Utility outages: Are you looking at the big picture?

1 October 2019 Perimeter Security, Alarms & Intruder Detection


Nadia Veeran-Patel

“The recent cyberattack on City of Johannesburg (CoJ) systems should be ringing alarm bells in every boardroom. It was a vivid demonstration of the fact that cyber-risk threatens other important systems, like power,” she warns. “We have to start thinking about, and laying plans for, the real possibility that the whole grid is somehow compromised. Load-shedding is a controlled process, this is something quite different, and the consequences are unpredictable at best.”

The CoJ cyberattack meant that prepaid users could not purchase power, but its impact was limited to the financial systems. But what if the hackers had targeted the operational systems that control the grid, and showed their control by shutting it down? This is no fantasy: in September this year, hackers seem to have penetrated the US power grid. There was no blackout, but given the extent to which Russian hackers are probing the US power grid, and the growing emphasis on cyber-terrorism and warfare, it could happen anytime. Security experts warn that power grids are seen as a prime target for hackers.

Another important consideration is that while the US grid may prove to be a hard nut to crack, the fact that CoJ was also hacked in July this year implies that the utility does not take cybersecurity too seriously.

In addition, considering the state of Eskom’s network, if the economy does begin growing again, we will again face the spectre of the grid collapsing if anything goes wrong with the management of the load-shedding schedule.

“Companies should assess the risk of more prolonged and pervasive power blackouts, and what their response should be,” Veeran-Patel believes. “The infamous New York blackouts in 1977 and again in 2019, as well as the repeated blackouts in Venezuela, led to outbreaks of looting and the spectre of civic collapse,” she says. “A long blackout over a wide area will almost certainly result in unrest of some kind. The question is whether your organisation has prepared a plan to deal with this eventuality, and assessed the likelihood of it happening.”

Of course, this assessment would include internal plans for dealing with an extended power outage—extra generators, bigger fuel storage facilities and so on—but it also needs to take into account the state’s emergency response plans. As Veeran-Patel points out, we know they exist but how, exactly, do we rate their efficacy?

It will also be necessary to look at the impact on the organisation, paying particular attention to the domino effect: business partners, suppliers and customers will also be affected. So, too, will other utilities on which everybody depends, most notably water. No power means that reservoirs will run dry, as has already happened.

“As the Internet of Things takes off, not just power grids will get smarter, so will the water and transport grids. Greater use of IT will mean artificial intelligence can be deployed to make management of these resources more effective, but ironically will also make them more vulnerable to cyber criminals, especially as the proliferating number of sensors are unlikely to be well protected,” she concludes. “Just how resilient is your organisation, really?”




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

JVA 4-line LCD keypad
Perimeter Security, Alarms & Intruder Detection
The JVA 4-line LCD keypad is integral to the JVA Security Electric Fence product range and provides a centralised interface between the customer and their perimeter security solution.

Read more...
Gallagher’s Integrate 360 event in Durban
Gallagher News & Events Perimeter Security, Alarms & Intruder Detection
Gallagher Security held its Integrate 360 event in Durban, South Africa. The event attracted 65 channel partners, end users, and consultants from across KwaZulu-Natal and broader South Africa to showcase the latest in Gallagher’s technology suite.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Wireless security makes its mark
Perimeter Security, Alarms & Intruder Detection
Alarms have always had a wireless component since the first monitoring control room was launched, but internally, homes and companies used to install cables to connect various sensors and devices to the control panel.

Read more...
Lock it down
OPTEX Perimeter Security, Alarms & Intruder Detection
Securing wide outdoor areas presents several challenges that differ significantly from those faced in smaller, more confined environments, and choosing the right intrusion detection technology is the key to safeguarding these spaces.

Read more...
Smart, reliable detection in any conditions
OPTEX Perimeter Security, Alarms & Intruder Detection
In its discussions with companies operating in South and Southern Africa’s detection and alerting technologies market, SMART Security Solutions spoke to OPTEX for more information on its solutions and technologies.

Read more...
The unseen barrier: AI and perimeter monitoring
Verifier Perimeter Security, Alarms & Intruder Detection Surveillance AI & Data Analytics
Perimeters have been one of the most important security aspects since antiquity, but what does perimeter monitoring look like in the age of AI, CCTV, thermal detection and modern off-site surveillance?

Read more...
Surveillance on the perimeter
Axis Communications SA Hikvision South Africa Technews Publishing Editor's Choice Perimeter Security, Alarms & Intruder Detection
Cameras have long been a feature in perimeter security, with varying reports of success and failure, often dependent on the cameras’ planning, installation and configuration, as well as their integration with other perimeter solutions and centralised management platforms.

Read more...
Directory of suppliers
Perimeter Security, Alarms & Intruder Detection
The Directory of Product and Solution Suppliers for the alarm, intrusion, and perimeter markets includes details of companies that provide security and risk mitigation products, advice, and services to these verticals.

Read more...
Visual verification raises the security game
Technews Publishing Inhep Electronics Holdings Videofied SA Editor's Choice Perimeter Security, Alarms & Intruder Detection
Incorporating alarm signals with live surveillance footage, visual verification enables a human observer in a control room (onsite or offsite) to gain a clear understanding of the situation, thereby facilitating informed decision-making.

Read more...