Five Reasons Your Building Isnít as Secure as You Think
Building technology and security are often seen as an afterthought to building operations. Frequently, assumptions are made that everything is secure from todayís cybersecurity threats, or the risk is low because buildings arenít e-commerce platforms or other obvious targets. But are you really secure?
Many buildings have internal systems that were built in a simpler time, often with security as an afterthought Ė think default passwords, unpatched control systems, and operating systems that are no longer maintained or patched. In a world where cybersecurity is a daily headline, complacency for IT operations in commercial buildings is truly a false economy. While e-commerce and data centers may get the bulk of the attention from hackers, targeting building systems can be easy prey for the bad guys out there.
We have spent considerable energy analyzing and documenting the inner workings of building systems, and Ė not surprisingly Ė found many weaknesses that could be exploited by hackers, compromising your systems or tenants, and creating unwanted reputational risk. The following Top Five list is comprised of actual findings encountered during our efforts to secure building systems from cyber attacks.
(1) The Unpatched Digital Video Recorder (DVR)
Building surveillance systems are incredibly common Ė the technology is inexpensive enough that even the smallest properties have installed cameras and other monitoring devices. The vendor that is responsible for installation is often not concerned with the security implications of the digital video recorder (DVR) or digital video cameras that are network accessible. We consistently see many DVRs sitting on the same network as other building systems. To make matters worse, recent DVRs now have Internet-enabled features. For the vendor to enable these features, they typically open one or more inbound firewall ports so the DVR is easily accessible from anywhere. This is commonly done so the building engineer can remotely monitor their cameras. While having remote access to the cameras is incredibly convenient, it is also a security threat. These DVRs are rarely patched, and outdated firmware versions can become easily exploited, especially when internet accessible.
(2) We Donít Need No Stinking Firewall
Do your properties have modern firewalls with up-to-date patches and monitoring? Consider yourself in the minority if you do. There are many properties that simply have an old consumer router that hasnít been patched in years, or possibly worse, just the box furnished by the internet provider. Those boxes do a fine job providing Internet connectivity, but provide zero control over traffic and lack basic or advanced monitoring capabilities. They donít include things like content filtering, advanced malware protection, and intrusion detection and prevention (IDS/IPS). To add insult to injury, these providers by default openly advertise wireless access points that the public can attach to. Do you really want the public on your WiFi sucking up bandwidth and unmonitored for abuse? And if the cable company isnít trying to give away your WiFi, you can bet that someone inside has tried, which leads us to:
(3) Free WiFi for Everyone!
Wireless is a great advance which has transformed how we work over the last 20 years. But this convenience has created a completely new security challenge. Remember that engineer that briefly worked at your building last year? Well, he installed a $20 access point on your network so he could get internet while in the cafeteria. And now there are 50 people on your building network and you donít even know it. You would think something like this isnít very common, but with vendors and engineers coming and going over the years, the possibility is very real. We find these wireless access points hidden everywhere like cockroaches.
(4) Misbehaving Snack Machine
In the old days, a snack machine sat in a break room eating quarters and giving your tenants a quick sugar fix. No one carries quarters any longer, and your snack machine is now on the internet. Unfortunately, we have seen your snack machine Ė and it has malware on it. Worse, itís on your building network next to your unpatched energy management system from 2005. Better contact that vendor (who doesnít specialize in security either), because the bad guys are swiping credit card numbers from your tenants, and youíre about to have a PR nightmare on your hands.
(5) The Public PC
You hope that you have hired vendors that are savvy about security. But the guy installing your access control or DVR system is not necessarily a networking guru/security expert. Recently we found a PC that the vendor decided needed to be completely on the Internet with its own public IP address (no firewall). We donít know if the malware on this PC came directly from the internet, from the engineer browsing the web, or simple email malware. There are so many ways (or threat vectors) this PC could have been compromised that it didnít stand a chance. And to save money, this one PC had energy management, access control, and general office work all happening on its infected self. If that malware had remote control capability, hackers could have easily caused building environment issues, locked out the scan cards, and stolen the access control list of everyone with a badge. If that had happened, cleaning up the mess could be far more expensive than having a secure architecture in the first place.
Itís Not Too Late
We hope your corporate environment doesnít have these issues. These problems are, unfortunately, all too typical in the commercial building sector. But you can get ahead of your cybersecurity threats with some planning and detective work. Your best bet is to schedule a comprehensive walkthrough of your building Ė identifying your vulnerabilities is the first step in building a plan of attack to close the holes in your building security. Once you have your plan, at least you will know if you are vulnerable to the next Wannacry or Petya attack.
This Week’s Sponsor
Leveraging decades of industry experience, 5Q Partners offers a full spectrum of commercial real estate technology solutions, including - cybersecurity consulting, CIO level leadership, applications integration, private cloud management, help desk support and onsite IT operations - managing as much, or as little, of your company's technology projects or operations as needed. Visit www.5qpartners.com.
UPCOMING REALCOMM WEBINARS
How Enterprise Systems and Third-Party Integrations are Influencing Investment Management During the Extreme Makeover of CRE Tech 5.0 - 1/25/2018
Realcomm 2017 focused heavily on the Commercial Real Estate evolution from CRE Tech 1.0 to 5.0. Nothing could be more evident of this extreme makeover than the pace at which our enterprise giants are introducing new functions and feature sets in the Investment Management space. When combined with the introduction of innovative SaaS third-party tools that integrate seamlessly with existing deployed systems, the feature-rich environment is transforming the technology landscape for investment managers. From fundraising and capital management, to buy/sell analytics, to the entire investor experience, these capabilities are empowering companies in entirely new ways. Join our fast-paced discussion to hear about the very latest innovative aspects of this digital transformation.
Scott current serves as the Industry Principal for Investment Management Solutions at Yardi Systems. He has almost 30 yearsí experience working in the real estate software technology field and has been engaged by hundreds of real estate companies in selecting and deploying software technology. He started in financial and real estate technology consulting with the public accounting firm of Laventhal and Horwath, and went on to manage a real estate technology consulting practice for numerous years. Since then, Scott has worked for a number real estate software companies in various roles from consulting to develop to National/Institutional Account Management. He currently works for Yardi Systems assisting their Private Equity Real Estate clients create efficiencies with software technology in their front to back office operations.