• 3 minutes Shale Oil Fiasco
  • 7 minutes "Leaked" request by some Democrats that they were asking Nancy to coordinate censure instead of impeachment.
  • 12 minutes Trump's China Strategy: Death By a Thousand Paper Cuts
  • 16 minutes Global Debt Worries. How Will This End?
  • 5 hours DUMB IT DOWN-IMPEACHMENT
  • 8 hours Greta named Time Magazine "Person of the Year"
  • 3 hours Everything you think you know about economics is WRONG!
  • 2 hours POTUS Trump signs the HK Bill
  • 2 hours Tories on course to win majority
  • 14 hours Forget The Hype, Aramco Shares May be Valued At Zero Next Year
  • 2 hours Winter Storms Hitting Continental US
  • 13 hours americavchina.com
  • 38 mins WTO is effectively neutered. Trump *already* won the trade war against China and WTO is helpless to intervene
  • 24 hours Can Renewable Natural Gas Compete With Diesel?
  • 14 hours Aramco Raises $25.6B in World's Biggest IPO
Alt Text

China Is Winning The Offshore Oil Game

China’s international presence in the…

Alt Text

Are Energy Stocks Hot Again?

The ill-performing energy sector could…

Jen Alic

Jen Alic

 

More Info

Premium Content

Oil Explorers Beware: Hackers Are Eyeing What You Know

While most would think that the risks junior oil and gas companies are taking in exploring new frontiers as far away as the remote reaches of Africa are related to government instability and conflict, another risk they face is right at home and lies right beyond their network firewalls.

Cyber security breaches are becoming more common place as the ranks of junior companies swell and take on new exploration venues with a great deal of energy. But at home their firewalls are not safe and hackers are being paid to find out what juicy exploration news is being discussed in their boardrooms. 

In Canada—home of some of the most tenacious of these exploration juniors—local media reported late last year that the internal firewall of Telvent Canada Ltd. had been breached by foreign hackers.

Related article: Malicious Software Threatens U.S. Power Plants

These hackers can represent anyone from a competitor to an organized crime group to political and environmental activists. And the information they want can be anything from preliminary exploration results, merger and acquisition talks and expansion plans to geological data and technological information. All of it is valuable. All of it is sellable.

According to Ernst & Young, most oil and gas companies don’t have high enough network security standards. This is demonstrated by the rising incidents of external cyber attacks. Some companies in the industry don’t even have a formal security framework in place. 

Everything changes with everything else, and while exploration is getting both smaller and bigger at the same time, cyber attacks are being more targeted, taking advantage of individuals who use their own electronic devices to connect to their company’s network. This is where the biggest weaknesses emerge.

Related article: Ethiopia: A Potentially Golden Block on East Africa’s Tertiary Rift

There is an accelerating trend for oil and gas companies to require their employees to use their own mobile devices for work. It’s such a trend, in fact, that it even has its own acronym: BYOD, or bring your own device. But because of the security implications this entails, analysts predict that 65% of enterprises will adopt a mobile device management solution in the next five years.

What this means is that they will need a more secure way to handle sensitive information if their employees are using their own devices, storing company information on those devices and linking up to company networks. Lines between personal and corporate data can be very blurry and this is exactly what cyber attackers are targeting.

There are other weak links, too. Smaller oil and gas exploration and production companies often require external assistance to identify opportunities in foreign countries, to network with the right people and to navigate government figures and regulations. The help they enlist creates another chink in the armor as important data is sent back and forth.

By. Jen Alic of Oilprice.com




Download The Free Oilprice App Today

Back to homepage



Leave a comment

Leave a comment




Oilprice - The No. 1 Source for Oil & Energy News
Download on the App Store Get it on Google Play