Cybersecurity

Prevailing cybersecurity threats on the U.S. water sector

There is a severe lack of funding for US water facilities' cybersecurity, leaving it open to cyber threats. Through this article, understand the parameters to access your cybersecurity status and achieve maximum improvement.

banner image
Home ❯ Resources ❯ Articles ❯ Prevailing cybersecurity ...

Let’s talk

Ready to discuss what you're looking for? Or just have a general question? We're here to help.

Get in touch

The Wall Street Journal recently published an alarming article that noted the severe lack of federal funding for improving cybersecurity measures and infrastructure for U.S. water facilities. While water facilities don’t immediately come to mind when considering potential cyberattack targets, that very lack of visibility makes them even more vulnerable. It’s not difficult to imagine the grave harm to Americans if a water facility’s security is compromised: contamination or supply shortages come to mind.

Cyber-attacks have increased a staggering 300% since the onset of COVID-19. And since just 2019 there have been a recorded five attacks on water facilities. The threat is real; but what are we doing about it?

The Environmental Protection Agency (EPA) is responsible for overseeing all 52,000 drinking-water and 16,000 wastewater systems across the United States. As of November 2021, the EPA has not standardized cybersecurity requirements for these water facilities. Many must conduct their own risk assessments and incidence response plans.

Cybersecurity is not a “nice-to-have.” It’s a vital part of every organization.

Even though constrained budgets might prevent U.S. water facilities from making sizeable investments, there are cost-effective options available for improving cyber defense.

Analyze your cybersecurity situation with these 5 questions

  1. What is your biggest security concern as it relates to your environment?
  2. When was your last security assessment; and what did it include?
    • A strong, updated security assessment should be performed annually and include the following aspects:
      • Policy Review
      • Network Penetration Testing
      • Asset Review and Classification
      • Access Control
      • Incident Response
  3. Do you have a current incident response (IR) plan?
    • Typically, IR plans are updated every 18 to 24 months and, with the ever-changing cyber threat landscape, should be reviewed more frequently. An IR tabletop exercise is recommended at least once annually to validate the effectiveness of the plan.
  4. How realistic is your IR plan to address the risks and mitigate the impacts of a cyber-attack?
    • Here are some aspects to consider when realistically addressing your IR plan:
      • Labor resources: Do you have enough staff on hand to jump onto an identified threat?
      • Cost resources: If the cyberattack damages operations more than expected, do you have the right teams in place? If not, how much will additional contracting cost?
      • Streamlined procedures: Do you have to engage with multiple vendors/contractors? How much operational damage is being done while coordinating?
  5. On a scale of 1 – 10, how confident are you in the ability to demonstrate security compliance (1 – low; 10 – high)?
    • If you answered anywhere below 10, you should strongly consider assessing your IT environment and creating steps to improve your cybersecurity posture.
    • CAI can help you by performing an initial assessment of your IT environment and making suggestions to help you raise your cybersecurity confidence.

How to jumpstart your cyber posture

CAI understands the challenges and threats faced by America’s local infrastructure departments. We are determined to provide cost-effective cybersecurity services without sacrificing service quality and operational performance. To provide an end-to-end, flexible cybersecurity suite, CAI has teamed up with proven, experienced partners enabling us to deliver maximum value to our clients. Additionally, clients can expect cyber threats to be detected faster and incidence response to rapidly deploy to stop cyber threats before they have a significant operational impact.

Our cybersecurity service starts with an initial assessment of your IT environment and based on the findings, we prescribe only the services you need and advise you on the next steps towards protecting your department and constituents. To start your assessment, please complete the contact form, and our cybersecurity experts will reach out to you shortly.

Let's talk!

Interested in learning more? We'd love to connect and discuss the impact CAI could have on your organization.

Please correct all errors below.
Please agree to our terms and conditions to continue.

For information about our collection and use of your personal information, our privacy and security practices and your data protection rights, please see our privacy policy.