SCIENCE + TECHNOLOGY

Utah is prepared to handle different types of cyberattacks

May 12, 2021, 10:35 PM | Updated: May 13, 2021, 10:33 am

Utah Cyberattacks...

Signage is displayed on a fence at the Colonial Pipeline Co. Pelham junction and tank farm in Pelham, Alabama, U.S., on Monday, Sept. 19, 2016. Customers buying gasoline at grocery stores and other independent retailers may pay more than those shopping at name-brand outlets after the biggest gasoline pipeline in the U.S. sprung a leak in Alabama on Sept. 9. Colonial Pipeline Co. has proposed restarting the line on Sept. 22, according to the Alabama Emergency Management Agency. Photographer: Luke Sharrett/Bloomberg via Getty Images

The Colonial Pipeline which provides gas from the Gulf Coast to the Northeast, restarted Wednesday. On Friday, a cyberattack took them offline affecting some of its information technology systems.

The nature of the cyber attack is unclear, according to the Associated Press, including who launched it and what the motives were.

 

Chris Parker, the Director of the Division of Public Utilities for Utah, explained “some of the actual shutting down of the pipeline was preventative.”

“It wasn’t that the hackers shut the pipeline down themselves. It was that they saw the hackers in the system, and the company went and shut the pipeline down to avoid problems,” Parker said. 

Parker reassured Utah would not be affected even if the pipeline remained offline longer. 

“We are pretty well isolated from that in terms of price as well as actual physical supply,” Parker said. 

 

Utah takes steps to prevent cyberattacks 

According to Parker, utility companies in Utah employ different kinds of protections against cyberattacks. The state’s utilities provide annual briefings to the Division of Public Utilities about their cybersecurity process and plans. 

Companies like Rocky Mountain Power and Dominion Energy have systems in place to guard their data as well as their physical security, Parker confirmed. “They have layered defenses so the network that they have internally, only some of it is connected to internet-based systems,” he said. 

Companies like these spend a lot on securing all identities in the organization, so the individual logged in is actually who they say they are. This “identity security” helps them protect their data as well as their systems. 

Utah’s utility companies do extensive inspections of both the individual’s and company’s accounts. Parker explained that these are not financial audits but “…tests to see what might be compromised and what you might do in the event of a compromise.”

Different types of cyberattacks

Colonial’s hack was a ransomware hack which, in a nutshell, is “pay us enough and we’ll get out.” Parker discussed the different kinds of cyberattacks Utah’s utility companies protect themselves against.

In addition to ransomware attacks, they are concerned with data theft, denial of service attacks and the broader concern of terrorism. “The vast majority of these attacks get in through phishing attempts,” Parker said. 

Phishing attempts often look something like an email that says you need to update your password, click here, but if you click there it lets the hackers in because the email is not really from the company it purports to be from.

For example, CNN reported a Texas school district lost $2.3 million in a phishing email scam according to officials. 

According to Parker, Utah’s utility companies have “employed internal fake phishing attempts to identify the vulnerabilities in their companies. ” For example, the companies will send a fake email to 10,000 of their employees and if 500 of them fell for it they have education sessions. 

“We would go to those 500 employees and say, ‘Hey guys. Take this special class, and if you fall for this again, you might get disciplined,'” Parker said. They have sophisticated systems that are not just fortifying the networks themselves but changing the human behavior that is often the main vulnerability.

Parker is less worried about the larger utilities like Dominion Energy and Pacificorp. The damage that can be done with those utilities is much greater, but the likelihood that it will happen is much smaller because they have more robust systems in place.

“I worry about the smaller utilities that are run by less sophisticated parties. The hacker bang for the buck is also diminished, so we’re lucky in that regard,” Parker explained. 

“The challenge,” Parker believes, “is you can spend as much money as you want to on this stuff and still have vulnerabilities because it’s ever-changing.

Amanda Dickson is the co-host of Utah’s Morning News and the host of A Woman’s View on KSL NewsRadio. You can hear her weekday mornings on 102.7 FM and 1160 AM, as well as catch her talk show on Sundays. 

We want to hear from you.

