Creating a secure building automation system

It is common for organizations to create a BAS and then more or less forget about it


Any system connected to the internet is at risk — including a building automation system (BAS), according to an article from Building Operating Management on the FacilitiesNet website.

It is common for organizations to purchase (or create) a BAS, implement the solution, and then more or less forget about it.

This mentality can create an environment where network security needs are not addressed. An intrusion into a BAS can lead to compromised building security.

There are three core points of cybersecurity that facility managers should pay attention to.

  • Define required levels of security
  • Engage IT personnel
  • Develop appropriate policies and procedures

Read the article.



January 21, 2020


Topic Area: Security


Recent Posts

Biofilm 'Life Raft' Changes C. Auris Risk

Microscopic survival structure protects fungal pathogen from disinfectants and help it survive for long periods.


How Healthcare Restrooms Are Rethinking Water Efficiency

Manufacturers discuss strategies, technologies and design approaches that help healthcare facilities meet their sustainability goals.


Northwell Health Finds Energy Savings in Steam Systems

Case study: A proactive steam trap maintenance program is delivering millions in savings, fast payback and measurable carbon reductions across one of the nation’s largest health systems.


The Difference Between Cleaning, Sanitizing and Disinfecting

Cleaning methods and products have various purposes in reducing the spread of germs.


Jupiter Medical Center Falls Victim to Third-Party Data Breach

The third party has determined through an investigation that, at least as early as January 22, 2025, an unauthorized third party gained access to personal health information on legacy systems.


 
 


FREE Newsletter Signup Form

News & Updates | Webcast Alerts
Building Technologies | & More!

 
 
 


All fields are required. This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.