Advisory Banner

ADVISORY

Hack Proof: Cybersecurity & Smart Buildings

It was January 2017 during a busy tourist season in Austria, and the Romantik Seehotel Jaegerwirt was filled with guests. Ready to ski and sightsee, some travelers had paid more than $500 a night for the alpine lodging. When multiple guests began complaining that their key cards could not unlock their rooms, hotel staff tried in vain to remedy the problem, but they were frozen out of their own computer system. Then the ransom email arrived.

Sent to the hotel's managing director, the note demanded about $1,800-worth of bitcoin if the hotel would like to regain access to their system. The note ended with a friendly, "Have a nice day," news sources reported at the time. If not paid soon, hackers indicated that the ransom amount would be doubled. With the full house of guests to consider, the hotel complied and paid the hackers.

The Austrian hotel incident is one of many that highlights new considerations property managers must take as buildings and their features get smarter and more connected. Anywhere there is automation, there is risk, and with the growing popularity of IoT (Internet of Things) in real estate and smart buildings, property managers need to be prepared for all of the threats that come with the convenience and simplicity.

POINTS OF ATTACK
David Peterson, the director of smart properties at the Maryland-based Blackpoint Cyber and a 25-year commercial real estate veteran, explains that adding automation like climate controls, security systems or timed lights comes with additional potential "attack surfaces."

"These devices typically rely on an IP-based communication system—much like on a PC—and these can be vulnerable to malicious hackers," Peterson says. "It could be a building automation system, an unsecured maintenance portal, a CCTV or a security system, or even an individual laptop, and if there's a weak point, attackers can get in."

Peterson says the most common method hackers use to quickly bring down a network is called "lateral spread," and it's one that you probably have already seen attempted. "It starts with a well-worded email to the right individual, coercing that person to inadvertently give up their credentials or click on a link; if this succeeds, the hacker is now in the network where they will perform reconnaissance to gain access to privileged accounts and high-value targets and eventually spread their malware," Peterson says.

Jim Young, co-founder and CEO of San Diego-based Realcomm Conference Group, says hackers are looking for easy points of access, and every new piece of equipment that comes into a building may be a risk, along with anything attached to a modem.

"There are modems on equipment in the closets of some buildings that nobody even knows about," he says, adding that these devices are fairly simple for a hacker to locate. He says websites like shodan.io, which calls itself "the world’s first search engine for Internet-connected devices," is an easy way for anyone to find the devices that are exposed and vulnerable.

“NEFARIOUS CHARACTERS”
Just like the potential points of attack, the motives of hackers vary wildly. "If it’s a nation-state, they could be looking for disruption or a financial goal," Young says. "It could be disgruntled employees or kids just playing around, saying, 'Let’s turn off the lights.' There are multiple goals, multiple types of people and multiple types of threats." Other possible aims are making the buildings inaccessible, stealing visitor or occupant data or even destroying equipment.

Highlighting the power a hacker can wield, Peterson asks, "If they get into a building with tenants and manipulate the HVAC system, lights or security, what can the staff do?"

Adds Young, "Imagine turning off the heat in Chicago in winter or the air conditioning in L.A. in the summer. Then there’s negative impact on the brand."

To regain control of the building, victims may need to pay a certain amount of money (ransom demands differ) to unlock the system and unencrypt the files. "It could be as easy as cleaning up a desktop or laptop with an anti-virus software, but it may also take a team of experts to unlock. The longer it takes, the more expensive it could be," Peterson says.


Depending on how severe the hack is, it could take days or weeks to gain control and a secure status again, Young says. Both Young and Peterson agree that it all depends on how prepared the building and its managers and owners are.

"You want to disincentivize these nefarious characters," says Peterson.

CYBERSAFE AND SOUND
In this ever-changing tech environment, Peterson encourages property managers to get educated and be prepared. "You have to ask yourself what you would do," he says. "You have to assume a cyberhack is on the horizon."

