{"id":7461,"date":"2023-03-24T19:58:53","date_gmt":"2023-03-24T19:58:53","guid":{"rendered":"https:\/\/www.cyberdegrees.org\/?p=7461"},"modified":"2023-03-24T19:58:53","modified_gmt":"2023-03-24T19:58:53","slug":"cybersecurity-in-energy-sector","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-energy-sector\/","title":{"rendered":"Cybersecurity in the Energy Sector"},"content":{"rendered":"<p>The U.S. and global economies depend on energy to make nearly every facet of modern life possible.<\/p>\r\n<p>Without reliable access to energy, manufacturing, agriculture, transportation, and other key components of the economy would quickly grind to a halt. Natural gas, oil, coal, and renewable energy sources all rely on cybersecurity.<\/p>\r\n<p>According to a <a href=\"https:\/\/cdn.bfldr.com\/JKMTPY1Y\/at\/hshw6ph9bgvmp6b67t5bxk3\/lookout-energy-tr-us.pdf\" target=\"_blank\" rel=\"noopener\">Lookout threat report<\/a>, 17.2% of all mobile cyberattacks target energy companies, which makes the energy industry the largest target for cybercriminals and hacktivists.<\/p>\r\n<p>Cybersecurity techniques, tools, and professionals help keep the energy sector secure in various ways. Some of the energy industries that rely on cybersecurity include extraction, production\/generation, distribution, and consumption.<\/p>\r\n<p>This guide explores the role of cybersecurity in the energy sector. We discuss how cybersecurity protects energy industries, common vulnerabilities, emerging opportunities, and potential security impacts to the future of energy.<\/p>\r\n\r\n\r\n\r\n<h2>How Cybersecurity Protects Energy Industries<\/h2>\r\n<p>Energy companies need <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">cybersecurity professionals<\/a> and their skills to protect their product at various points in the energy pipeline. Security needs may shift depending on whether an organization is local or national, public or private.<\/p>\r\n<p>Energy companies can be vulnerable to cyberattacks that cause sharp price increases for consumers. In 2021, a cyberattack involving ransomware shut down <a href=\"https:\/\/www.reuters.com\/technology\/colonial-pipeline-halts-all-pipeline-operations-after-cybersecurity-attack-2021-05-08\/\" target=\"_blank\" rel=\"noopener\">Colonial Pipeline<\/a>, the biggest pipeline operator in the U.S. and supplier of half of the East Coast's fuel.<\/p>\r\n<p>This incident drew attention to the sector's vulnerability to hacking. Weeks prior to the attack, Colonial Pipeline had a cybersecurity management <a href=\"https:\/\/www.cnn.com\/2021\/05\/12\/tech\/colonial-pipeline-cyber-security-manager-job-search\/index.html\" target=\"_blank\" rel=\"noopener\">job vacancy<\/a>, a position still empty at the time of the ransomware attack. Reports credit an <a href=\"https:\/\/www.govtech.com\/sponsored\/back-to-basics-a-deeper-look-at-the-colonial-pipeline-hack\" target=\"_blank\" rel=\"noopener\">inactive VPN<\/a> as the weakness that allowed the attack.<\/p>\r\n<p>In an <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa22-103a\" target=\"_blank\" rel=\"noopener\">April 2022 alert<\/a>, the U.S. government warned energy companies that they were at high risk of cyberattack and hacking from custom-made malware.<\/p>\r\n<p>The bulletin urged the energy sector to take various cybersecurity precautions, including enabling multi-factor authentication and consistently changing all passwords on their systems and devices.<\/p>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"vulnerabilities-opportunities\" id=\"vulnerabilities-opportunities\"><\/a>\n\n \r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-2 gap-5 my-8\"> \n  \r\n<div class=\"bg-primary-light rounded-lg border-thin py-1 px-6 mb-6\">\r\n<h3>Common Vulnerabilities<\/h3>\r\n<p>Below, we list some <a href=\"https:\/\/www.cyberdegrees.org\/resources\/most-common-cyber-attacks\/\">common vulnerabilities<\/a> and emerging opportunities for cybersecurity in the energy industry.<\/p>\r\n<h3 class=\"text-primary-800\">Ransomware Attacks:<\/h3>\r\n<p>One of the biggest threats to the energy industry, ransomware attacks happen when cybercriminals use malware that blocks an organization's access to its own data, or threatens to leak sensitive information unless the company agrees to pay a ransom fee.<\/p>\r\n<p>The industry can minimize damage from ransomware attacks by creating robust incident management response plans and taking precautions to secure computer systems upfront.<\/p>\r\n<p>Hackers using ransomware against Norwegian green energy solutions supplier Volue Technology caused <a href=\"https:\/\/www.securityweek.com\/green-energy-company-volue-hit-ransomware\" target=\"_blank\" rel=\"noopener\">disruptions for customers in 44 countries<\/a>.<\/p>\r\n<h3 class=\"text-primary-800\">Mobile Phishing:<\/h3>\r\n<p>The energy industry is very vulnerable to mobile phishing threats. A <a href=\"https:\/\/cdn.bfldr.com\/JKMTPY1Y\/at\/hshw6ph9bgvmp6b67t5bxk3\/lookout-energy-tr-us.pdf\" target=\"_blank\" rel=\"noopener\">2021 report from Lookout<\/a> found a 161% increase in phishing attacks against energy employees between the second half of 2020 and the first half of 2021.