https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2023 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Technology Advisor 101 (TA 101)
  • Events
    • Back
    • 2023 Call for Speakers
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Content Resources


Critical Infrastructure Under Attack: What MSPs can do

  • Written by Charles Cooper 1
  • March 11, 2016
The number of cyberattacks on critical infrastructure - everything from electric grids to nuclear reactors - is increasing and that presents MSPs with a big opportunity in 2016.

With more critical infrastructure companies now using cloud computing to help run their IT systems and networks, the risk of a cyber attack against a major production facility, energy plant or even a nuclear reactor is suddenly a lot more than fodder for fiction.

Not only could it happen, but it already has.

In late 2014, hackers tricked employees at a German steel mill into clicking on booby-trapped emails. The cyber attackers used the stolen password information to then penetrate the corporate networks and wreak havoc with the mill’s control systems. One blast furnace would not properly shut down, causing massive structural damage to the facility.

As more manufacturing plants, utilities and grids connect their operations to the Internet, the previously limited attack surface of these industries will offer a more fertile landscape for cyber attacks.

And it’s a huge swath of the economy. The Department of Homeland Security lists 16 critical infrastructure sectors where the assets, systems, and networks are so vital to the United States that their incapacitation or destruction would debilitate national security and safety.

To date, the worst-case scenarios have not come to pass on our shores. But the risk still exists. Late last year, for example, cyber attackers infiltrated a Ukrainian power facility’s computer system and caused a widespread power outage. Closer to home, a report surfaced in late December 2015 describing how Iranian hackers had infiltrated a New York dam control system outside of New York City two years earlier. In that instance, too, the attackers were able to gain entry via the Internet.

The incidents hinted at the potential danger as companies seek to find their footing in this fast-emerging world of networked computing and the cloud. Indeed, as more critical infrastructure organizations get connected and migrate data operations to the cloud, they will need to architect their systems to better protect against the threat of cyber breaches. Whether internal IT departments possess the deep technical skills to handle more than routine maintenance is problematic. That state of affairs will present MSPs with an opening, given the depth of their technical bench, both on the design and operational aspects of the technical process.

It’s also why the MSP Alliance earlier this year predicted that critical infrastructure was likely to become a lucrative arena for MSPs in 2016. With more critical infrastructure moving to the cloud, MSPs should be able to bring their expertise to bear and play a role securing those facilities.

In particular, MSPs are likely to find luck working with older critical infrastructure areas eager to upgrade their aging systems. Some of these industries have resisted moving core infrastructure to the cloud for a variety of reasons related to risk management and concerns about retaining physical control of their servers. But as concerns about cloud security wane, these organizations are going to be more open to a model of shared responsibility as they transfer mission-critical infrastructure functions to the cloud.

What’s more, note that according to the National Institute of Standards and Technology, the cloud is already being used within critical infrastructure. That’s where MSPs can hasten the process in what’s proving to be one of the most significant technology transitions of our era.

 

This content is underwritten by VMware and is editorially independent.

 

 

 

Tags: Agents Cloud Service Providers MSPs VARs/SIs Content Resources

Most Recent


  • Overcoming Your Endpoint Security Limitations with a Skeleton Crew
    Five Ways to Bolster Your Endpoint Security Defenses Quickly When it comes to ensuring your endpoints and networks are secure, you can’t spend long cycles onboarding and training new talent. Threats don’t wait. You need solutions that are simple to deploy, manage, and maintain. Threat actor tactics evolve quickly. Your endpoint defense must as well. […]
  • Digital experience
    Embracing the Zero Trust Mindset For Endpoints
    A paper by Charles Kolodgy of Security Mindsets LLC on the Zero Trust mindset, its evolution from concept to implementation, and how to implement a Zero Trust framework. Information technology (IT) has drastically improved business operations. It changes the nature of work. It elevates productivity, expands communications and data sharing, and frees people to work […]
  • Endpoints are the Destination
    Insight into the two components of an organization’s IT infrastructure – networks and endpoints – and how effective endpoint protection is vital in today’s threat environment in order to protect the larger network. In simple terms, an organization’s IT infrastructure consists of two components — networks and endpoints. Both are needed and both must be […]
  • How to Implement Zero Trust in Your Environment
    Guidance on how to implement nearly every component of a Zero Trust architecture in your environment. Create a Road Map: Implementing Zero Trust must be methodically planned out using a continually maturing roadmap. All aspects of the business, operations, and security considerations must be part of the plan. A defined plan focuses on the most […]

