Utah is prepared to handle different types of cyberattacks

May 12, 2021, 10:35 PM | Updated: May 13, 2021, 10:33 am
Utah Cyberattacks...
Signage is displayed on a fence at the Colonial Pipeline Co. Pelham junction and tank farm in Pelham, Alabama, U.S., on Monday, Sept. 19, 2016. Customers buying gasoline at grocery stores and other independent retailers may pay more than those shopping at name-brand outlets after the biggest gasoline pipeline in the U.S. sprung a leak in Alabama on Sept. 9. Colonial Pipeline Co. has proposed restarting the line on Sept. 22, according to the Alabama Emergency Management Agency. Photographer: Luke Sharrett/Bloomberg via Getty Images

The Colonial Pipeline which provides gas from the Gulf Coast to the Northeast, restarted Wednesday. On Friday, a cyberattack took them offline affecting some of its information technology systems.

The nature of the cyber attack is unclear, according to the Associated Press, including who launched it and what the motives were.


Chris Parker, the Director of the Division of Public Utilities for Utah, explained “some of the actual shutting down of the pipeline was preventative.”

“It wasn’t that the hackers shut the pipeline down themselves. It was that they saw the hackers in the system, and the company went and shut the pipeline down to avoid problems,” Parker said. 

Parker reassured Utah would not be affected even if the pipeline remained offline longer. 

“We are pretty well isolated from that in terms of price as well as actual physical supply,” Parker said. 


Utah takes steps to prevent cyberattacks 

According to Parker, utility companies in Utah employ different kinds of protections against cyberattacks. The state’s utilities provide annual briefings to the Division of Public Utilities about their cybersecurity process and plans. 

Companies like Rocky Mountain Power and Dominion Energy have systems in place to guard their data as well as their physical security, Parker confirmed. “They have layered defenses so the network that they have internally, only some of it is connected to internet-based systems,” he said. 

Companies like these spend a lot on securing all identities in the organization, so the individual logged in is actually who they say they are. This “identity security” helps them protect their data as well as their systems. 

Utah’s utility companies do extensive inspections of both the individual’s and company’s accounts. Parker explained that these are not financial audits but “…tests to see what might be compromised and what you might do in the event of a compromise.”

Different types of cyberattacks

Colonial’s hack was a ransomware hack which, in a nutshell, is “pay us enough and we’ll get out.” Parker discussed the different kinds of cyberattacks Utah’s utility companies protect themselves against.

In addition to ransomware attacks, they are concerned with data theft, denial of service attacks and the broader concern of terrorism. “The vast majority of these attacks get in through phishing attempts,” Parker said. 

Phishing attempts often look something like an email that says you need to update your password, click here, but if you click there it lets the hackers in because the email is not really from the company it purports to be from.

For example, CNN reported a Texas school district lost $2.3 million in a phishing email scam according to officials. 

According to Parker, Utah’s utility companies have “employed internal fake phishing attempts to identify the vulnerabilities in their companies. ” For example, the companies will send a fake email to 10,000 of their employees and if 500 of them fell for it they have education sessions. 

“We would go to those 500 employees and say, ‘Hey guys. Take this special class, and if you fall for this again, you might get disciplined,'” Parker said. They have sophisticated systems that are not just fortifying the networks themselves but changing the human behavior that is often the main vulnerability.

Parker is less worried about the larger utilities like Dominion Energy and Pacificorp. The damage that can be done with those utilities is much greater, but the likelihood that it will happen is much smaller because they have more robust systems in place.

“I worry about the smaller utilities that are run by less sophisticated parties. The hacker bang for the buck is also diminished, so we’re lucky in that regard,” Parker explained. 

“The challenge,” Parker believes, “is you can spend as much money as you want to on this stuff and still have vulnerabilities because it’s ever-changing.

Amanda Dickson is the co-host of Utah’s Morning News and the host of A Woman’s View on KSL NewsRadio. You can hear her weekday mornings on 102.7 FM and 1160 AM, as well as catch her talk show on Sundays. 

Today’s Top Stories


space radio...
Elizabeth Weiler

USU making history with a radio entering the lunar orbit

LOGAN, Utah — Utah State University has successfully sent a radio, created by Utah State University’s Space Dynamics Laboratory into the orbit of earth’s moon.  The deep space radio is named Iris, after the Greek mythological goddess, daughter of Thaumas and Electra and messenger of the gods. The radio made its way into the orbit via a CubeSat […]
3 days ago
In this image provided by NASA, the Earth and its moon are seen from NASA's Orion spacecraft on Mon...
Jackie Wattles, CNN

NASA’s Orion reaches record-breaking distance from Earth

NASA confirmed that Orion had reached the midpoint of its uncrewed mission around the moon — about 270,000 miles (434,523 kilometers) from Earth.
4 days ago
Former US President Donald Trump's Twitter account has been reinstated on the platform....
Clare Duffy and Paul LeBlanc, CNN

Elon Musk restores Donald Trump’s Twitter account

Former US President Donald Trump's Twitter account has been reinstated on the platform.
14 days ago
With employees with the company, the future of Twitter is in uncertain. Photo credit: Justin Sulliv...
Oliver Darcy, CNN Business

Inside Twitter as ‘mass exodus’ of staffers throws platform’s future into uncertainty

With employees leaving the company, the future of Twitter is uncertain.
15 days ago
NASA's Space Launch System (SLS) rocket with the Orion spacecraft aboard is seen on Nov. 12 at NASA...
Jackie Wattles, CNN

Historic moon mission troubleshoots fuel leak issue hours before launch

The Artemis I mission to the moon could finally take place this week.
18 days ago
FILE - A Tesla owner charges his vehicle at a charging station in Topeka, Kan., Monday, April 5, 20...
Peter Valdes-Dapena, CNN Business

Tesla officially makes its charging standard available to other companies

Tesla has invited other automakers to build cars with charging ports that can work with Tesla's charging format and for other charging companies to add Tesla-style plugs to their chargers.
21 days ago

Sponsored Articles

Spicy Homemade Loaded Taters Tots...

5 game day snacks for the whole family (with recipes!)

Try these game day snacks to make watching football at home with your family feel like a special occasion. 
Happy joyful smiling casual satisfied woman learning and communicates in sign language online using...

The best tools for Deaf and hard-of-hearing workplace success

Here are some of the best resources to make your workplace work better for Deaf and hard-of-hearing employees.
Team supporters celebrating at a tailgate party...

8 Delicious Tailgate Foods That Require Zero Prep Work

In a hurry? These 8 tailgate foods take zero prep work, so you can fuel up and get back to what matters most: getting hyped for your favorite
christmas decorations candles in glass jars with fir on a old wooden table...
Western Nut Company

12 Mason Jar Gift Ideas for the 12 Days of Christmas [with recipes!]

There are so many clever mason jar gift ideas to give something thoughtful to your neighbors or friends. Read our 12 ideas to make your own!
wide shot of Bear Lake with a person on a stand up paddle board...

Pack your bags! Extended stays at Bear Lake await you

Work from here! Read our tips to prepare for your extended stay, whether at Bear Lake or somewhere else nearby.
young boy with hearing aid...

Accommodations for students who are deaf and hard of hearing

These different types of accommodations for students who are deaf and hard of hearing can help them succeed in school.
Utah is prepared to handle different types of cyberattacks