<\/p>\r\n<p>Employees in the energy sector use mobile devices that contain very sensitive information. Cybercriminals can penetrate an organization's computer network by using phishing emails and texts, websites, and login pages.<\/p>\r\n<p>Energy companies are addressing this threat by training their employees to adopt best practices and spot phishing attempts.<\/p>\r\n<h3 class=\"text-primary-800\">Supply Chain Attacks:<\/h3>\r\n<p>Supply chain attacks happen when cybercriminals get unauthorized access to a company's computer networks via a third-party vendor. Third-party vendors may have less robust cybersecurity protocols than the energy companies they contract with.<\/p>\r\n<p>The energy industry can address this issue by requiring third-party vendors to adopt cybersecurity best practices that include effective incident response plans.<\/p>\r\n<\/div>\r\n\r\n<div class=\"bg-secondary-light rounded-lg border-thin py-1 px-6 mb-6\">\r\n<h3>Emerging Opportunities<\/h3>\r\n<h3 class=\"text-secondary-light\">Industry-Wide Action:<\/h3>\r\n<p>The World Economic Forum highlights the importance of <a href=\"https:\/\/www.weforum.org\/agenda\/2022\/11\/cybersecurity-energy-sector-trust-value-chain\/\" target=\"_blank\" rel=\"noopener\">energy companies working together<\/a> to combat cyberattacks. Traditionally, each energy company created its own policies and procedures related to cybersecurity.<\/p>\r\n<p>However, individual organizations benefit from combining forces to develop cybersecurity best practices, plans, and processes. This is increasingly important as energy systems become more interconnected and interdependent.<\/p>\r\n<h3 class=\"text-secondary-light\">Proactive Approach to Cyber Threats:<\/h3>\r\n<p>Instead of taking a reactive approach to cyberattacks once they happen, the energy industry can adopt a proactive approach to identifying potential threats.<\/p>\r\n<p>This includes emphasizing the importance of cyber resiliency as a <a href=\"https:\/\/www3.weforum.org\/docs\/WEF_Board_Principles_Playbook_Oil_and_Gas_2021.pdf\" target=\"_blank\" rel=\"noopener\">core operational value<\/a> for energy companies and their executives.<\/p>\r\n<h3 class=\"text-secondary-light\">Government Interest in Helping:<\/h3>\r\n<p><a href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\"> Governments recognize<\/a> that cybersecurity threats and attacks on the energy industry can greatly <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\">impact their citizens<\/a>.<\/p>\r\n<p>It is not hard to imagine a scenario where cyberterrorism is used against a country's power system, causing a national security issue. In 2022, the Department of Energy pledged to spend <a href=\"https:\/\/www.energy.gov\/articles\/doe-announces-12-million-enhance-cybersecurity-americas-energy-systems\" target=\"_blank\" rel=\"noopener\">$12 million<\/a> to help improve cybersecurity in the energy sector.<\/p>\r\n<\/div>\r\n\n<\/div>\n\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-transportation-sector\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn how cybersecurity protects the transportation sector<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-healthcare\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">How is cybersecurity used in the healthcare industry?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/cybersecurity-financial-services\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover how financial services rely on cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<\/div>\n\r\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"energy-industry\" id=\"energy-industry\"><\/a>\n\n \r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h2>Which Energy Industries Rely on Cybersecurity?<\/h2>\r\n<p>Energy is one of the most promising <a href=\"https:\/\/www.cyberdegrees.org\/resources\/best-industries-cybersecurity\/\">industries for cybersecurity professionals<\/a>. As cybercriminals focus more of their attacks on energy, opportunities for cybersecurity workers will likely increase.<\/p>\r\n<p>The energy industry encompasses everything directly or indirectly related to producing or supplying energy. It includes both renewable and nonrenewable energy resources.<\/p>\r\n<p>The extraction, production\/generation, distribution, and consumption energy sectors can all benefit from cybersecurity professionals, <a href=\"https:\/\/www.cyberdegrees.org\/resources\/hot-technologies-cyber-security\/\">techniques, and tools<\/a>.<\/p>\r\n\r\n\r\n<h3>Extraction<\/h3>\r\n<p>Energy extraction refers to the process of taking raw materials from nature that can be turned into fuel to create power. Examples of extractive energy sectors include oil and gas drilling, and coal mining.