Cancel Forgot password
Blog   Security

Defense in Depth: Preventing Cyber Attacks and Data Loss

Learn how to practice defense in depth to protect your business from cyber-attacks. Create a strategy of having several layers of protection so if an attack does break through one barrier, it will be stopped at the next.

November 13 , 2017 Read More

What is Access Control and Why Do We Need It?

Develop a comprehensive access control system of role-based access, password policy, multi factor authentication, and more to protect your data. From basic to advanced systems, following the policies ensures your business is secure.

September 28 , 2017 Read More

Understanding Your Attack Surface Area

Understand your attack surface area to reduce the exposure your network, software, and human components face. If a single element is compromised, the result could be significant damage in the event of an actual threat. Control your exposure and stay ahead of cyber attackers. 

August 30 , 2017 Read More

Security Best Practices for Small Organizations

With the vast number of threats to your cybersecurity out there, there’s always a new security practice to enact. This can be incredibly overwhelming, especially for smaller organizations that lack resources or security focused staff. Here are OATI’s Top Seven Security Best Practices for entities in the energy industry.

July 17 , 2017 Read More

OATI Security Star: Manifesto

Building an effective program to protect critical solutions takes more than the review and implementation of published best practices. Learn more about our approach as defined by OATI Security Star.

June 7 , 2017 Read More

Centralized Demand Response Management Systems and Data Privacy

When it comes to harnessing DR from their Distribution Member Cooperatives, G&Ts have an interest in protecting the privacy of the Personally Identifiable Information of their member co-op end consumers. OATI shares information on data privacy and centralized demand response management systems.

April 25 , 2017 Read More

Understanding the Alleged Russian Hacking of Vermont Utility

There is a lot of confusion surrounding the alleged Russian hack on Vermont utility Burlington Electric Department. OATI took this story very seriously and, in accordance with our security policies and procedures, immediately investigated the report to determine what, if any, action OATI must take. 

January 10 , 2017 Read More

How Microgrids Can Improve Grid Security

OATI’s David Heim, Chief Strategy Officer and Microgrid Business Development, and Jerrod Montoya, Security and Compliance Counsel, discuss how microgrids can improve grid security in our latest blog post:

October 31 , 2016 Read More

Ensuring the Cybersecurity of Cloud Solutions

Many companies are turning to cloud-based, Software-as-a-Service (SaaS) solutions to manage everything from ETRM/CTRM to CVR. While these solutions afford many benefits, they can also expose your organization to increased security risks without proper execution. Here are some things to consider before purchasing:

August 29 , 2016 Read More