Are those IoT devices meddling in your building operations?

Photo "consolidated maintenance operations center" courtesy of the U.S. Library of Congress
iot device hacks

Numbers represent search interest for “internet of things” and “cyber security” relative to the highest point on this Google Trends chart for the past 5 years. A value of 100 is the peak popularity for the term, where 50 means the term is half as popular.

Turns out the Internet-of-Things (IoT) is more than just the next $19 trillion market ripe for venture capital investment. It’s also the newest dimension from which dark side hackers stage and launch attacks on their prey. The chart above reflects this new challenge facing building operators: interest in the IoT links to interest in cyber security. Ted Koppel–of Nightline, NPR, and CBS fame–focuses on the threat of cyber attacks directed at the U.S. electrical grid in his book Lights Out. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”

Cyber security is certainly a top priority for Brian Krebs, an expert reporter on the cyber security beat. After writing about an online attack-for-hire service, his website became a target of retribution. What’s particularly interesting for building operators is how Brian’s website was attacked…through IoT device hacks like web enabled closed-circuit security cameras and 11,767 residential internet routers.

In announcing October as the National Cyber Security Awareness Month, President Obama stated “Technology plays an increasingly significant role in our daily lives. The rise of the Internet has brought incredible opportunity and new ways of innovating and enhancing our way of life — but with great potential also comes heightened risk to our data. Keeping cyberspace secure is a matter of national security, and in order to ensure we can reap the benefits and utility of technology while minimizing the dangers and threats it presents, we must continue to make cybersecurity a top priority.”

IoT device hacks have happened to wi-fi connected Barbie dolls and Jeep Grand Cherokees, medical devices like pacemakers, and even auto-aiming sniper rifles! According to the the Department of Homeland Security, often the weakest link is the human using a computer at work. Everyone in the building, from the entry-level employee to the CEO and building owner, shares responsibility for security best practices.

About Millen Paschich

Millen began his career at Cambridge Associates, trained in finance at SMU, and has an MBA from UCLA. Talk to him about bicycling, business, and green chile burritos.

0 replies on “Are those IoT devices meddling in your building operations?”

You may also be interested in...

Get a More Complete View of Building Performance with Occupancy Tracking
Get a More Complete View of Building Performance with...

Building engineers, property managers, and sustainability teams have told us they need a better way to understand how occupancy affects energy use and costs. If you manage a portfolio, predicting future costs requires a more complete understanding of how occupancy…

I Help Texas Building Engineers Lower 4CP Charges: Here’s How They Do It
I Help Texas Building Engineers Lower 4CP Charges:...

As a customer success manager, I spent the summer of 2024 working closely with building engineers in Texas to help them reduce 4CP (Four Coincident Peak) charges. These charges, which often account for more than 10% of a building’s annual…