Industry insights

How to strengthen the perimeter of electric utilities

What are the biggest threats to electric utilities? See how a simple 6-step plan can help you protect your perimeter and remain compliant with NERC rules.

Power grids aren’t just infrastructure — they’re the backbone of modern life. When they’re disrupted, everything from hospitals to water supplies to transportation is affected.

Global, attacks on power infrastructure are on the rise. From copper theft to cyberattacks, utilities are facing threats that are more frequent, more damaging, and harder to predict.

PORTFOLIO
Physical security designed for the energy and utilities sector
 

Key challenges impacting electric utilities today

Theft and vandalism: Critical energy infrastructure is frequently targeted for theft of copper, fuel, and equipment, leading to operational disruptions and rising maintenance costs. Remote areas are particularly vulnerable.

Sabotage and organized attacks: In politically unstable or crime-affected regions, electric infrastructure is deliberately sabotaged, transmission systems are disabled, and maintenance crews are obstructed, threatening energy reliability.

Inadequate security measures: Many facilities lack proper fencing, surveillance, or trained security personnel, increasing risks of unauthorized access and physical intrusions, especially in rural and high-risk zones.

Copper theft isn’t going away

Let’s start with copper theft — a problem that’s been around for years, but still costs U.S. businesses close to $1.5 and $2 billion annually, according to the U.S. Department of Energy.

Why copper? It’s incredibly valuable, endlessly recyclable, and in high demand for everything from plumbing and EVs to fiber optics and solar panels. With prices hovering around $5 per pound, it’s no wonder people are risking their lives to steal it.

The consequences go beyond lost materials. On December 3, 2022, two Duke Energy substations in Moore County, North Carolina, were deliberately damaged, leaving approximately 40,000 customers without power. These incidents don’t just affect infrastructure — they put entire communities in the dark, sometimes for hours or even days. In some cases, outages like these can create life-threatening situations, especially for individuals who rely on powered medical equipment.

EBOOK
Get started on the path to better security today
 

The rise of physical attacks

Copper theft is just one part of the problem. In recent years, we’ve seen a worrying trend: deliberate physical attacks on power infrastructure.

More recently, multiple substation attacks across the U.S. and Canada have triggered local outages and heightened security concerns. And it’s not just about vandalism — some incidents appear to be coordinated, suggesting a much deeper intent.

Across Latin America and Mexico, electric utilities are dealing with more break-ins, theft, and damage to their equipment. Substations and power lines are often hit by people stealing copper or fuel, and some attacks are planned by organized groups trying to disrupt service. Many of these sites are in remote areas with little security, making them easy targets.

Here’s what utilities are also up against:

  • Sabotage of pipelines and terminals
  • Wildfires and extreme weather taking out entire grid segments
  • Insider threats from employees and contractors with authorized access

The bottom line? Physical threats are getting bolder — and more costly.

New infrastructure threats affecting the renewable energy sector

As more countries, including Australia, shift to clean energy, new types of infrastructure are being built and connected to the grid. This includes solar farms and battery storage sites, which are often in remote places. These sites can be just as at risk as traditional power plants, and sometimes even more so.

At the start of 2025, more than 40% of the electricity used in Australia’s main power grid came from renewable sources like solar farms and clean power stations. These systems often depend on long power lines to send electricity across the country, including from Queensland’s solar farms to other regions.

In one example, Australia’s CS Energy was targeted by a ransomware attack in 2022 that affected its corporate network. This shows how even renewable energy providers can face serious threats.

 

Why electric utilities face supply chain cyber risks

While physical risks are visible, cyber threats often hit without warning — and they can be just as destructive. Cyber attacks can happen at any point in the supply chain, and your physical security equipment is a potential entry point to your network and critical infrastructure. That’s why it’s crucial to select partners who have your network's best interests at heart. Choosing trustworthy vendors who prioritize security is vital in preventing potential breaches and minimizing risk.

Utilities are a growing target for cybercriminals and nation-state hackers. Why? Because modern power grids run on more than wires — they rely on digital systems, sensors, and software that can be hacked, spoofed, or shut down.

