When did you last change your login password for your personal computer? If your approach to cybersecurity is anything like mine, then it was set back when the system was brand spanking new and fresh out of the box 10 years ago. Has its operating system been updated recently? Nope, why bother updating a system or software that is used to write the occasional email or store pictures? It doesn’t house the launch codes for the country’s nuclear arsenal. We just need to keep the antivirus software current and all is well in cyberland, right?

While the examples above are a bit extreme and too focused on personal computing, for those entities looking to do harm, it is an ideal setup. And especially so in those times when a personal computer is used to remotely access a work server to access a file or send an email.

The use of digital technologies and increasing dependence on cyberstructures has exposed the oil and gas industry to new sets of vulnerabilities and threats, according to a DNV GL press release. The organization recently delivered a study to the Lysne Committee—appointed by the Norwegian Ministry of Justice and Public Security—that revealed the top 10 most pressing cybersecurity vulnerabilities for companies operating offshore Norway. The issues are equally applicable to oil and gas operations anywhere in the world.

In the list of 10, there are the well-known, like lack of cybersecurity awareness, the use of mobile devices and storage units (i.e., smart phones and flash drives) and vulnerable software. Remote work during operations and maintenance also made the list.

The vulnerability falling in the No. 10 spot is the use of outdated and aging control systems in facilities. With more than 70% of the world’s oil and gas production coming from mature fields, it is a concern of particular note.

“Many installations on the Norwegian Continental Shelf are designed to have a lifetime of between 15 and 25 years, and a number of these have been allowed to operate for longer. This means a lot of the equipment and software is outdated and not very well adapted to today’s digital vulnerabilities,” the executive summary stated. “The digitization of the sector is taking place continuously. ‘The Internet of Things’ will lead to more units with digital vulnerabilities.”

According to the release, DNV GL believes vulnerabilities can be addressed through a risk-based approach, using the bow-tie model familiar in safety barrier management. This allows companies to identify the threats to and vulnerabilities of assets and operations and plan barriers to prevent incidents and mitigate the consequences of cyberrisks.

To access the report (in Norwegian) or a brief synopsis (in English), visit dnvgl.com/oilgas/download/lysne-committee-study.html.

Contact the author, Jennifer Presley, at jpresley@hartenergy.com.