{"id":5224,"date":"2022-09-26T11:14:46","date_gmt":"2022-09-26T15:14:46","guid":{"rendered":"https:\/\/wisesecuritycompliance.com\/wp\/?page_id=5224"},"modified":"2022-09-27T09:34:20","modified_gmt":"2022-09-27T13:34:20","slug":"utilities","status":"publish","type":"page","link":"https:\/\/wisesecuritycompliance.com\/wp\/utilities\/","title":{"rendered":"Utilities"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5224\" class=\"elementor elementor-5224\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-57d99366 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"57d99366\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-narrow\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6e7220f2 ot-flex-column-vertical\" data-id=\"6e7220f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-208d5915 elementor-widget elementor-widget-text-editor\" data-id=\"208d5915\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.9.0 - 06-12-2022 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#818a91;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#818a91;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<h3 style=\"text-align: center;\">Utilities<\/h3><p class=\"p1\">Utility companies provide essential services like electricity, water, heat, gas, etc. thus becoming a major target for nation-state actors. However, if a utility company is compromised by an attack, the result can be disastrous. The attacks on municipal utilities have doubled in the last year. Attackers have increased the bandwidth and speed of the attacks thus making them much more effective. Many utility companies are unprepared for the attacks. Attackers are wanting much more than sensitive information as now many of the attacks are focusing on operational systems in order to disrupt essential services. As government agencies, the military, large companies, and banks have been strengthening their cybersecurity, attackers are looking for easier targets not yet prepared for cyberattacks. Local municipal utilities have tight budgets that make cyber security low on the list as well as having little or no training on cybersecurity practices. Utility companies are subject to many different modes of attacks including Denial of Service, Ransomware, Malware, and Phishing. <\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-244e8cbf ot-flex-column-vertical\" data-id=\"244e8cbf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58544629 elementor-widget elementor-widget-image\" data-id=\"58544629\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.9.0 - 06-12-2022 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"525\" src=\"https:\/\/wisesecuritycompliance.com\/wp\/wp-content\/uploads\/2022\/09\/electric-meters-in-a-row-measuring-power-use-elec-2021-08-26-16-56-57-utc.jpeg\" class=\"attachment-large size-large wp-image-5395\" alt=\"\" srcset=\"https:\/\/wisesecuritycompliance.com\/wp\/wp-content\/uploads\/2022\/09\/electric-meters-in-a-row-measuring-power-use-elec-2021-08-26-16-56-57-utc.jpeg 700w, https:\/\/wisesecuritycompliance.com\/wp\/wp-content\/uploads\/2022\/09\/electric-meters-in-a-row-measuring-power-use-elec-2021-08-26-16-56-57-utc-300x225.jpeg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Utilities Utility companies provide essential services like electricity, water, heat, gas, etc. thus becoming a major target for nation-state actors. However, if a utility company is compromised by an attack, the result can be disastrous. The attacks on municipal utilities have doubled in the last year. Attackers have increased the bandwidth and speed of the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_theme","meta":{"footnotes":""},"class_list":["post-5224","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/pages\/5224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/comments?post=5224"}],"version-history":[{"count":7,"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/pages\/5224\/revisions"}],"predecessor-version":[{"id":5398,"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/pages\/5224\/revisions\/5398"}],"wp:attachment":[{"href":"https:\/\/wisesecuritycompliance.com\/wp\/wp-json\/wp\/v2\/media?parent=5224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}