Here are some of the key cybersecurity challenges currently facing the energy and utilities sector:

  • Hackers targeting operational tech (OT) and industrial control systems (ICS)
  • Phishing attacks aimed at utility employees
  • Unpatched software and vulnerable third-party vendors
  • Internet of Things (IoT) devices that open backdoors
  • And now, AI-powered attacks that can find and exploit weaknesses faster than ever

For utilities, it’s not about choosing between physical security and cybersecurity. It’s about doing both, and doing them well.

The threats to our energy systems are evolving, and so should our response. Whether it’s someone snipping copper wires or a hacker slipping through a digital crack, the impact can be huge.

Regulations designed to mitigate risk in electric utilities

North America has had a regulatory body working to protect the power grid since 1968. Today, that body is the North American Electric Reliability Corporation (NERC), a nonprofit organization whose mission is to ensure the reliability of the North American power system.

As part of its mandate, NERC has established a series of standards that enforce steps utilities can take to protect their environments and operations.

 

NERC’s systems approach to managing intruders

Instead of telling each utility exactly how to secure their stations, substations, and transfer stations, NERC offers an interpretative framework. Utilities are required to meet these enforceable standards and can tailor their compliance strategies to their specific systems and risks, often using a "defense-in-depth" approach. This method focuses on creating multiple layers of protection across large areas, rather than relying on a single strong defense.

Utilities are free to approach NERC compliance with their own strategies, as long as they abide by NERC CIP standards. It’s important to note that NERC can audit utilities at any time, and non-compliance can result in hefty fines of up to $1 million per day for each violation.

So, what does this approach involve?

It consists of six steps that utilities can implement based on their budgets and needs. The strategy includes various technologies to help prevent, discourage, or respond to unauthorized access at buildings, substations, and transfer stations. Utilities have the flexibility to decide how to best follow these steps.

GUIDE
Get your guide to NERC CIP compliance
  

6 steps to manage intruders in electric utilities

  Detect

The first step is to detect possible unauthorized intrusions beyond the perimeter. This can be done with a variety of sensors, thermal and video analytics, as well as a vehicle-centric investigation system which, which helps collect rich vehicle-based evidence and suspicious activity. One of the challenges associated with detection is that it can produce nuisance alarms. Your security platform should have a rules engine to correlate events and reduce nuisance alarms so operators are only notified of genuine threats.

  Deter

In this step, the goal is to deter unauthorized access to the utility using physical deterrents like lighting, walls, and fences, or by triggering actions from the security system. For example, it can activate strobe lights or play an MP3 on a loudspeaker. A public address system enhances this by broadcasting warnings, while a communications management system allows operators to coordinate swift responses in real-time.

  Delay

The goal here is to install security measures that delay physical access. This can include chain-link fences that are incredibly time-consuming to cut through. One of the benefits of this step is that it gives security personnel time to evaluate and properly respond to incidents.

  Assess

During this step, security operators evaluate the incident to determine what is happening and then identify the actions necessary to respond to the situation. Assessing an incident at a fence or other restricted area is much easier if security operators have “eyes on the scene.” This can include accessing nearby cameras or, in some cases, dispatching a drone to capture footage in real-time.

  Communicate

For this step, utilities need to plan how security operators will communicate with each other. Command centers must be able to share information with mobile operators, who also need to exchange updates. A communications management system helps by ensuring smooth, real-time communication between everyone involved.

  Respond

Security operators need to take the appropriate measures to apprehend an intruder. This last step is made much easier, and frequently unnecessary when the earlier steps have been followed. But, if the situation requires that security operators take action, utilities need to ensure that they have established standard operating procedures that can help guide responses.

 
Share

Related content

Energir logo
Powering innovation forward with unified security

Énergir, the main natural gas distributor in Quebec, Canada, employs over 1,500 people and has over $8 billion in assets. To keep its people and properties safe, the company upgraded to Genetec Security Center and now manages security across its sites from one single platform.  

How to choose security vendors with cybersecurity in mind

Is your ecosystem of partners cybersecurity-focused? Learn why supply chain risk assessments are critical and how to choose vendors you can trust.

Tarrant Regional Water District logo
How Tarrant Regional Water District secures its facilities

Harry Hatcher, the Physical Security Manager of Risk Management at the Tarrant Regional Water District discusses how they secure their operations with Genetec unified security.