Choose your language:



Hong Kong




New Zealand




United Kingdom

United States

Smart Buildings: A Perfect Storm of Vulnerability

Oct. 25, 2019

How did we get here?

Cyberattacks are increasing, and threat actors are continually evolving and looking for easy access. As IT boundaries strengthen, control systems offer a path of least resistance for these cyberthreats.

The easy access that control systems offer began with years of focus on system availability to facility engineers and open protocols to allow interoperability between various manufacturer platforms and system types. Creating ease of serviceability by vendors to reduce maintenance cost and response speed has also widened this access for attackers. In addition to hacking risks, severe contractor fragmentation and turnover creates significant inconsistencies that lead to operational risks. Together, these factors form a perfect storm of vulnerability.

This white paper looks closely at the evolution of the threat landscape, what key vulnerabilities may exist and steps you can take to increase control system security.

This white paper is the first in a series, “Building Resistance: A Look at OT, IT and Mitigating Risks.”

Download PDF

Building Resistance Series Part 1 | Smart buildings: A Perfect Story of Vulnerability