always be worth it.

 

 

geo scada expert shop schneider exchange.jpg

 

 

Water & Wasterwater utilities are at a particular disadvantage because there are always so many distributed assets that need to be monitored and controlled. With the ever-increasing downward pressure on expenditures, utilities must rely on remote monitoring in order to make the most effective use of their resources. These distributed assets, will typically have some kind of edge node(s) and communication path back to the Supervisory Control and Data Acquisition (SCADA) system.

 

Because these systems sit on the edge of the network, that opens them to the most risk for intrusion. Should we shut it all down, go off-grid, and revert to paper records? No. There are awesome advantages to having smart connected infrastructure, and they can empower your utility to realize true gains. With that to gain, special consideration needs to be given to the edge nodes and network that is going to be deployed at the edge.

 

So, what steps should you take to protect your Water & Wastewater network? Get to know the manufacturer of the hardware and software you choose. Using a defense-in-depth approach to all layers of your edge network starting from your connected products, your edge control, and the smart software that gives you your operational advantages can also offer you confidence that your system is secure. The cybersecurity story is not a destination, it is a journey that needs constant attention and will continue to evolve.

 

We are living in a time where automation hardware obsolescence speed is increasing – not because the hardware or software is failing – but because of the system’s ability to cope with next generation cybersecurity features, communication standards, and its ability to be compatible with security patches.

 

There are many reasons that a hacker would target a Water and Wastewater utility, with one of them being a cheap way to generate cryptocurrency. You can operate in a cybersecure way without completely disconnecting from the world – observe a defense-in-depth approach and a manufacturer that understands cybersecurity and its application in #SCADA & Telemetry networks.

 

We have a dedicated Cybersecurity services team, and SCADA & Telemetry expertise to help you on your journey of operating a robust and secure Water & Wastewater Network. Our experts are ready to answer your questions and technical issue on Geo SCADA Expert forum and SCADA and Telemetry Devices forum  and if you want to discuss this topic further, feel free to leave me a comment below.

 

Never miss any update by subscribing to our SCADA and Telemetry Blog

 

 

Originally posted on SE Blog 

 

Labels:
  • SCADA

  • Telemetry

  • Tags:
  • cryptocurrency
  • cybersecurity
  • defense in depth
  • hackers
  • processing power
  • scada
  • SCADA integration
  • SCADA software
  • scada system
  • Telemetry
  • Telemetry and SCADA
  • wastewater
  • water
  • water treatment

Author

Biography

wmoulton

Link copied. Please paste this link to share this article on your social media post.

  • Back to Blog
  • Newer Article
  • Older Article

Would you like to add a comment?

All registered members have full access to the Community and can post comments and start topics.

  • Sign in / Register
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of