fbpx
Search
Close this search box.

Hackers Gain Access to Florida Water Treatment Plant – Can They Gain Access to Your Organization?

Industrial pipe outside a building with old grass up front.

Last week a town in Florida made headlines when they experienced one of the biggest threats to public safety through a cyber attack. Hackers gained remote access and threatened the town of Oldsmar’s water supply by increasing the amount of sodium hydroxide, or Lye, to a deadly amount. Luckily the city’s water supply was not damaged, but the same cannot be said for the town’s reputation.

What Happened?

Many city water treatment plants use remote access software to allow administrators and members of management to access the water supply system at any time from anywhere. In Oldsmar’s case, the remote access software being used was TeamViewer. Teamviewer is a software application for remote control, desktop sharing, online meetings, web conferencing and file transfer between computers. Employees at this water plant were using a computer that is running Windows 7, which reached its end of life in January 2020. Outdated hardware and network operating systems are common amongst utility departments due to budget issues and legacy software compatibility problems.

Oldsmar’s water plant was fortunate in this event as the attacker directly took over the desktop and mouse of the station that the water plant operator was stationed at. He was able to observe the hacker scrolling through menus and adjusting the water chemical levels in real-time. This is rarely the case in a cyber attack.

How Do I Prevent Hackers From Infiltrating My Business?

The cyber threat to critical infrastructure has been increasing steadily as hackers or lone individuals better understand how to exploit operational technology in addition to IT systems. As demonstrated by this attack, foundational security activities may have mitigated this risk. The attack has shined light on the importance of maintaining a secure infrastructure.

A few recommendations on securing your infrastructure are:

  • Using Strong passwords to protect remote access tools.
  • Using Multiple Factor Authentication (MFA)
  • Ensure anti-virus, spam filters, and firewalls are up to date, properly configured and secure.
  • Train employees on the importance of cybersecurity by using Security Awareness Training, your employees can be your biggest strength and weakness when it comes to a cyber-attack.
  • Audit network configurations and isolate computer systems that can no longer be updated.
  • Keep all software and operating systems updated.

Detection is the key to prevention. Every business leader is responsible for the cybersecurity of their organization. Partnering with a cybersecurity provider like Corsica gives you access to 24/7 systems monitoring and maintenance and a team of cyber experts. If you are interested in learning more about our Cybersecurity services, please schedule a call with one of our experts here.

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

EDI Transactions and Document Types - Corsica Technologies

EDI Transactions: What It Takes To Win

EDI transactions are the lifeblood of processes like order placement, shipping, receiving, claims processing, and more. Across numerous industries, these transactions keep things moving in a way that no other technology can. In fact, you could say EDI solutions make

Read more
EDI 856 - Advance shipment notice - Corsica Technologies

EDI 856: Getting Your Advance Shipment Notices Right

Shipping and logistics get complicated when you have sensitive products and limited warehouse space. How do you ensure the warehouse is ready to receive a shipment—and ready to handle time-sensitive products appropriately? An EDI 856 document solves this problem. This

Read more
Cloud Data Integratoin: Power vs. ease of support - Corsica Technologies

Cloud Data Integration: Power vs Ease Of Support

It’s essential for cloud systems to talk to each other. If they don’t, data can become siloed, without widespread availability across the organization. But cloud systems introduce their own complexities that are different from on-premises systems. How do you choose

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.