• About
  • Subscribe
  • Contact
Thursday, May 8, 2025
    Login
FutureIOT
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
No Result
View All Result
FutureIOT
No Result
View All Result
Home Technology Security

Are our smart buildings secure from hackers?

Ken Lim by Ken Lim
July 9, 2019
Photo by Riccardo Bresciani from Pexels

Photo by Riccardo Bresciani from Pexels

The number of smart buildings, with integrated building management technology at the core, is on the rise. The complex building automation system (BAS), which keeps occupants safe and comfortable, integrates various monitoring and control solutions such as heating, ventilation, and air-conditioning (HVAC), lighting, fire, security, networking onto a single platform. A smart building also uses data generated by IoT-enabled equipment, coupled with data gleaned from external sources, to allow for performance-enhancing, energy-saving decision making.

However, what makes a building “smart” is also what makes it vulnerable to cyberattacks. With poor security controls, compounded by the lack of global security standards, the plethora of IoT devices could be easy targets for hackers. Similarly, poorly secured wi-fi servers could be exploited.

Securing smart buildings thus takes a blended approach of risk-based planning, security architecture, technology, processes, and people skills. Such rigor, commonplace practice in IT systems, is not typical of BAS. Given the evolving threat landscape, it’s time that the strategy of protecting smart buildings keeps pace.

Protecting the Building Automation Systems

Prevention against intruder access is key to securing the smart built environment. The integrated BAS can be vulnerable to intrusions from within a corporate network. For instance, a hacker could gain access to the HVAC controls to compromise the stable environment within a laboratory thereby destroying years of research.

Ransomware attacks BAS the same way as it does other embedded controls systems. The BAS could be crippled through attacks on its operating system of the server, or by making critical files such as configuration and database files inaccessible.

It is good practice to deploy the BAS on a private network and to protect it from the Internet by a firewall. The servers should neither be used to check email, nor used to access websites that are not required for the running and management of the BAS. It’s also important to keep the systems updated with latest anti-virus software, revisions, and patches, as well as to conduct regular back-ups.

All building data needs to be encrypted at rest and in transit using industry-leading protocols. The platform itself should be protected by a regulated access control system, and data masked to restrict access to sensitive information.

Know Thy Devices

A robust endpoint security strategy in smart buildings is essential. The sheer number and variety of endpoints — mobile phones, tablets, and printers, for instance — could be targeted for unauthorized access. Email phishing and malware are usually distributed through the Internet; hence any end device that accesses the web and receives email attachments carries a degree of security risk.

Retaining control of systems and devices is equally crucial. It is important to identify and authenticate all devices and machines connected to the network. This would mitigate the risk of a hacker inserting a rogue, untrusted device into the network and taking control of any systems or machines. Strong cybersecurity solutions such as advance detection taps or strokes counts traps, recognise any forms of unknown actions, and in turn, lock down or isolate the network immediately to prevent any further damages.

Cyber-physical Security

A converged cyber-physical security application could bolster the overall security of smart buildings. This strategy relies on Artificial Intelligence (AI) to address real-time threats while keeping a check on false alarms. The analytics platform connects and combines data from internal and external sources with advanced risk algorithms to provide proactive threat protection.

By decreasing alarm “noise,” the approach allows security teams to focus attention on the highest priority events. Through this process, information is put into context and ranked by risk severity — all this to provide a complete security picture, and to deploy the right security resources on the right security priorities.

The Collaborative Factor

Cybersecurity is everyone’s responsibility - from building occupants to facilities managers. Basic cybersecurity practice such as sound password management is essential. Additional two-factor authentication to access sensitive or confidential data (for example patient database) offers stronger protection. Regular audits on security measures helps stem complacency.

The role of a facilities manager is more than about running a building. With the BAS technology now containing more IT-based hardware and software, facilities managers should collaborate with IT experts to address any cybersecurity concerns that threaten the smart built environment and, by extension, the building occupants.

