Over the summer, a hacker brought a 158-year-old European technology company to its knees with a guessed password. By identifying a weak admin credential, the attacker gained access to internal systems and extracted sensitive information, laying the groundwork for a broader ransomware campaign. Operations were temporarily shut down, leaving 700 employees unable to work. No firewall was breached. No vulnerability was exploited. It began, as it so often does, with human error.
Energy cybersecurity is not just about software protection —it’s also about managing human interaction and physical access to critical infrastructure.

Today, over 40% of global organizations have suffered a social engineering cyberattack. And as buildings and substations are increasingly targets because they are the backbone of our infrastructure, the most perilous threats to these systems no longer rely solely on software vulnerabilities. They exploit people, specifically what we click on, who we let in, and how we manage physical access. Our behavior has become the new battleground for energy cybersecurity. Effective cybersecurity must include badges, physical access controls, and workforce awareness as much as encryption and firewalls. Otherwise, the weakest link can be the person holding the keys.
The human perimeter
Phishing, pretexting, impersonation, and simple manipulation are often more effective than malware. In the context of digital power systems, this might involve:
- Social engineering: phishing, pretexting, impersonation
- Tailgating: following an authorized person into a restricted area
- Insider threats: employees unknowingly or maliciously compromising security
- Physical espionage: finding passwords on sticky notes left on monitors or desks
- Credential manipulation: convincing an employee to reveal passwords via email or phone
These aren’t edge cases. Many substations, smart buildings, and energy-intensive facilities are increasingly wireless-enabled. Some breakers and protection devices now offer NFC or Bluetooth capabilities for faster commissioning. A bad actor with physical access to these devices can potentially manipulate them in ways that evade traditional IT firewalls. Even something as basic as plugging in an unauthorized USB stick can wreak havoc on SCADA or EPMS systems if not properly segmented and hardened.
Physical access: The front line of energy cybersecurity
We often consider cybersecurity the domain of IT and software. But in the realm of energy management, physical access and operational boundaries are just as critical. Building Management Systems (BMS) often integrate with access control systems, monitoring who enters which rooms and when. The badges we issue, the doors we secure, and the policies we enforce all form the physical perimeter of our digital infrastructure.
Organizations should treat access badges with the same level of scrutiny as login credentials. If someone gains access to an electrical room, a server cabinet, or a master controller, they can do far more than turn off the lights. With modern connectivity, they may also compromise building systems, disable alarms, or corrupt data streams feeding into energy dashboards.
Why awareness is infrastructure
Employee training has long been a pillar of cybersecurity, but in the energy sector, it takes on new urgency. Engineers, facility managers, and service providers must all understand that their routine actions (sharing workspace photos or propping open secured doors) can become attack vectors.
Incorporating human-centric security protocols is essential. That includes:
- Routine access reviews and privilege audits
- Security awareness campaigns focused on energy operations
- Visual cues and checklists for device setup and room access
- Incident response plans that include physical intrusion scenarios
These steps may seem mundane, but they can make all the difference between operational resilience and a cascading failure.
A digital-physical feedback loop
Advanced Power Monitoring Systems (APMS) and SCADA platforms play a critical role. When configured correctly, they provide the early warning signs of a digital or physical intrusion. For example:
- Anomalous energy usage patterns can indicate compromised devices
- Extended runtime at unusual hours may flag unauthorized access
- Alarms triggered by door sensors or breaker activity can feed directly into facility dashboards
This is where cybersecurity converges with energy management. The data we collect for efficiency and sustainability is also beneficial in detecting manipulation or attack.
From policy to practice
Even the most secure system in the world won’t help if someone holds the door open for the wrong person. Organizations need a more integrated approach that recognizes cybersecurity, physical access, and human behavior as parts of a shared system. A badge should be seen as a credential. A locked door is a firewall. And a well-trained employee is as critical as an encrypted protocol.
The threat landscape has changed. Power systems are no longer isolated or immune. And as attackers become more sophisticated, so too must our defenses. It’s time we stop thinking of cybersecurity as simply code and begin recognizing it for what it is: culture, awareness, and accountability across every layer of the organization. Want more insights like this? Follow me on LinkedIn for practical perspectives on cybersecurity, digital power systems, and the human side of energy resilience.
Add a comment