Questions for property managers to consider include: Does your insurance cover a hack? Who would pay for the damage? What about the damage to your reputation? Whether a smart system is in place or in the plans, these concerns must be addressed.

Rather than trying to navigate cybersecurity alone, Young suggests property managers have the guidance of their organization’s IT experts. "You need to have an IT liaison or partner inside the company to help," he says. Then, with the help of IT (and after making sure that the corporate office does not already have cybersecurity measures in place), property managers can reach out to a cybersecurity expert for a consult.

"There are a lot of impostors in IT, OT and IoT," Young says. "If they don’t have experience with all three, you are going to pay for their learning curve."

Because hackers are looking for easy targets, Peterson says having an expert perform a cyber assessment on your property can be very informative. Without giving any identifying information about his client, Peterson recounted his company’s recent security evaluation of a large North American shopping center. "They wanted us to assess their system, and it was wide open. It literally took our experts 15 minutes to figure it out," he says.

Blackpoint Cyber takes a three-tiered approach in protecting smart buildings through monitoring, detecting and responding to threats, he says. Monitoring involves 24/7 live monitoring of a building’s systems. If something out of the ordinary is detected, Blackpoint determines if it is a nonissue that should be ignored or if it requires action. "If an alert gets escalated to the next level, our team has the ability to make an immediate response, and we will alert your team according to our predetermined action plan that we set up in the onboarding process," Peterson says.

Being educated and safe doesn’t mean you and your building will be completely immune to hackers, "but it will be less likely to happen, and if you're better prepared, it's more likely the building will get back on track," Young says.

REPRINTED FROM THE JOURNAL OF PROPERTY MANAGEMENT, VOL. 84, NO. 4, WITH PERMISSION FROM THE INSTITUTE OF REAL ESTATE MANAGEMENT. FOR MORE INFORMATION ON IREM AND ITS PUBLICATIONS, VISIT WWW.IREM.ORG.

Maggie Callahan, Contributing Writer, Journal of Property Management, IREM
Maggie Callahan is a contributing writer for JPM. Her work has also appeared in the Los Angeles Times, on Yahoo! Health and in various other publications.

This Week’s Sponsor

Altus Group is a market leader providing software, data solutions and technology-enabled expert services enabling commercial real estate professionals to connect to the market. ARGUS® solutions are the industry standard for creating cash flows and valuations helping thousands of commercial real estate professionals gain transparency into their property assets, manage risk and optimize their portfolios.

Realcomm News


If you are an experienced and dynamic speaker on the topic of technology, innovation and automation for the Corporate Real Estate or Facilities industry and have a compelling story or case study to share, then we want to hear from you!

For a list of suggested topics and to submit a proposal, visit: Speaking Opps.

Register early and save!

UPCOMING REALCOMM WEBINARS

Convenience & Efficiency or Surveillance? Defining PRIVACY in Highly Connected Buildings - 4/2/2020

The increasingly connected building ecosystem of lights, sensors, mobile phones, cameras, voice assistants, fitness equipment, access control and more accelerates data-gathering and enables resource conservation, operational efficiency, enhanced experiences and financial optimization. On the other hand, these hyper-connected buildings also enable the potential for occupant surveillance. Building system sensors collecting, storing, analyzing, and in some cases interpreting data in every square inch of a building greatly challenge the concept of privacy. With the rise of privacy awareness and the introduction of regulatory compliance (such as GDPR in the EU and CCPA in California), building owners and operators are expected to demonstrate commitment to lawfulness, transparency, and data protection. This webinar will bring together industry leaders to discuss this timely topic and the obvious and unintended consequences of highly connected buildings.

headshot for Jim Young
Jim Young Realcomm
Jim Young Co-Founder & CEO Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on techno
headshot for Jim Young
Jim Young
Co-Founder & CEO
Realcomm
LinkedIn

