-
#cyberinsurance2
-
#cybersecurityinsurance2
-
#moveit1
-
#moveit hack1
-
5 Key Cybersecurity Trends of 20234
-
AI Cybersecurity Risk16
-
AI Tabletop Fail1
-
Anti-Corruption5
-
Artificial Intelligence Cybersecurity14
-
Attack Surface Areas31
-
Board of Director Cybersecurity Risk1
-
Board of Directors Cybersecurity1
-
Bots Against Us4
-
Celebrities Cybersecurity31
-
Celebrities Reputation32
-
Celebrity Cybersecurity31
-
Celebrity Reputation27
-
Celebrity Reputation and You3
-
Coronavirus Cyber Security Concerns2
-
Corprorate Cyber Security.43
-
Covid-19 + Cybersecurity2
-
Crisis Security30
-
Critical Infrastructure Cyber Risk15
-
Crypto4
-
Crypto Currency Market Meltdown3
-
Crypto Cybersecurity5
-
Cyber0
-
Cyber + Reputation Risk26
-
Cyber Reputation20
-
Cyber Reputation Control51
-
Cyber Reputation Management40
-
Cyber Reputation Risk34
-
Cyber Reputation Wealth21
-
Cyber risk0
-
Cyber Risk + Hazards1
-
Cyber Security41
-
Cyber Security Venture Capital19
-
Cyber Stalking5
-
Cyber Warfare24
-
Cyberinsurance by Digjjaks3
-
cybersecurity55
-
Cybersecurity + Reputation Management28
-
Cybersecurity for Water Utilities8
-
Cybersecurity in Time of Cyberwar11
-
Cybersecurity Insurance3
-
Cybersecurity Insurance Governance1
-
Cybersecurity of Covid-191
-
Cybersecurity of Mobile26
-
Cybersecurity Risk Vectors In Crypto7
-
Cybersecurity Trends10
-
Cybersecurity Wealth Reputation15
-
cyberwar25
-
Dalai VC1
-
Deep Fakes18
-
Developed by Digijaks6
-
Digijaks0
-
Digijaks Group Cybersecurity Insurance2
-
Digijaks Reputation Control21
-
Digijaks Services4
-
DigijaksAI0
-
Digital Defense20
-
Digital Diplomacy4
-
Digital Shield11
-
Disinformation4
-
Family Reputation Management19
-
Gov 2.013
-
Gov 3.010
-
Hack Schools1
-
Hacking Schools1
-
Hacking Unversities1
-
Identity5
-
Identity Reputation5
-
IoT Devices10
-
IoT Security30
-
Law Firm Cyber Risks3
-
Mobile Cybersecurity24
-
Navigating Privacy Security2
-
Online Reputation Control40
-
Online Reputation Management29
-
Online Reputation Security39
-
Personal Cyber security31
-
Platform/Service6
-
Quantum Computing15
-
Quantum Security4
-
Ransomware3
-
Renewable Energy Cyber7
-
Renewable Energy Reputations4
-
reputation0
-
Reputation + Cyber Risk17
-
Reputation + Cyber Risk of Quantum Computing12
-
Reputation and Cyber Personal Defenses8
-
Reputation Control36
-
Reputation Control and Management38
-
Reputation Management23
-
Reputation Management for Families15
-
Reputation Risk16
-
Reputation Security50
-
Reputation Security | Coronavirus2
-
Reputational Wealth Management21
-
School Hacking1
-
Social Engineering26
-
Social Media Cyber Security30
-
The Growing Threat1
-
US National Cyber Defense15
-
Venture Capital2
-
Venture Capital Cyber Security8
-
Wealth Repuation Cybersecurity10
-
Wealth Reputation Cybersecurity2
-
wealth security1
-
Weaponized Media7
Water Utilities Are Getting Hacked. Why?
Water Utilities are getting hacked, ransomed and breached in growing numbers in the United States. Is this because many purchased digital switches from companies providing products specifically designed to disrupt from within?
Digijaks CEO Alan W. Silberberg

Water Utilities getting hacked.
More and more every month. Sometimes it is human error. Sometimes it is technical failure. Sometimes it is really old legacy systems failing to operate well in the modern world.
Sometimes, there are more sinister forces at work, however.
Unfortunately, due to the thousands (over 147,000 total) of small to medium water utlities in the US, there is a fractured response to emerging cyber threats. The ability to respond and detect cyber attacks sufficiently varies from basically non existant to robust response.
Additionally, an untold number of public and private water utilities in the United States purchased digital switches made by a company with questionable at best security practices. Digijaks Group was engaged several years ago to help uncover the real authors and origination of software that was written by a nominal US company, that was in fact something much more sinister. They were licensing their software solutions to actual US companies, and one of them decided to dig into the code a bit.
The nominal US company that was engaged by another company to write the software for the digital switches, was actually a Russian front company. Most of the people live in Moscow. Most of the business is not in the US. Somehow they went from making websites to sell furniture to making software for digital switches almost overnight. We did an entire report on the complex issues surfaced by this investigation. At this time we cannot publish it due to confidentiality reasons, and to ensure that other water utlities do not fall victim to similar tactics.
How many other companies like this one exist in water utilities? Renewables? Batteries? Oil? Gas? Agriculture? Pharma? Do you know who you are dealing with? What kinds of due diligence do you perform on companies whose software you purchase? Basic? None? Thorough deep dive? What exactly are the Russians up to?
Again, what other industries have been targeted and penetrated?