
Here are the most influential voices across enterprise, small business, retail, finance, nonprofit, energy and utilities, and manufacturing that IT professionals should know.
James Martin is a global connectivity product manager at Eaton. He has promoted Eaton’s software and connectivity solutions for more than 10 years and has built trusted technical adviser relationships with channel partners, field sales and sales operations.
James Martin is a global connectivity product manager at Eaton. He has promoted Eaton’s software and connectivity solutions for more than 10 years and has built trusted technical adviser relationships with channel partners, field sales and sales operations.
Cybersecurity is an urgent priority for the energy and utilities industry in 2025. Cyberattacks on U.S. utilities surged by a staggering 70% in 2024, according to data from Check Point Research, underscoring the importance of implementing comprehensive, end-to-end cybersecurity measures to protect critical infrastructure.
Historically, power management has been overlooked in most cybersecurity strategies. However, the convergence of IT and operational technology (OT) and the rise of network-connected devices supporting IT systems, such as uninterruptible power supplies (UPSs) and rack-mount power distribution units (PDUs), has forced teams to protect power systems.
These devices are crucial for backup power during outages, and they are frequently integrated into network infrastructure and edge applications to enable remote monitoring and management. As utilities enact their cybersecurity strategies for 2025 and beyond, they should prioritize protecting connected power devices from potential threats. Here are some practical strategies.
LEARN MORE: Why IT, OT and IoT convergence is top of mind this year.
With power management becoming engrained in network infrastructure, the Cybersecurity and Infrastructure Security Agency and the Department of Energy issued a public advisory stressing the importance of protecting connected UPSs and other emergency power systems. Their guidance urges organizations to adopt mitigation measures to protect these critical assets from cyberattacks.
Governing bodies such as Underwriters Laboratories and the International Electrotechnical Commission have taken steps to certify power devices for cybersecurity compliance. For utility IT managers, identifying UPSs and rack-mount PDUs with network management cards that meet UL 2900-1 and ISA/IEC 62443-4-2 standards is an effective starting point when strengthening security for power systems and mitigating potential vulnerabilities.
Click the banner below to secure your SCADA networks in an evolving threat landscape.
Beyond certifications, utilities can take a few key actions to secure their power management devices:
DIG DEEPER: Critical infrastructure companies can defend against growing cyberthreats.
Security threats are an ongoing challenge, so IT leaders need to work toward a cyber resilient posture where improving defenses is an always-on effort.
Utilities that fail to take these actions may suffer catastrophic losses. In 2024, water and wastewater plants in Texas were hit by cyberattacks. Hackers gained remote access to supervisory control and data acquisition (SCADA) systems, arbitrarily adjusting settings and controls. In Muleshoe, Texas, a water tank overflowed for 30-45 minutes before the situation was brought under control. Similar incidents have occurred in the past 12 months at major utility, energy and healthcare organizations. Each case serves as a reminder that great tools are available to help organizations protect their IT infrastructure. By adopting a comprehensive, end-to-end cybersecurity strategy, utilities can strengthen their defenses and adapt to an evolving IT landscape.
Click the banner below to learn how the energy and utilities industry is preparing for Industry 4.0.
New research from CDW can help you build on your success and take the next step.
Security
Artificial Intelligence Supports Secure DevOps
Cloud
How to Overcome 3 Key Azure Challenges
Visit Some Of Our Other Technology Websites:
Tap into practical IT advice from CDW experts
Copyright © 2025 CDW LLC 200 N. Milwaukee Avenue, Vernon Hills, IL 60061
Do Not Sell My Personal Information

More Stories
What Is Meaningful Connectivity?
Connect, Discuss, Inspire: Dive Deep with Special Interest Groups
Our Voices Are Making a Difference in the Fight for Strong Encryption