Energy IT specialists have security hindered by under-performing automated tools

Next story

Energy IT Specialists are struggling to defend against cyberattacks due to underperforming automated tools. The experts can detect a security breach, however, the security tools fail to provide sufficient information.


Tripwire has released the results of a study evaluating the confidence of IT professionals in regards to efficiency of security controls, that are imperative to a cyberattack that could be in progress.

It showed that 72% of energy IT professionals believe they could detect configuration changes within hours. However, over half (52%) said their automated tools did not pick up all the necessary information, such as location or department, that could assist in the security defence against the malware.

Looking at the energy sector, it’s a case of judging how prepared they are for attacks on infrastructure and whether organisations can gather the sufficient data needed quickly enough to detect a cyberattack.

These results, on the other hand show that the industry professionals are doing the right things to secure the environment, and it is in actual fact the lack of digital automated tools that could allow for a cyberattack to take hold.

Mark James, ESET IT Security Specialist, explains the study further and advises on the steps that organisations can do to fend off attacks.

“Due to the infrastructure of the energy sector, it often takes a beating when it comes to protecting its environment, as cost is always a big factor.

“Sadly, the unusually large footprint that this sector often occupies, it can make it harder to protect the perimeter from attack.

“It is not like any other cyberattack, so being prepared and looking at attack methods and determining which could affect you. Alongside the necessary training and support in modern methods, and what to look out for will help to keep you ahead in terms of detection.

“Security of course has to be implemented in multiple layers, but there is no single magic bullet. So identifying the risks, laying down security measures, and then having plans in place to detect, counter, and suppress any attacks that get through, will be the course of action.

“All the help and procedures are in available for rapid detection and response, the problem is knowing what and where you need it.

Do the statistics from this survey shock you? We’d love to hear your opinion via our Twitter @ESETUK

Join the ESET UK LinkedIn Group and stay up to date with the blog. If you’re interested in seeing where ESET has been featured in the news then check out our ‘In the news’ section.