4920 Constellation Drive
White Bear Township, MN 55127-2218
firstname.lastname@example.org | 651.407.8555
While technology has become a great advantage to businesses over the years, it has also raised concerns that need to be addressed. One area where this is made crystal clear is the use of smart building technology.
Known in the industry as connected build tech, smart buildings can make systems within such as lighting, security cameras, locks and thermostats easier to control remotely. Since they are connected through cloud technology, it’s, unfortunately, a potential location for a cyberattack.
The real estate tech news website called Connected notes that connected build has become a bigger trend due to the pandemic, where hybrid workplaces have led to a greater need for remote control of a building’s attributes.
How the hacking takes place
At the same time, there have been instances of hacking that have caused some serious issues. The Target breach of 2013 started through the store’s HVAC systems, as an unlikely back door to get to customers’ private credit cars. Another high-profile instance was at Microsoft, where they told users to watch for Russian hackers who were using online printers to break into systems.
The news website Facilities notes that facility managers should be thinking proactively when it comes to systems such as these. Working with designers during either initial building or retrofitting processes is when to think about how to make those systems compatible with the Internet of Things usage for all of your technology.
Proper vetting and a strong detailed plan to install should be run through the IT department or outsourcing to ensure security is truly top-of-mind. Through the secure configuration of assets and software, authorization management, controls to access and the extensive training needed for workers, a secure building can truly stay that way even in cyberspace.
How Zero Trust systems can help
When it comes to technological security of any kind, using a Zero Trust system ensures the greatest success. Zero Trust demands that verification into a network is continuously required to gain access to its resources, so therefore no person can be trusted from inside or outside a network.
As a part of Zero Trust, location doesn’t become a factor, since internal trust privileges aren’t granted to the system assets themselves. Authorization begins before a session is used, so it becomes a built-in safeguard against hacking and other cybercrimes. It’s especially important for remote users so they can safely control cloud-based assets, not in the owner’s network boundaries.
CHIPS’ own Zero Trust solution, AppGuard, can be effective in many different business contexts. We have several webinars on tap to demonstrate AppGuard and provide more details on implementation and use for any type of business. Go to our Calendly site to see dates and times.