<\/p>\r\n<p>Energy exploration is a precursor to extraction, in which companies search for and find energy sources like oil and gas.<\/p>\r\n<p>Important cybersecurity roles for the energy extraction sector include <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-director\/\">security director<\/a> and <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-specialist\/\">security specialist<\/a>.<\/p>\r\n\r\n\r\n<h3>Production\/Generation<\/h3>\r\n<p>The energy production and generation sector takes the raw materials extracted from the earth and turns them into usable energy. The energy production and generation sector involves companies that refine renewables, as well as fossil fuels like oil and coal.<\/p>\r\n<p>The energy production sector is vulnerable to ransomware attacks. <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-consultant\/\">Cybersecurity consultants<\/a> and <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\">information security analysts<\/a> may be especially critical to the energy production industry.<\/p>\r\n\r\n\r\n<h3>Distribution<\/h3>\r\n<p>The energy distribution sector focuses on getting power to the places and people that need it. It includes pipelines that collect and transport oil and natural gas.<\/p>\r\n<p>The energy distribution sector is vulnerable to ransomware attacks and phishing attacks. The <a href=\"https:\/\/www.cisa.gov\/pipeline-cybersecurity-initiative\" target=\"_blank\" rel=\"noopener\">Pipeline Cybersecurity Initiative<\/a> identifies key vulnerabilities for the oil and natural gas pipeline industry.<\/p>\r\n<p>Important cybersecurity positions for the energy distribution sector include <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/incident-responder\/\">incident responder<\/a> and <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/vulnerability-assessor\/\">vulnerability assessor<\/a>.<\/p>\r\n\r\n\r\n<h3>Consumption<\/h3>\r\n<p>The energy consumption sector consists of the companies that deliver the energy to businesses and consumers. It includes utility companies.<\/p>\r\n<p>Cybersecurity professionals that can help the energy consumption industry include information security analysts and <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-consultant\/\">security consultants<\/a>.<\/p>\r\n\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/\">Learn more about working in cybersecurity<\/a><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><a href=\"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/\">Explore government cybersecurity jobs<\/a><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><a href=\"https:\/\/www.cyberdegrees.org\/resources\/careers-for-vets\/\">Find cybersecurity careers for veterans<\/a><\/span><\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1222B6\" size=\"medium\" icon=\"plus\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"plus\" data-color=\"#1222B6\">\r\n<span class=\"text-base\"><a href=\"https:\/\/www.cyberdegrees.org\/resources\/transitioning-from-general-it\/\">Transition from general IT to cybersecurity<\/a><\/span><\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n\n    <\/div>\n<\/section>\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"future\" id=\"future\"><\/a>\n\n \r\n<h2>The Future of Energy Demands Greater Security<\/h2>\r\n<p>The energy sector will need more security to ensure reliable power delivery. Due to its economic and national security importance, cybercriminals will likely continue to see the energy industry as a good target.<\/p>\r\n<p>There is already an urgent need for general cybersecurity experts. The <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener\">Bureau of Labor Statistics<\/a> projects a 35% growth (much faster than average) in demand for information security analysts between 2021 and 2031.<\/p>\r\n<p>Cybersecurity in the energy industry is already a crucial issue. As cyberattacks on the energy sector continue to increase, cybersecurity professionals can likely expect an excellent job outlook in the coming years.<\/p>\r\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n \r\n<h2 class=\"text-center\">Get an Education in Cybersecurity<\/h2>\r\n  \n\n  <section class=\"cards pt-2 pb-12 lg:pt-16 lg:pb-20 relative text-center text-gray-700 \" data-cy=\"cards\">\n    <div class=\"bg-full-width absolute top-0 right-1\/2 left-1\/2 block h-full w-screen -mr-1\/2vw -ml-1\/2vw bg-quaternary-700 \"><\/div>\n    \n    <div class=\"grid grid-cols-1 gap-4 md:grid-cols-2 lg:grid-cols-4\">\n        \r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1147195672-425x230-c-default.jpg\"\n        alt=\"Cybersecurity Degree Program Guide\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Cybersecurity Degree Program Guide<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1189460942-425x230-c-default.jpg\"\n        alt=\"Top Degree Programs in Cybersecurity\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Top Degree Programs in