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • Service edge
    A Quantitative Comparison of UPS Monitoring and Servicing Approaches Across Edge Environments
  • Hybrid cloud administrators should define management policies procedures and job responsibilities to eliminate ambiguity and ensure theyrsquove created the most secure environment possible Establish clear rules governing cloud configuration and installation access control for sensitive data or restricted applications and reporting guidelines Identify and document what crossplatform tools are authorized as well as the access controls and encryption standards are in placenbsp
    RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment
  • Firewall
    6 Essential Features of a Modern Firewall
  • endpoint protection security
    Panda Adaptive Defense 360 Technologies: Powerful Detection, Reliable Mitigation

Upcoming Events

View all

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Channel Partners Europe

June 13, 2023 - June 14, 2023

Channel Futures Leadership Summit

October 30, 2023 - November 2, 2023

Galleries

View all

7 Channel People Making Waves This Week at 8×8, Intel, Google Cloud, RingCentral, More

January 27, 2023

Intelisys AMP’d Images: Partners Explore B2B Purchasing Trends, CX, Security Solutions

January 27, 2023

Intel Earnings ‘A Crime Scene,’ ‘Astonishingly Bad,’ ‘Historic Collapse’

January 27, 2023

Industry Perspectives

View all

Make the Most of the Gift of Time in 2023

January 25, 2023

Strong Partnerships Ease Challenging UPS Upgrade

January 24, 2023

The Advantages of Managed Networking and Security During Economic Uncertainty

January 5, 2023

Webinars

View all

Next-Generation MSP Platform: The Building Blocks for Your Business

February 15, 2023

Security Secrets of the MSP 501: How to Be a Cyber Leader in 2023

December 15, 2022
  • 1

Cybersecurity Certifications: Their Evolving Role in the Fight Against Increasing Attacks

December 13, 2022

White Papers

View all

Overcoming Your Endpoint Security Limitations with a Skeleton Crew

October 25, 2022

Embracing the Zero Trust Mindset For Endpoints

October 24, 2022

Endpoints are the Destination

October 24, 2022

Channel Futures TV

View all

Coffee with Craig and James Episode 117: Cato Networks, Video Killed the Podcast Stars

Retired Astronaut Capt. Scott Kelly Previews His CP Expo Keynote

December 21, 2022

Fusion Connect Eyes Future with Intrado UC, Managed Network Customers

September 23, 2022

RingCentral Focused on Hybrid Work, Microsoft Teams, Other Integrations

September 23, 2022

Twitter

ChannelFutures

Cybersecurity advisory warns of hackers' malicious use of #RMM. @CISACyber dlvr.it/ShYRwg https://t.co/zsBvQWqOYY

January 27, 2023
ChannelFutures

Reaction to #Intel earnings coming in fast and furious. Find out what investors are saying, and how CEO Pat Gelsing… twitter.com/i/web/status/1…

January 27, 2023
ChannelFutures

Our latest #GatelyReport looks at #cybersecurity M&A, investment with @progresspartner, @cyber_advisory, @FBI Hive… twitter.com/i/web/status/1…

January 27, 2023
ChannelFutures

.@channelsmart says plan and boost client #retention efforts to reduce #churn. dlvr.it/ShXvhj https://t.co/4jyHPCjTBn

January 27, 2023
ChannelFutures

The CEO of @Mitel discusses the likely outcomes of buying @Atos Unify. Note: @RingCentral will play a role post acq… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

.@msftsecurity surpasses $20 billion in annual revenue, analysts say it's a formidable #cybersecurity market conten… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

The adoption of cloud-based services ☁️ has spiked in the last few years and is among the top growth segments. See… twitter.com/i/web/status/1…

January 26, 2023
ChannelFutures

[email protected], @NICECXone, @lumencpp, @CiscoPartners joined @IntelisysCorp and partners for a day of marketing worksho… twitter.com/i/web/status/1…

January 26, 2023

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X