• 4 minutes What If Canada Had Wind and Not Oilsands?
  • 8 minutes EU Confirms Trade Retaliation Measures vs. U.S. To Take Effect on June 22
  • 17 minutes Could oil demand collapse rapidly? Yup, sure could.
  • 22 hours Tariffs to derail $83.7 Billion Chinese Investment in West Virginia
  • 2 hours Saudi Arabia turns to solar
  • 13 hours Kaplan Says Rising Oil Prices Won't Hurt US Economy
  • 7 hours Could oil demand collapse rapidly? Yup, sure could.
  • 2 hours Corruption On The Top: Netanyahu's Wife Charged With Misuse of Public Funds for Meals
  • 3 hours Battle for Oil Port: East Libya Forces In Full Control At Ras Lanuf
  • 5 hours Russia's Energy Minister says Oil Prices Balanced at $75, so Wants to Increase OPEC + Russia Oil by 1.5 mbpd
  • 8 hours Gazprom Exports to EU Hit Record
  • 4 hours U.S. Withdraws From U.N. Human Rights Council
  • 8 hours OPEC Meeting Could End Without Decision - Irony Note Added from OPEC Children's Book
  • 12 hours China’s Plastic Waste Ban Will Leave 111 Million Tons of Trash With Nowhere To Go
  • 6 hours What If Canada Had Wind and Not Oilsands?
  • 6 hours "The Gasoline Car Is a Car With a Future"
  • 57 mins EU Confirms Trade Retaliation Measures vs. U.S. To Take Effect on June 22
  • 19 hours EVs Could Help Coal Demand
  • 7 hours Sell out now or hold on?
Alt Text

Can Oil Pull Greece Out Of Poverty?

Greece’s withering economy could use…

Alt Text

The Fed Is Driving Down Oil Prices

The hawkish U.S. Federal Reserve…

Jen Alic

Jen Alic

 

More Info

Trending Discussions

Oil Explorers Beware: Hackers Are Eyeing What You Know

Oil Explorers Beware: Hackers Are Eyeing What You Know

While most would think that the risks junior oil and gas companies are taking in exploring new frontiers as far away as the remote reaches of Africa are related to government instability and conflict, another risk they face is right at home and lies right beyond their network firewalls.

Cyber security breaches are becoming more common place as the ranks of junior companies swell and take on new exploration venues with a great deal of energy. But at home their firewalls are not safe and hackers are being paid to find out what juicy exploration news is being discussed in their boardrooms. 

In Canada—home of some of the most tenacious of these exploration juniors—local media reported late last year that the internal firewall of Telvent Canada Ltd. had been breached by foreign hackers.

Related article: Malicious Software Threatens U.S. Power Plants

These hackers can represent anyone from a competitor to an organized crime group to political and environmental activists. And the information they want can be anything from preliminary exploration results, merger and acquisition talks and expansion plans to geological data and technological information. All of it is valuable. All of it is sellable.

According to Ernst & Young, most oil and gas companies don’t have high enough network security standards. This is demonstrated by the rising incidents of external cyber attacks. Some companies in the industry don’t even have a formal security framework in place. 

Everything changes with everything else, and while exploration is getting both smaller and bigger at the same time, cyber attacks are being more targeted, taking advantage of individuals who use their own electronic devices to connect to their company’s network. This is where the biggest weaknesses emerge.

Related article: Ethiopia: A Potentially Golden Block on East Africa’s Tertiary Rift

There is an accelerating trend for oil and gas companies to require their employees to use their own mobile devices for work. It’s such a trend, in fact, that it even has its own acronym: BYOD, or bring your own device. But because of the security implications this entails, analysts predict that 65% of enterprises will adopt a mobile device management solution in the next five years.

What this means is that they will need a more secure way to handle sensitive information if their employees are using their own devices, storing company information on those devices and linking up to company networks. Lines between personal and corporate data can be very blurry and this is exactly what cyber attackers are targeting.

There are other weak links, too. Smaller oil and gas exploration and production companies often require external assistance to identify opportunities in foreign countries, to network with the right people and to navigate government figures and regulations. The help they enlist creates another chink in the armor as important data is sent back and forth.

By. Jen Alic of Oilprice.com




Back to homepage

Trending Discussions


Leave a comment

Leave a comment




Oilprice - The No. 1 Source for Oil & Energy News