Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner.

Efficiencies made amid downturn could leave oil firms open to cyber attacks

Cyber security

Efficiency savings made amid the oil and gas downturn could be leaving firms open to cyber security attacks.

That’s according to Dorian Hindmarsh, business development manager at Proeon Systems, which designs, installs and commissions safety systems for the energy sector.

Proeon, which has a base in Aberdeen, was one of the companies set to discuss the matter at the Southern North Sea Conference in Norwich yesterday which was cancelled due to bad weather.

Mr Hindmarsh says recent savings in maintenance and a “reluctance” to adopt new technology leaves operators at a disadvantage when it comes to automated systems in pipelines and nuclear plants.

“The North Sea has often been focussing on reduction of cost more recently, which is quite probably the best thing to do. The costs offshore were significant in a competitive market so reducing them was a good idea, however they may well have overlooked a few things.

“One of the things that we’re aware of is that maintenance felt the squeeze, and how firms look after and maintain equipment has been under a lot of cost pressure.

“That might well have opened up gaps to perhaps not being the most up to date in software and hardware terms, maybe allowing things to be slipped through processes. Not putting in processes in line with cyber security, so that’s one of the big risks.

“A good management team must be aware that as they produce more and become more profitable and become a requirement for the nation they operate for, they become more of an attack target.

“The North Sea is not dead yet, they are still finding new reserves, but there seems to be a reluctance to adopt the latest technology unless it has been done before or proven before.

“Old tech is one of the easiest places to start targeting because it doesn’t have the security built around it. With more modern technology and equipment, you can build security barriers through it.”

Last month, Ciaran Martin, head of National Cyber Security Centre said UK firms in charge of critical infrastructure could face a “crippling” attack within two years.

Mr Hindmarsh says it is crucial that automated systems have the most up-to-date software available to prevent such incidents.

“One of the things that are a big risk for the North Sea is the need to investment in new infrastructure and secure infrastructure, they really need to do that. It is going to be producing for another 45 years or so.

“Whether you’re doing power distribution, running a nuclear plant, an oil platform or pulling gas back to shore, they are autonomous systems and they are often remotely accessed and controlled for monitoring and maintenance scheduling.

“These are the fabric and infrastructure of how our country and other countries function, and are just as much at risk as a laptop in a banking institute, in fact more so.”

Recommended for you

More from Energy Voice

Latest Posts