Energy Companies Need to Understand Their Cyber Attack Surface To Protect Against Cybersecurity Threats

 

Cyber threats targeting energy companies are on the rise, and the recent alleged attack on a Canadian natural gas company by Russian-based hacking group Zarya had many in the industry on edge. Although the group claims to have caused financial damage without loss of life, the potential for devastating outcomes in future attacks is a growing concern. What steps can energy companies take to fortify their defenses, understand their cyber attack surface and ensure the security of critical infrastructure and sensitive data?

In light of this alarming trend, it’s clear that energy companies must prioritize cybersecurity, investing in advanced technology and employee training to combat these threats. Cooperation between the private sector, government agencies, and security experts will be crucial for staying informed about potential risks and developing strategies to mitigate them. Regular software updates and stringent security protocols can also lessen the chances of a successful cyberattack. The pressing question remains: Are energy companies doing enough to protect themselves from cyber threats?

With a keen understanding of the multifaceted threats to the energy sector, Megan Samford, VP and Chief Product Security Officer of Energy Management at Schneider Electric, emphasizes the importance of comprehensively assessing one’s cyber attack surface and staying prepared for potential incidents.

 

Megan’s Thoughts:

“So when it comes to threats to the energy sector, we can really look at it from a few different angles. The first is aging infrastructure. The second is traditional natural disasters that happen every single day that the grid is used to dealing with and has been used to dealing with for over a hundred years now.

The next is the increased connectivity to the grid. We know that this means increased digitization and electrification, which is great. But increased connectivity also brings an increased attack surface. And finally, we see very targeted attacks to the energy sector as well as more opportunistic attacks like ransomware.

The targeted attacks are getting scarier; we see repeatable attack frameworks that are being used more like Swiss Army knives rather than one-in-done style malware that wasn’t able to be used across companies, across products or different sectors. And finally, what can be done about this?

The first thing is to understand your attack surface and the connections coming in and out of your network. Have an up-to-date asset inventory. On top of that, you want to have a defensible network architecture. You want to have anomaly detection so that you’re able to detect when the bad guys do get onto your network.

And finally, you want to have an incident response plan with the stakeholders that are in your supply chain that you can reach out to, to support you, as well as government contacts from CISA and the FBI that can be called upon.”

Article written by Azam Saghir.

Follow us on social media for the latest updates in B2B!

Image

Latest

technology
Clarity Under Pressure: Technology, Trust, and the Future of Public Safety
February 7, 2026

When something goes wrong in a community—a major storm, a large-scale accident, a violent incident—there’s often a narrow window where clarity matters most. Leaders must make fast decisions, responders need to trust the information in front of them, and the systems supporting those choices have to work as intended. Public safety agencies now rely…

Read More
weather Intelligence
Clarity in the Storm: Weather Intelligence, GIS, and the Future of Operational Awareness
February 6, 2026

For many organizations today, weather has shifted from an occasional disruption to a constant planning factor. Scientific assessments show that extreme weather events—including heatwaves, heavy rainfall, and wildfires—are occurring more frequently and with greater intensity, placing growing strain on infrastructure, utilities, and public services. As weather-related disruptions become more costly and harder to manage,…

Read More
AI in sterile processing
AI in Sterile Processing Is Proving Its Value by Acting as a Co-Pilot, Not a Replacement
February 5, 2026

Sterile processing departments are dealing with persistent operational pressures. Surgical case volumes are rising, instruments are more complex, and staffing shortages remain across many health systems. Accuracy and documentation requirements continue to tighten, leaving little room for error. In busy hospitals, sterile processing teams may handle 10,000 to 30,000 surgical instruments per day, with…

Read More
IC-SAT100
Meet IC-SAT100, a Satellite PTT Radio Built for the World’s Most Demanding Environments
February 5, 2026

Let’s have a look at Icom’s IC-SAT100, a satellite Push-To-Talk radio designed for moments when ordinary communication just isn’t an option. Powered by the Iridium satellite network, this rugged handheld delivers instant one-to-many communication at the push of a button—no cell towers or ground infrastructure required. Built to thrive in harsh environments, it’s waterproof,…

Read More