|HACKERS WANT MORE POWER & THAT INCLUDES GRIDS|
|“Parameter Security’s ethical hackers really understand the mind of a malicious attacker. I am grateful they tested us for NERC compliance because they simulated a real-life hack. I realized that being compliant doesn’t necessarily mean you’re secure.”
– Darlene McIntyre, Chief Technology Officer
Computer Hackers Threaten Power Plants with Worm
Cyber experts have discovered a malicious computer code, a worm called Stuxnet, specifically created to take over systems that control the inner workings of industrial plants. In response, the U.S. Department of Homeland Security has begun building specialized teams that can respond quickly to cyber emergencies at industrial facilities.
Computer hackers have begun targeting power plants and other critical infrastructure around the world in bold new moves to seize control of their operations…The latest computer worm, dubbed Stuxnet, was an even more alarming progression. Now hackers were creating codes actually to take over the critical systems.
Source: NewsFactor Network
Don’t Wait for the Next Dropout, Brownout or Blackout…
Myth: Compliant Means Secure
Hackers love this. They know compliance gives people a false sense of security and use this to their advantage. Why? First and foremost, hackers are smarter than any compliance regulation out there. Secondly, compliance is a low-level security effort to make people feel better. And thirdly, those that create compliance requirements aren’t offensive security professionals who understand vulnerabilities as a whole as well as hacking.
So, what does this mean? It means you need to go beyond compliance to be secure. On the flip side, if you’re secure, you’re automatically compliant.
So how can we help? Well, for starters we’re hackers – ethical ones, that is. We know the techniques and tools hackers use daily because we think and act like they do for your benefit. More importantly, we hack your employees because they are the weakest link and unknowingly offer us information that quickly and covertly gets us into the technology utility companies use. Plus, unlike your typical hacker, we help you by telling you about the information we accessed, ways we got in and how to better protect yourself by securing these vulnerabilities.
Bottom line…If you’re secure, you’re compliant and our job is to make you secure.