The Industrial Internet of Things FEATURE NEWS

Oil and Gas Companies at Risk of Cyber Breach

By Greg Tavarez August 09, 2022

Cybersecurity within the U.S. oil and gas industry has attracted increasing concern in recent years from a national security and infrastructure perspective as well as the potential risk of future disruptions to oil prices affecting the economy as a whole.

BreachBits analyzed oil and gas upstream, midstream, downstream and associated supply chain companies operating across the industry discovered companies in its “BreachRisk: Energy 2022” study. In the study, BreachBits ranked 59% of companies at medium risk for a cyber breach, 13% at low risk and 28% at very low risk.

“On average, the oil and gas companies we observed were at medium risk, with a score of 4.1 out of 10 on our BreachRisk scale, but that risk was not distributed evenly across the sector,” said BreachBits CEO and co-Founder John Lundgren.

BreachBits measures an organization’s BreachRisk as the likelihood of a successful breach against the potential impact to the subject.

Medium risk companies are those that a hacker would pursue, knowing there was a reasonable chance of perpetrating a successful breach over a period of three to six months. That timeline suggests a hacker is taking a quiet approach and could be much shorter with a more direct attack.

The assessment did observe two correlations between higher risk organizations and company revenue and employee base within the core population.

Companies with more than $50 million in annual revenue are at a higher risk of breach due to an increased rate of ransomware threats observed. Attackers are naturally attracted to companies with larger revenue because they believe the companies have a greater ability to pay ransoms. Attackers may also spend more time surveying companies with higher revenues because of the tendency of those companies to have larger attack surfaces.

Companies with more than 250 employees also face increased risk because of the larger number of attack vectors. Larger organizations mean greater employee anonymity, making it easier to exploit trust assumptions using social engineering tactics such as phishing or physical penetration methods. Security departments for larger companies should conduct exhaustive analyses of their attack surfaces to identify and eliminate potential risks.

“We measure cyber risk based on actual threats and viable attack vectors, not hypothetical ones, and we do that from the hacker’s perspective,” said BreachBits Chief Operating Officer and co-Founder J. Foster Davis. “That means the risks we identified in this study are the same observations being made by active cyberattackers.”

Edited by Erik Linask
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

IoTevolutionworld Editor

Related Articles

The Importance of Speed: An IoT Evolution Expo 2023 Discussion

By: Bill Yates    3/8/2023

Speed is crucial for distributed network success. At IoT Evolution Expo 2023 in Fort Lauderdale, FL, representatives from Internet of Things (IoT) sol…

Read More

Measurably Improving Workplace Efficiencies in IoT

By: Bill Yates    3/7/2023

At IoT Evolution Expo 2023 this past February in Fort Lauderdale, FL, Marcin Hasse (CEO at IoT engineering services company Softgent) came all the way…

Read More

Experience Counts Loudly: IoT/IIoT Developers Weigh In

By: Alex Passett    2/16/2023

On Tuesday at IoT Evolution Expo 2023, three expert panelists discussed IoT and IIoT and how practical industry experience matters more than it may se…

Read More

To Unlock Value from Industrial Data, AspenTech Acquires Inmation Software for AspenTech DataWorks

By: Alex Passett    2/9/2023

After its acquisition of inmation Software in October of 2022, AspenTech has now combined its AIoT Hub with inmation to create a new expanded business…

Read More

New IIoT Metaverse Experiences, Courtesy of Worlds Enterprises

By: Alex Passett    2/3/2023

In early January of 2023, Worlds Enterprises announced its latest round of successful funding in order to build out the 4D infrastructure of its World…

Read More