Learning from the Oldsmar Water Treatment Attack to Prevent Critical Infrastructure Breaches

Read the original article: Learning from the Oldsmar Water Treatment Attack to Prevent Critical Infrastructure Breaches


By Tony Goulding, Cybersecurity Evangelist at Centrify The consequences of a data breach can vary greatly depending on the intention of the adversary. Some hackers simply aim to cause disruption. Others extract valuable personally identifiable information (PII) to sell on the Dark Web, while others look to extort money due to ransomware. When a cyberattack […]

The post Learning from the Oldsmar Water Treatment Attack to Prevent Critical Infrastructure Breaches appeared first on Cybersecurity Insiders.


Read the original article: Learning from the Oldsmar Water Treatment Attack to Prevent Critical Infrastructure Breaches