Founder of Realcomm Conference Group, an education organization that produces Realcomm, IBcon and CoRE Tech, the world's leading conferences on technology, automated business solutions, intelligent buildings and energy efficiency for the commercial and corporate real estate industry. As CEO, Jim interacts with some of the largest companies globally pertaining to some of the most advanced and progressive next generation real estate projects under development.

headshot for Brian Schwartz
Brian Schwartz Macerich
Brian Schwartz VP, IT Brian Schwartz is responsible for Smart Building Infrastructure at over 50 centers portflio wide. He oversees the installation and support for CCTV, W
headshot for Brian Schwartz
Brian Schwartz
VP, IT
Macerich

Brian Schwartz is responsible for Smart Building Infrastructure at over 50 centers portflio wide. He oversees the installation and support for CCTV, Wi-Fi, Energy Management, shopper counting, and DAS. Brian supports digital marketing initiatives including digital signage and property websites.

headshot for Emmanuel Daniel
Emmanuel Daniel Microsoft
Emmanuel Daniel Director, Applied Innovation & Incubation, Smart Buildings & Campuses Emmanuel Daniel is responsible for building and delivering the Digital Transformation strategy for campuses across Microsoft and leads a global multid
headshot for Emmanuel Daniel
Emmanuel Daniel
Director, Applied Innovation & Incubation, Smart Buildings & Campuses
Microsoft

Emmanuel Daniel is responsible for building and delivering the Digital Transformation strategy for campuses across Microsoft and leads a global multidisciplinary team of architects and experience designers. He builds experiences that merge technology with the built environment, leading to the formation of spaces that respond to the needs of its users. He is also accountable for identifying, building and implementing the next generation of products that will make smarter and sustainable buildings.

headshot for Shahryar Shaghaghi
Shahryar Shaghaghi CohnReznick
Shahryar Shaghaghi Principal, Nat'l Leader Cybersecurity Shahryar Shaghaghi, a Principal with CohnReznick Advisory and national leader of itsCybersecurity and Privacy Practice, is focused on helping clients
headshot for Shahryar Shaghaghi
Shahryar Shaghaghi
Principal, Nat'l Leader Cybersecurity
CohnReznick
LinkedIn

Shahryar Shaghaghi, a Principal with CohnReznick Advisory and national leader of itsCybersecurity and Privacy Practice, is focused on helping clients with their cybersecurity strategy and transformation programs. By leveraging his extensive technology and risk management leadership experience garnered from his tenure with major consulting and financial services companies and his solid track record with complex and global implementations, Shahryar has successfully helped chief technology, risk, compliance, legal, finance, operations, and security officers achieve their goals and optimize their critical and strategic programs.

headshot for Charles Stucki
Charles Stucki Join
Charles Stucki Chief Marketing Officer Charles was an early investor and advisory board member for Join. Charles was recently Co-CEO of a seed stage company developing advanced application-
headshot for Charles Stucki
Charles Stucki
Chief Marketing Officer
Join

Charles was an early investor and advisory board member for Join. Charles was recently Co-CEO of a seed stage company developing advanced application-intent driven networking software for enterprises migrating to hybrid cloud. With nearly 17 years of leadership at Cisco, Charles most recently led development of automated software defined networking (SDN) platforms for Cisco, enabling Service Providers and Cloud companies to offer cloud-managed networking as a service to enterprises.

headshot for Alan Tangen
Alan Tangen Cooper Lighting Solutions
Alan Tangen Business Development Manager - RTLS Alan has spent 20 years working with communication technologies, predominantly in healthcare. He has developed an expert understanding of the challeng
headshot for Alan Tangen
Alan Tangen
Business Development Manager - RTLS
Cooper Lighting Solutions

Alan has spent 20 years working with communication technologies, predominantly in healthcare. He has developed an expert understanding of the challenges facing healthcare and the significant value technology can deliver to overcome them. During his career he has had extensive experience in managing service and sales personnel, as well as selling, installing, and servicing complex solutions including nurse call systems, wireless phone systems, and real time locating systems. He is responsible for numerous successful implementations.