Page 29 - REALCOMM EDGE-Fall 2017-FINAL
P. 29
building network and you don’t even know it. You would think Your best bet is to schedule a comprehensive walkthrough of
something like this isn’t very common, but with vendors and your building—identifying your vulnerabilities is the first step
engineers coming and going over the years, the possibility is very in building a plan of attack to close the holes in your building
real. We find these wireless access points hidden everywhere like security. Once you have your plan, at least you will know if you
cockroaches. are vulnerable to the next Wannacry or Petya attack.
#4) Misbehaving Snack Machine Garrett Suhm is Chief Security Officer for 5Q Partners
In the old days, a snack machine sat in a break room eating responsible for developing and executing Cybersecurity programs for
quarters and giving your tenants a quick sugar fix. No one carries their clients. He has successfully led technology teams large and
quarters any longer, and your snack machine is now on the small for over 28 years. Based in Atlanta and Dallas, 5Q
internet. Unfortunately, we have seen your snack machine–and understands commercial real estate corporate and building
it has malware on it. Worse, it’s on your building network next to technology systems. They provide a full spectrum of IT Leadership, Operational
your unpatched energy management system from 2005. Better and Professional Services to financial stakeholders in the commercial real estate
contact that vendor (who doesn’t specialize in security either), industry.
because the bad guys are swiping credit card numbers from your
tenants, and you’re about to have a PR nightmare on your hands.
#5) The Public PC
You hope that you have hired vendors that are savvy about
security. But the guy installing your access control or DVR system
is not necessarily a networking guru/security expert. Recently we
found a PC that the vendor decided needed to be completely on
the Internet with its own public IP address (no firewall). We don’t REAL. TECH. EXPERTS.
know if the malware on this PC came directly from the internet,
from the engineer browsing the web, or simple email malware.
There are so many ways (or threat vectors) this PC could have Protecting your Entire
been compromised that it didn’t stand a chance. And to save CRE Enterprise from
money, this one PC had energy management, access control,
and general office work all happening on its infected self. If that Cybersecurity Attacks
malware had remote control capability, hackers could have easily
caused building environment issues, locked out the scan cards,
and stolen the access control list of everyone with a badge. If
that had happened, cleaning up the mess could be far more
expensive than having a secure architecture in the first place.
It’s Not Too Late
We hope your corporate environment doesn’t have these www.5qpartners.com
issues. These problems are, unfortunately, all too typical in the
commercial building sector. But you can get ahead of your (800) 327-9217 | info@5qpartners.com
cybersecurity threats with some planning and detective work.
Realcomm 27