Most successful cyberattacks against utilities exploit basic, preventable weaknesses—such as default passwords and unpatched software—rather than sophisticated, zero-day vulnerabilities
To address this threat, utilities must make stringent cyber hygiene their foundational defense, recognizing it as the most cost-effective way to protect public health and economic stability
A robust cyber hygiene framework focuses on institutionalizing four core practices: regular IT/OT security assessments, mandated Multi-Factor Authentication (MFA), disciplined and prioritized patching, and recurrent, comprehensive employee training
This is why water utilities need a renewed and stringent emphasis on cyber hygiene as the foundational and most cost-effective defense, with a framework for robust cyber hygiene practices focusing on regular assessments, stringent password management, disciplined patching, and comprehensive employee training.
Water utilities, which encompass both information technology (IT) systems (such as billing and human resources) and operational technology (OT) systems (including SCADA, remote telemetry units (RTUs), and programmable logic controllers (PLCs)), present a uniquely tempting target for malicious actors. Attacks can range from data theft and financial disruption to, more critically, the manipulation of chemical levels, flow rates, and pressure systems, posing a direct threat to public safety.
While advanced persistent threats (APTs) receive substantial media coverage, evidence suggests that most successful intrusions leverage basic security failures. For example, the use of factory-set default passwords, the continued operation of software with known, unpatched vulnerabilities, and the absence of the principle of least privilege access controls frequently serve as the initial vector for compromise. This issue is often exacerbated in smaller and mid-sized utilities, which typically operate with constrained budgets and limited specialized cybersecurity expertise, resulting in a perpetual gap in their fundamental security posture.
A significant number of cyber incidents in the water sector can be categorized as a failure of basic security protocols. The challenge is multifaceted:
Smaller utilities often lack the financial and personnel resources to establish a dedicated security operations center (SOC) or hire full-time cybersecurity professionals. Security responsibilities are frequently assigned as a secondary duty to IT or OT staff whose primary expertise lies elsewhere. This leads to:
The increasing connectivity between IT and OT networks, driven by a need for efficiency and remote monitoring, introduces new pathways for attack. A successful breach of the enterprise network (IT) can now more easily pivot into the industrial control system (OT), often exploiting unsegmented or flat network architectures. Basic vulnerabilities in the IT environment thus become critical threats to operational continuity.
In response to the pervasive success of attacks exploiting basic flaws, there is a global trend among regulatory bodies and security frameworks to prioritize fundamental cyber hygiene as the essential baseline defense. This approach emphasizes consistency, repeatability, and adherence to established best practices.
A robust cyber hygiene program begins with the principle of “knowing your environment.” Regular, structured assessments are essential for both IT and OT environments.
The use of default, easily guessed, or reused passwords is one of the most common initial access vectors. Strict controls must be universally enforced:
Unpatched vulnerabilities represent exploitable weaknesses for which a solution is already known. A proactive patching strategy is non-negotiable for cyber resilience:
Technical controls alone are insufficient. The human element is the primary target of phishing, social engineering, and business email compromise attacks.
The path to a more secure water utility sector is paved not with costly, esoteric technology, but with the consistent, disciplined application of fundamental cyber hygiene. The exploitation of basic vulnerabilities poses a systemic risk to public health infrastructure. By institutionalizing the practices of regular assessments, stringent credential management (including ubiquitous MFA), disciplined patching, and comprehensive employee training, water utilities can significantly raise the barrier to entry for malicious actors.
If you’d like to learn more about how to have better cyber hygiene for your utility, reach out to Andrew Fedson at afedson@raftelis.com.