Have a story idea or tip? Send it to the KSL NewsRadio team here.

Today’s Top Stories

Science + Technology

Linda Yaccarino, here in 2022, is leaving NBCUniversal amid reports that Elon Musk has selected her...

Chris Isidore

Elon Musk names NBCU ad chief Linda Yaccarino as Twitter CEO

 (CNN) — Elon Musk on Friday named longtime media executive Linda Yaccarino as the new CEO of Twitter, months after he promised to step back from the role. “I am excited to welcome Linda Yaccarino as the new CEO of Twitter!” Musk wrote in a tweet on Friday. He said she “will focus primarily on business operations, […]

12 months ago

twitter building shown, a new ceo will replace elon musk...

Chris Isidore, CNN

Twitter’s new CEO is an NBCUniversal executive with deep ad industry ties

Elon Musk confirmed that the new CEO for Twitter will be NBCUniversal’s Linda Yaccarino, an executive with deep ties to the advertising industry. “I am excited to welcome Linda Yaccarino as the new CEO of Twitter!” Musk wrote in a Friday tweet. He added that Yaccarino “will focus primarily on business operations” while Musk will […]

12 months ago

Alphabet CEO Sundar Pichai speaks at a Google I/O event in Mountain View, Calif., Wednesday, May 10...

MICHAEL LIEDTKE AP Technology Writer

Google is giving its dominant search engine an artificial-intelligence makeover

Google has disclosed plans to infuse its dominant search engine with more advanced artificial-intelligence technology.

12 months ago

Multiple facial features are placed together to create a face -- AI is being used to impersonate pe...

Curt Gresseth

How to spot a fake when AI is used in kidnapping and extortion schemes

Artificial intelligence has found its way into science, education, social media and much more. Now, AI has made its way into scams.

12 months ago

A giant A and I are pictured -- would an AI chatbot replace human interaction?...

Samantha Herrera

Combatting loneliness with AI? It may be a slippery slope

As AI technology continues getting more and more sophisticated, there's a concern that something like a chatbot could replace real social interaction.

12 months ago

tiktok logo is shown, kids' social media use is under scrutiny from health officials...

Peter Johnston

APA urges adults to limit kids’ social media use

Kids' social media use should not be without guidance and oversight from parents, an advisory from the American Psychological Association said.

12 months ago

Sponsored Articles

close up of rose marvel saliva blooms in purple...

Shannon Cavalero

Drought Tolerant Perennials for Utah

The best drought tolerant plants for Utah can handle high elevations, alkaline soils, excessive exposure to wind, and use of secondary water.

Group of cheerful team members high fiving each other...

Visit Bear Lake

How To Plan a Business Retreat in Bear Lake This Spring

Are you wondering how to plan a business retreat this spring? Read our sample itinerary to plan a team getaway to Bear Lake.

Cheerful young woman writing an assignment while sitting at desk between two classmates during clas...

BYU EMBA at the Marriott School of Business

Hear it Firsthand: 6 Students Share Their Executive MBA Experience at BYU’s Marriott School of Business

The Executive MBA program at BYU offers great opportunities. Hear experiences straight from students enrolled in the program.

Skier being towed by a rider on a horse. Skijoring....

Bear Lake Convention and Visitors Bureau

Looking for a New Winter Activity? Try Skijoring in Bear Lake

Skijoring is when someone on skis is pulled by a horse, dog, animal, or motor vehicle. The driver leads the skiers through an obstacle course over jumps, hoops, and gates.

Banner with Cervical Cancer Awareness Realistic Ribbon...

Intermountain Health

Five Common Causes of Cervical Cancer – and What You Can Do to Lower Your Risk

January is National Cervical Cancer Awareness month and cancer experts at Intermountain Health are working to educate women about cervical cancer.

Kid holding a cisco fish at winterfest...

Bear Lake Convention and Visitors Bureau

Get Ready for Fun at the 2023 Bear Lake Monster Winterfest

The Bear Lake Monster Winterfest is an annual weekend event jam-packed full of fun activities the whole family can enjoy.

Utah is prepared to handle different types of cyberattacks