Why Data Analytics in Buildings Can't Be Ignored
Imagine a building where innovative management systems continuously offer simple and meaningful...
The increasing connectivity of building control systems and the growing complexity of smart buildings has drastically increased the potential for IoT cybersecurity vulnerabilities. According to a 2019 report, nearly 40% of computers used in smart buildings automation control were affected by malicious cyberattacks in the first half of the year—and cybercrime shows no signs of stopping.
Every new IoT integration is a potential back door to bypass security controls. The higher the number of such connections, the more difficult it is to develop a safe set of access control rules and diagnose cyberintrusions. Understanding common IoT cybersecurity vulnerabilities and how to address them allows you to harness the power of smart technology while safeguarding your assets.
Smart buildings with newer state-of-the-art control systems without robust security features face unique IoT cybersecurity vulnerabilities, including:
Access ControlSelective restriction of access to data and functionalities is critical for maintaining security. This includes managing restrictions on the individual user level as well as VPN configurations. |
|
Poor EncryptionData should be encrypted with multiple layers using updated WiFi protocols, and any transmission control protocol ports that are not strictly needed for operation should be closed. End-to-end encryption, multi-factor authentication, and physical tokens are among the best ways to plug security loopholes. |
|
Lack of Network SegregationKeeping IT and OT systems in a single network is a serious security risk. For example, without proper security protocols in place, bad actors could gain access to enterprise IT systems via an HVAC system. Network segregation allows you to develop a strong defense strategy that requires multiple layers of controls to be breached to gain illicit access. |
|
Cloud AttacksMany IoT devices rely on cloud-based services for functionality. Lack of proper encryption and access control to cloud data transfers increases the risk of security breaches. |
While these vulnerabilities are common, they are not inevitable. With the right technology and approach, you can create a strong cybersecurity strategy that minimizes risk while supporting operations.
Cybercrime is constantly evolving, and cybersecurity measures must continuously adapt to prevent it. But while the specific threats may evolve over time, these industry best practices that should serve as the foundation of any strategy to combat IoT cybersecurity vulnerabilities in smart buildings:
IdentificationWithout in-depth knowledge of connected devices and systems, and their potential vulnerabilities, smart buildings can not be secured. Building operators should have a complete inventory of connected devices, the systems they are connected to, and the on-site and remote access configurations to devices and the systems. |
|
ProtectionOnce all components and their associated risks have been identified, the next step is to protect the network. Isolating devices into segmented subnetworks makes it easy to define security rules for acceptable and anomalous behavior. You should also manage access according to organizational needs and industry best practices, including:
|
|
DetectionThough IT systems have antivirus or anti-malware software to detect instances when a smart building control system has been compromised, OT systems typically do not have such detection systems in place. This highlights the need to incorporate effective detection and traffic analysis capabilities in custom-designed OT systems. Additionally, OT network operators should be trained to identify cyberattacks and understand their potential impact. |
|
ResponseCreating a comprehensive cyberintrusion response plan and regularly practicing responses through structured tests helps clearly define roles and responsibilities within your organization. Your response plan should focus on investigation, containment, and mitigation of cybersecurity threats. |
|
RecoveryA recovery plan includes a system backup to recover critical data and restore OT equipment and systems in the event of a cyberattack. Your recovery plan should also involve engaging with tenants and occupants to address concerns, analyze the business impact, and understand the legal implications of such an attack. |
Buildings IOT can help you determine the IoT cybersecurity vulnerabilities in your building and develop customized strategies that protect your assets. Our end-to-end intelligent building solutions incorporate industry-leading security features at every step to ensure your property is smart and safe.
Buildings IOT offers the state-of-the-art services and products you need to overcome IoT cybersecurity vulnerabilities in your building. Contact our team of experts to learn more about what we can do for you.
Richard Miller leads Buildings IOT's IT team to deliver managed services to smart buildings from data centers to shopping malls. He writes about cybersecurity for smart building systems, IT/OT collaboration and more.
Imagine a building where innovative management systems continuously offer simple and meaningful...
Covid-19 has led building owners and developers to reimagine and transform their premises to...