Published 19.01.2024

Overall situational picture of security of supply: Cold spell has had no impact on security of supply

Although the recent period of exceptionally cold weather has caused disruptions in several sectors, it has not had any impact on Finland’s security of supply. According to estimates, Finland’s electricity production and distribution capacity remain sufficient. As regards logistics, the situation in the Red Sea is being closely monitored, and authorities are urging caution over TikTok. 

The overall situational picture of security of supply compiled by the National Emergency Supply Agency (NESA) examines the challenges in the operating environment from several perspectives. The situational picture report includes an overview of different industries’ ability to function and the challenges they may face.

At present, the overall situational picture of security of supply is updated once a month, with the next situational picture report set to be published on 16 February.

The NESA releases a brief summary of the situational picture report. The details concerning industries are classified and are therefore not made public.

Situational picture on 12 January: Electricity production capacity estimated to be sufficient

The state of security of supply has not changed to any significant degree.

The recent period of exceptionally cold temperatures has caused challenges and disruptions in several sectors. However, it has had no impact on security of supply. According to estimates, Finland’s electricity production, transmission and distribution capacity remain sufficient.

The Red Sea situation is expected to impact the functioning and costs of logistics. Container freight rates have risen significantly and delivery times have grown longer.

Cyber influencing in the form of denial-of-service attacks and phishing messages, among others, remains active.

The Finnish Security and Intelligence Service (Supo) is warning people about TikTok, which collects exceptional amounts of data about mobile devices and their users. The data could end up being leaked to parties who will use them for malicious purposes.