Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Oil firms’ cuts could open doors to cyber criminals

Post Thumbnail

Fears have been raised that efficiency savings made amid the oil and gas downturn could be leaving firms open to cyber security attacks.

Dorian Hindmarsh, business development manager at Proeon Systems, made the claims yesterday as he was set to discuss the matter at the Southern North Sea Conference in Norwich before it was cancelled due to bad weather.

Proeon, which has a base in Aberdeen, designs, installs and commissions safety systems for the energy sector.

Mr Hindmarsh said recent savings in maintenance and a “reluctance” to adopt new technology has left operators at a disadvantage when it comes to automated systems in pipelines and nuclear plants.

He said: “The North Sea has often been focusing on reduction of cost more recently, which is quite probably the best thing to do. The costs offshore were significant in a competitive market so reducing them was a good idea. However, they may well have overlooked a few things.

“One of the things that we’re aware of is that maintenance felt the squeeze. That might well have opened up gaps to perhaps not being the most up to date in software and hardware terms – maybe allowing things to be slipped through processes. A good management team must be aware that as they produce more – and become more profitable – they become more of an attack target.

“The North Sea is not dead yet. They are still finding new reserves, but there seems to be a reluctance to adopt the latest technology unless it has been done before or proven before. Old tech is one of the easiest places to start targeting because it doesn’t have the security built around it. With more modern technology and equipment, you can build security barriers through it.” Last month, Ciaran Martin, head of the National Cyber Security Centre, said UK firms in charge of critical infrastructure could face a “crippling” attack within two years.

Mr Hindmarsh said it was crucial that automated systems have the most up-to-date software available to prevent such incidents.

He added: “Whether you’re doing power distribution, running a nuclear plant, an oil platform or pulling gas back to shore, they are autonomous systems and they are often remotely accessed and controlled.

“These are the fabric and infrastructure of how our country and other countries function, and are just as much at risk as a laptop in a banking institute – in fact more so.”