Digital transformation has uncovered new ways in which to leverage data and improve the performance of built environments. Perhaps chief among these innovations is the integration of smart technologies and analytics with automated building management systems (BMSs), allowing buildings to become more energy efficient, more responsive, and more comfortable.
Richard Miller leads Buildings IOT's IT team to deliver managed services to smart buildings from data centers to shopping malls. He writes about cybersecurity for smart building systems, IT/OT collaboration and more.
Throughout the Coronavirus pandemic, Internet of Things (IoT) technology has provided important tools for countless industries. IoT enables doctors and other healthcare workers to diagnose and treat patients remotely, deliver vital medical equipment and medicines to remote areas, and IoT-enabled robots are even helping keep healthcare facilities clean, reducing the risk of transmission. Office buildings are turning to IoT devices to monitor air quality to prepare buildings for reopening and keep occupants safe. IoT sensors are increasingly being paired with intelligent analytics in all types of commercial buildings to improve fault detection and diagnostics to allow for remote monitoring and to minimize the need for on-site personnel.
Deployment of Internet of Things (IoT) devices in commercial buildings and the universal network connectivity of equipment is increasingly investigated and pursued by owners, facility managers, and contractors. Their impact on building automation systems can be significant, opening up opportunities for improved efficiency, better operational performance, and enhanced occupant comfort. But security concerns should be considered carefully to ensure the introduction of these technologies does not create new vulnerabilities.
In 2019, the U.S. Cybersecurity & Infrastructure Security Agency, a division of the Department of Homeland Security, issued a clear advisory about Optergy’s Proton/Enterprise Building Management System after finding that “successful exploitation of [specific] vulnerabilities could allow an attacker to achieve remote code execution and gain full system access.”