No two smart buildings are exactly alike. The right system integrator takes a holistic view of the building’s systems, then designs and installs technology to support the business objectives for the building, delivering better outcomes for the occupants. The right BAS is optimized for the building to operate more efficiently and sustainably while improving comfort and safety.

It’s hard for one organization to go it alone in today’s rapid evolution of cyber threats. Industry initiatives such as the ISASecure are setting international cybersecurity standards and certification for the global ecosystem of intelligent buildings and smart city technologies.

In summary, securing smart buildings and building systems is a shared responsibility requiring focus and commitment from multiple parties. Businesses and organizations would benefit from a streamlined, multi-pronged approach that protects data, devices and manage security incidents, as well as to continually improve risk management for better overall operational efficiency.

Related:  Otis China upgrades smart factory to Industry4.0 standards
Tags: BAS technologybuilding automationbuilding automation systemISASecureJohnson Controlssmart buildings
Ken Lim

Ken Lim

Ken Lim, General Manager and Managing Director, Building Technologies and Solutions, Singapore, Johnson Controls

No Result
View All Result

Recent Posts

  • AI to fuel the rise of zero touch networks
  • Surge in ambient IoT to pave the way for sustainable tech
  • Imbibing AI skills into Singapore’s future workforce today
  • Asia Pacific's AI ambitions hinge on next-generation networks
  • Gartner urges supply chain leaders to adopt cost-to-serve model

Categories

  • Agriculture
  • AI and Machine Learning
  • Application
  • Application and Middleware
  • Automotive
  • Banking and Financial Services
  • Big Data and Analytics
  • Blockchain
  • Case Studies
  • Change Healthcare
  • CHRO
  • Cloud and Platforms
  • Commercial
  • Construction
  • Consumer
  • Customer Engagement
  • Devices
  • ESG
  • Future Workplace
  • FutureCOO
  • Governance, Standards and Regulations
  • Government, Healthcare and Education
  • Hospitality and Tourism
  • Industrial
  • Industry
  • IT-OT integration
  • Manufacturing
  • Networking
  • Operations
  • Research and Development
  • Retail and E-commerce
  • Security
  • Sensors and Instrumentation
  • Smart Cities
  • smart contracts
  • Smart Home
  • Start-ups
  • Supply chain
  • Technology
  • Telecommunications
  • TIBCO
  • Transportation and Logistics
  • Videos
  • Whitepapers

About FutureIoT

Asia’s ONLY dedicated IoT publication

The race to harness the power of Internet of Things (IoT) is here. FutureIoT is dedicated to individuals, as well as public and private organizations looking to tap the potential of IoT to transform the way we live, work and do business. FutureIoT is the dedicated media that provides the single source of truth about IoT, the technology, its application and regulation, originating from Asia. << Read more >>

Quick Links

  • Subscribe
  • Contact
  • Privacy Policy
  • Cookie Policy
  • Terms of Use

Categories

Recent News

Photo by Polina Tankilevitch: https://www.pexels.com/photo/hand-of-a-woman-showing-palm-with-a-word-no-4830656/

AI to fuel the rise of zero touch networks

May 8, 2025
Photo by John Tekeridis: https://www.pexels.com/photo/round-grey-speaker-on-brown-board-1072851/

Surge in ambient IoT to pave the way for sustainable tech

May 7, 2025
  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Technology
    • Sensors and Instrumentation
    • Devices
    • Cloud and Platforms
    • Research and Development
    • Governance, Standards and Regulations
    • Application and Middleware
    • Security
    • Big Data and Analytics
    • AI and Machine Learning
  • Industry
    • Manufacturing
    • Transportation and Logistics
    • Retail and E-commerce
    • Banking and Financial Services
    • Government, Healthcare and Education
    • Industrial
  • Application
    • Smart Cities
    • Future Workplace
    • Commercial
    • Smart Home
    • Customer Engagement
  • Resources
  • Podchats
  • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe