Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Cyber Hackers Are a Real Threat to Your Distribution Network

Remote Operations Blog

Read announcements related to Remote Operations (formerly SCADA & Telemetry). New products, new versions, case studies, videos and other relevant news will be posted in this blog. Keep up-to-date with the challenges that remote sites present and how to ensure reliable communications, monitoring & management to enhance productivity and profitability.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Remote Operations
  • Remote Operations Blog
  • Cyber Hackers Are a Real Threat to Your Distribution Network
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Labels
Top Labels
  • Alphabetical
  • SCADA 111
  • Telemetry 110
  • RTU 59
  • IoT 39
  • Logic 32
  • DNP3 28
  • Radio 16
  • Drivers 15
  • Scripting 9
  • ViewX 9
  • Virtual ViewX 8
  • Mimics 7
  • Trends 5
  • WebX 5
  • WITS 5
  • Redundancy 3
  • Previous
  • 1 of 2
  • Next
Latest Blog Posts
  • March 2025 Updates of Geo SCADA 2023 and 2022
  • Changes on the Exchange Shop
  • SCADAPack Workbench Training manual
  • SCADAPack E Configurator Training manual
  • Telepace Training manual
Related Products
product field
Schneider Electric
SCADAPack 300E
product field
Schneider Electric
EcoStruxure™ Geo SCADA Expert
product field
Schneider Electric
SCADAPack 57x
field url
Schneider Electric
EcoStruxure™ Geo SCADA Expert – Sparkplug B Sample Driver
field url
Schneider Electric
Realflo Flow Computer
Load more

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
acquatel
Ensign acquatel Ensign
Ensign
‎2021-05-25 12:32 PM
2 Likes
0
2586
  • Subscribe to RSS Feed
  • Mark as New
  • Mark as Read
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

‎2021-05-25 12:32 PM

Cyber Hackers Are a Real Threat to Your Distribution Network

Originally published on Remote Operations Blog by acquatel | May 25, 2021 09:32 PM

For a second, let’s consider what cybercriminals stand to gain from you: financial, ransom, data (operational, client, etc.); even bandwidth, processing, and power. You likely thought of the first few – but have you considered how much processing power you could also be offering for cryptocurrency mining?

 

Pipelines and Water/Waste Water Utilities are at a particular disadvantage.

Since their critical infrastructure is set up with many distributed assets, they need to be monitored through multiple edge nodes, including RTUs, data loggers, PLCs, & more recently IoT devices. This makes them targets ripe for exploitation by threat-seeking third-parties.

 

Take for instance a cyberattack in 2020. A natural gas pipeline facility was forced to shut down for two days, affecting the control & communication assets on the Operational Technology (OT) network at a compression facility. More recently, a ransomware attack on a major Refined Products Pipeline IT System required operators to shut down the pipeline affecting the supply of gasoline & diesel to northeastern USA.

 

Pipelines’ and Water/Waste Water Utilities’ distributed assets will typically have some kind of edge node(s) and communication path back to the Supervisory Control and Data Acquisition (SCADA) system as part of their OT system. Given these systems sit on the edge of the network they are vulnerable and at risk for intrusion.

 

In general, the OT Systems that manage physical infrastructure and capture real-time asset data are especially vulnerable and are attractive targets for hacking. SCADA & Telemetry Systems are the centerpiece for these utilities’ operations, and therefore require the implementation of a cyber-secure strategy from the field & edge, to the enterprise & cloud. To achieve the advantages of a smart connected infrastructure in terms of safe, reliable, and efficient operations, cyber security in the OT/IT systems is paramount.

 

So, what steps should you take to help protect your distributed assets and network?

 

First, get to know the manufacturer of the hardware and software you choose. Use a defense-in-depth approach by layering security, from your connected products and devices, right to the edge network, and include your edge control and the smart software applications that support SCADA and operational technology. Properly segmenting your SCADA network with the use of a DMZ (demilitarized zone) to pass data from your SCADA to your enterprise systems in a secure way, can help reduce your vulnerabilities and attack surface to your OT System.

 

Cybersecurity is an ongoing journey that needs constant attention and will continue to evolve at a fast pace.

 

We are living in a time when automation hardware and software life cycles are decreasing mainly due to the systems’ needs to cope with next-gen cybersecurity features, communication standards, operating systems, and its ability to be compatible with security patches and practices. A next generation of cyber secure hardened automation hardware by design is required to cope with the cyber challenges. Equally important are robust cybersecurity features at the SCADA software layer and associated architecture where such SCADA systems are deployed.

 

Schneider Electric has a dedicated Cybersecurity services team and SCADA & Telemetry experts to help you on your journey to operate robust and cyber-secure pipeline and utility distribution networks. 

 

One gas pipeline operator customer recently shared, “I had your joint Schneider Electric / Nozomi demo today which was impressive, but with what I saw today from a 15-minute data capture on a site (with which) I have some familiarity, I am blown away.”

 

Furthermore, our Cybersecurity team is vendor-agnostic and has knowledge across IT & OT environments, and has domain expertise in Oil & Gas and Water Networks.

 

Our experts are ready to answer your questions and technical issues on the Geo SCADA Expert forum and SCADA and Telemetry Devices forum. If you want to discuss this topic further, feel free to leave me a comment below.

 

 

Never miss any update by subscribing to our SCADA and Telemetry Blog

 

Labels:
  • IoT

  • Redundancy

  • RTU

  • SCADA

  • Telemetry

  • Tags:
  • cybersecurity
  • defense in depth
  • edge
  • hacking
  • iot
  • it
  • ot
  • rtu
  • scada

Author

Biography

acquatel

Link copied. Please paste this link to share this article on your social media post.

  • Back to Blog
  • Newer Article
  • Older Article

Would you like to add a comment?

All registered members have full access to the Community and can post comments and start topics.

  • Sign in / Register
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of