Choose your language:

Australia

Germany

Hong Kong

India

Ireland

Netherlands

New Zealand

Singapore

Sweden

Switzerland

United Kingdom

United States

Smart Buildings: A Perfect Story of Vulnerability

Oct. 25, 2019

How did we get here?

Cyberattacks are increasing, and threat actors are continually evolving and looking for easy access. As IT boundaries strengthen, control systems offer a path of least resistance for these cyberthreats.

The easy access that control systems offer began with years of focus on system availability to facility engineers and open protocols to allow interoperability between various manufacturer platforms and system types. Creating ease of serviceability by vendors to reduce maintenance cost and response speed has also widened this access for attackers. In addition to hacking risks, severe contractor fragmentation and turnover creates significant inconsistencies that lead to operational risks. Together, these factors form a perfect storm of vulnerability.

This white paper looks closely at the evolution of the threat landscape, what key vulnerabilities may exist and steps you can take to increase control system security.

This white paper is the first in a series, “Building Resistance: A Look at OT, IT and Mitigating Risks.”

Download PDF

Building Resistance Series Part 1 | Smart buildings: A Perfect Story of Vulnerability

THINKING FORWARD