close
close

Cybersecurity incident impacts water treatment plant in Arkansas City

Last Sunday Arkansas City experienced a cybersecurity incident targeting the water treatment plantsays a press release from the city. The authorities were immediately informed and measures were quickly taken to ensure the operation of the facility.

City Manager Randy Frazer assured residents that the water supply remains safe and there have been no disruptions. “Despite the incident, the water supply remains completely safe and there have been no disruptions,” Frazer said. “Out of an abundance of caution, we have The water treatment plant has switched to manual operation while the situation is clarified. Residents can be assured that their drinking water is safe and the city is operating under full control during this time.”

Cybersecurity experts are working hard with government agencies to resolve the situation and restore normal operations at the facility. Enhanced security measures have been put in place to prevent further problems, and officials stress that No changes in water quality or service interruptions are expected.

This proactive response is designed to minimize potential threats and ensure critical infrastructure remains protected as the situation evolves. The City continues to closely monitor the incident, with public safety as a top priority.

Itay Glick, VP of Products at OPSWAT, a company specializing in cybersecurity solutions for critical infrastructure, said the incident at the Arkansas City water treatment plant highlights the evolving cybersecurity challenges facing critical infrastructure, particularly in the water and wastewater sectors. “Arkansas City's rapid transition to manual operations was critical to maintaining uninterrupted operations,” he commented, emphasizing the importance of strong cybersecurity precautions that reduce the need for such measures in the first place.

“Given the unique and largely unregulated nature of cybersecurity in the water industryit is essential for utilities to proactively implement best practices. This includes securing communication channels such as email and USB devices, using network segmentation to prevent the spread of threats in operational technology (OT) environments, and implementing strong endpoint protection.”