Cybersecurity Funds Available Now for Public Power Utilities

Don’t miss this opportunity to improve cybersecurity defenses at your utility – at no cost! Cybersecurity is an ongoing threat to public power utilities and communities. In recognition of this critical issue, the American Public Power Association secured a Department of Energy (DOE) grant with a focus on helping its…

Research Shows Cybersecurity Monitoring is Needed Behind Network Firewalls

A recent white paper released by a leading firewall company discussed Three (3) Dirty Little Secrets that were discovered about Network Firewalls. It shows the existing weaknesses in firewalls, how companies have become used to network and system infections, and to pushes the need for the newest higher-end firewalls which…

Ten Types of Cyber Attacks Electric Utilities Suffered in 2018

The following synopsis are paraphrased and anonymized for the protection of the utilities and their customers. These are real attacks that have happened since 2016 that were either reported or known to companies like us. The list has been kept to just 10. With these real-life examples, we have tried…

What are the differences between the types of hackers?

According to various definitions you read on-line and in print, there are roughly ten (10) different classifications of Hackers. These can all be found on-line as well as the varying definitions as to what each is. When hiring someone to do Penetration Testing or Vulnerability Testing, most organizations use White…