Cybersecurity<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/top-schools\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/shutterstock_696885817-425x230-c-default.jpg\"\n        alt=\"A Guide to Cybersecurity Certifications\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">A Guide to Cybersecurity Certifications<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/resources\/certifications\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n<div class=\"cards-item bg-white flex flex-col justify-start mt-0 overflow-hidden rounded shadow\" data-cy=\"cards-item\">\n  <img decoding=\"async\"\n          src=\"https:\/\/www.cyberdegrees.org\/wp-content\/uploads\/2020\/10\/GettyImages-1200908449-425x230-c-default.jpg\"\n        alt=\"Best Cybersecurity Bootcamps\"\n  \/>\n  <div class=\"cards-item__content h-full flex flex-col p-6\">\n    <h4 class=\"cards-item__title\">Best Cybersecurity Bootcamps<\/h4>\n    <div class=\"flex flex-col\">\n      <p class=\"cards-item__text text-xs leading-5\"><\/p>\n          <\/div>\n    <div class=\"flex mt-auto flex-col justify-between\">\n      <a class=\"sonic-btn large w-full md:w-max mx-auto bg-secondary-700 uppercase\" href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\">\n        Learn More\n      <\/a>\n    <\/div>\n  <\/div>\n<\/div>\n\r\n\n    <\/div>\n\n    \n  <\/section>\n\n\n\n\r\n\r\n<sonic-editorial-listings degree=\"\" category=\"\" subject=\"\" limit=\"3\"><\/sonic-editorial-listings>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n \r\n<h2>FAQ About Cybersecurity and the Energy Sector<\/h2>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">How crucial is cybersecurity to the energy sector?<\/mark><\/h3>\r\n            <p>Very crucial. Energy is one of the industries most vulnerable to cyberattacks. Because energy is so crucial to the global economy, cybersecurity in the energy sector is incredibly important.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">Which energy industries need cybersecurity the most?<\/mark><\/h3>\r\n            <p>Cybersecurity is increasingly important in many energy industries. A 2020 article by global management consulting firm <a href=\"https:\/\/www.mckinsey.com\/capabilities\/risk-and-resilience\/our-insights\/the-energy-sector-threat-how-to-address-cybersecurity-vulnerabilities\" target=\"_blank\" rel=\"noopener\">McKinsey &amp; Company<\/a> reported that gas and electric-power companies are particularly at risk.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">What is the biggest threat facing the distribution of energy?<\/mark><\/h3>\r\n            <p>The biggest threats to the distribution of energy include cyberattacks, extreme weather, and wildlife.<\/p>\r\n        <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>\r\n<div class=\"ml-1\">\r\n    <ul class=\"border-secondary-light border-dotted rounded-lg py-1\">\r\n        <li>\r\n            <div class=\"bg-secondary-dark shadow-lg w-9 h-8 flex absolute justify-center rounded-full ml-1 mr-9 \">\r\n                <sonic-icon color=\"#ffffff\" icon=\"question-mark-circle\" class=\"items-center pt-5\"><\/sonic-icon>\r\n            <\/div>\r\n            <div class=\"mr-10 ml-10\">\r\n            <h3><mark style=\"background-color: #e7f0fc\">Can cyberattacks happen at utility companies?<\/mark><\/h3>\r\n            <p>Yes, cyberattacks can happen at utility companies. In fact, in its <a href=\"https:\/\/www.moodys.com\/research\/Moodys-Cyber-Heatmap-Cyber-Risk-Is-Rising-Across-70-Global--PBC_1343021\" target=\"_blank\" rel=\"noopener\">Cyber Risk Heat Map Report<\/a>, Moody's identified utility companies as the most vulnerable to cyberattacks. Utility companies often take minimal risk mitigation measures, making them attractive targets.<\/p>\r\n                <\/div>\r\n        <\/li>\r\n    <\/ul>\r\n<\/div>","protected":false},"excerpt":{"rendered":"Cybersecurity preparedness is crucial for protecting the energy industry from attacks. Learn about the importance of cybersecurity in the energy sector.","protected":false},"author":41,"featured_media":7471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"templates\/template-dcs.php","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[33],"degrees":[],"jobs-overview":[],"rankings":[],"class_list":["post-7461","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","resources-overview-all"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=7461"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/7461\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/7471"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=7461"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=7461"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=7461"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=7461"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=7461"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=7461"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=7461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}