The smart grid is the biggest upgrade to the nation’s electrical infrastructure in decades, and promises to deliver electricity more reliably, intelligently, and efficiently. For customers, it means fewer power outages, faster restores, and a greater capacity to manage their energy costs and consumption. For utilities, it means an improved ability to meet escalating demand, lower operational and management costs, and use more renewable energy. Unfortunately, it also involves an increased risk of cyber attacks — and that's why cybersecurity solutions for utilities will be critical.
While some believe that more modern infrastructure would be better at fending off cyber attacks, the reality is more nuanced. According to McKinsey, there are three main drivers behind increased cybersecurity threats to the smart grid:
These realities can lead to more cyberthreats in the form of phishing, Denial-of-Service (DoS) attacks, malware that can spread into organizational servers and devices, and spoofing attacks (e.g., eavesdropping and traffic analysis).
While these are very real risks, they are not deal-breakers. Applying the same level of thought, preparation, and intelligence involved in developing smart grids to the mobile devices, applications, and networks that utilities rely on can make a big difference.
Today, mobile devices are everywhere in the utilities hemisphere. They are used by managers to communicate with field staff and share information and by field workers to perform inspections, utility control, and reporting. The introduction of the smart grid requires utilities to take smart enterprise mobility to the next level. This step will help utilities modernize how they operate and secure mission-critical data from bad actors — without interrupting processes, surpassing the budget, or creating new vulnerabilities
When considering how to best handle grid security issues with mobile technology, it’s important to think about security from several angles: secure hardware, software, and connectivity. All three are critical to your utility cybersecurity approach.
The device hardware should be locked down tightly. To ensure this requirement is met, choose mobile devices with secure cores that use hardware-rooted security in the central processing unit (CPU). This way, every time the device is booted up, it happens in a trusted state to prevent malware from tampering with the system and attacking at the firmware level.
As the operating system launches, the system should monitor every step in the process to ensure that everything happens normally. If it detects something wrong, it should shut down the unit. At that point, virtualization-based security (VBS) should isolate any authentication functions from the rest of the operating system to protect logins from attack and ensure only legitimate users can gain access.
In addition to insisting on a secure core, consider these additional cybersecurity solutions:
Mobile networks can be hacked, and when they are, it isn’t pretty. If hackers can replicate a network, they can send malware to mobile devices, steal data, and even convince users to connect to devices they control. To combat these threats, consider these utility cybersecurity solutions:
Cybersecurity for utilities requires a comprehensive approach that spans hardware, software, and communications, along with mobile devices that can accommodate the required features. That’s where TOUGHBOOK comes in. The Panasonic TOUGHBOOK® 55 is one of the world’s first secured-core PCs developed with Microsoft, making it ideal for handling mission-critical data. It also ships with a built-in infrared camera, allowing users to authenticate themselves via facial recognition — even in low light conditions.
To further combat security risks, Panasonic partners with Absolute to offer self-healing endpoint security. We embed Absolute® Persistence™ technology in the firmware of TOUGHBOOK devices, allowing organizations to maintain an unbreakable connection to all associated TOUGHBOOK devices — on or off their network. This solution provides uncompromised visibility and near real-time remediation capabilities to protect devices, data, and applications.
Pairing smart enterprise mobility with smart grid technology is the perfect solution. Together, they will help utilities provide customers with secure, reliable, efficient, and cost-effective power for years to come. For more information about mobile security solutions and how they can benefit your organization, please download our free Mobile Security playbook.