Uniting the Physical and the Digital

Uniting the Physical and the Digital

Businesses are now choosing the cloud and IoT-based technologies

As the Internet of Things (IoT) becomes mainstream, companies are delving into the ramifications of adoption, including its benefits, challenges, and opportunities--not least, the implications to security and cybersecurity. Many see IoT solutions as a way to increase efficiency and reduce costs while providing new avenues for development and modernization for buildings.

Therefore, many businesses are now choosing to use cloud-and IoT-based technologies throughout their properties, including building management systems which integrate data on lighting, physical security, workplace wellness, HVAC and other systems into one display, and smart devices like power quality meters, digital power meters, and smart circuit breakers.

IoT Adoption
Over the past few years, the adoption of IoT technologies has increased at a rapid pace. And rightly so: the International Facility Management Association (IFMA) estimates that with active controls and IoT-enabled technology, properties can expect a 50 percent increase in cost efficiency, including maintenance, energy, and other recurring costs. Incorporating IoT capabilities into facilities enables building managers to implement analytics and even predictive maintenance, allowing facilities to operate as efficiently as possible while also helping to reduce the overall operating expenditures and maintenance costs.

But in order to ensure that this continued growth is sustainable, facility managers and owners alike must address increasing concerns about IoT security, developing effective strategies to protect building data, collected via the IoT and connected devices, from outside threats.

As smart buildings become equipped with AI and digital IoT technologies, they are better able to identify and implement efficiencies (particularly in the areas of sustainability, energy efficiency and operating costs), extend the performance and longevity of building infrastructure assets, and improve the experience, comfort, and productivity of building occupants.

Smart devices allow facility teams to gain unparalleled access to the entire operating environment and allow for measuring and collecting data, as well as providing functional control. By incorporating smart devices, not only are these systems monitoring equipment performance and sharing alarms on threats to reliability or efficiency, they make it possible to measure communications and electrical data and other parameters at key points throughout a facility’s power network, from the main utility to individual plug loads.

This capability also extends to the facilities lighting and security platforms, enabling tighter integration which historically has not been possible, while also increasing security staff effectiveness through automated deterrent actions, increased situational awareness and deeper reporting capabilities.

However, breaches of building systems or sensitive data can cost millions in regulatory penalties, disrupt core business functions, and threaten business reputations to a level that could impair consumer, employee, and investor confidence. Because of this, it is critically important that the systems of today, which will carry forward for years to come, be designed and deployed with a keen eye on cybersecurity and data protection.

There are many benefits that smart buildings can provide while simultaneously mitigating cybersecurity risks. Building owners, operators and even occupiers need to understand the way smart building control systems are architected and managed from a cybersecurity perspective to capture the full benefits of intelligent buildings.

Protecting Buildings Against Digital Threats
In order to secure buildings after implementing IoT-based systems, IT teams will need to implement similarly IoT-based cybersecurity solutions in order to thwart digital attacks. Adoption can include the use of encryption and multi-step authentication to protect communications between workstations, controllers, and mobile devices.

Deploying systems which start their development cycle with a focus on securing by design and leverage the latest in encryption are important factors that today's building designers and operators should take into consideration. Designers can no longer say that the security of the technology installed is the responsibility of the network which they reside on.

The best approach is to focus on built-in security. Having a comprehensive system that has a process to design, build, manufacture, and deliver solutions that are based largely on ISO 27034 cybersecurity standards and ISO 9001:2015 is key.

These help ensure that cybersecurity is not an afterthought, but is a critical fundamental aspect of the development cycles and incorporated from the outset, then managed and measured throughout the entire product development process, from concept to decommissioning. Saying that something is designed with cybersecurity in mind is important, but it is even more crucial to have dedicated cybersecurity test labs where platforms can be thoroughly tested and even include third-party validation.

For example, a team that uses leading open source and commercial grade cybersecurity tools along with in-house technologies and techniques are able to ensure cybersecurity from a project’s start to finish. IT would also be helpful to employ independent, CREST-certified laboratories to further validate the security of the building control solutions. Furthermore, having a product that has been validated by several large global companies from diverse industries such as banking and finance, hotels, healthcare, and more could be beneficial.

Similarly, there are now new standards and protocols that are being implemented to ensure cybersecurity is maintained and managed across each system connected to mobile applications. System manufacturers increasingly provide security training to application developers in the effort to ensure that their own clients are complying with these standards.

Simultaneously, business managers incorporate extensive testing, secure code practices, threat modeling, and more to make sure their teams are following security regulations. Equipment manufacturers, in another part of this equation, provide customers and partners with thorough instructions and documentation to indicate that they are deploying their equipment securely, effectively, and efficiently. A growing number of facility managers also have begun to allocate dedicated staff to cybersecurity teams to provide support, maintenance, and installation services to incidents or vulnerabilities.

As attacks become more common and sophisticated, businesses need to keep up to date with the latest solutions as hackers continue to familiarize themselves with existing security solutions and work around them. Evolving processes and procedures with changing security needs will be vital to ensuring facility success. Network managers should also plan to continually train staff to ensure cybersecurity systems and protocols continue to evolve and are continually updated and followed across the organization.

Protecting Against Physical Threats
With the adoption of IoT comes added benefits for access control and on-site security as well. As the use of cloud and IoT-enabled devices continues to grow, it is becoming more commonplace for security personnel to have mobile devices connected to their building’s systems.

Multiple industries are integrating mobile devices into their daily workflows, giving more opportunities for the benefits of remote access to be realized. It is likely that mobile tools with remote access will become an increasingly important part of building security and management, as security teams consistently use their devices to monitor various aspects of their building to ensure their occupants’ safety.

Through remote monitoring, security professionals can access all of their building’s security systems including video monitoring, intrusion detection, and visitor management through mobile devices. Moving beyond the control room, security teams can stay visible throughout the entire facility while also monitoring real time information through devices connected to the cloud-enabled services.

Security staff can make clearer decisions and provide faster responses by accessing this information at any time, from any place. As security management tools continue to develop, building managers, end users, dealers and integrators need to be aware of how they are changing building security management, and how they will affect its future.

Future Opportunities
Building managers are not alone in the effort to ensure that IoT-enabled systems for buildings are protected. This effort is being taken seriously across the industry, and as IoT-connected building management systems become more popular, new standards and protocols are being implemented to ensure cybersecurity is maintained and managed across each system connected to mobile applications.

Looking ahead, one of the biggest advances for all of security and building automation will be with analytics tools. Analytics will be able to unite all facility systems and their resulting data and metadata and turn them into actionable insights which can be used for improvements and innovations. Using such tools will make a profound impact on the support of the building, its occupants and assets, creating a significant change in the maintenance of facilities large and small.

We see a continued increase in the adoption of cloud services due to the overall benefits, and a growth in facial detection and recognition in the area of access control. Additionally, I expect the industry will evolve integration beyond traditional security. Today’s enterprise customers are looking for integration that goes beyond cameras, intrusion sensors, and intercoms and moves into integration with lighting, building management, services, tracking and even vehicle management systems.

By providing security professionals with the tools to work from anywhere, giving them a view of all their properties—inside the network infrastructure and outside the physical walls—buildings can be more secure than ever.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3