Page 56 - RC19 EDGE Spring All - final-2 - hi res
P. 56

terms of transactions and money. This includes the data        The digital transformation that’s
                from supply chain contractors, third-party services, and   taking place in the real estate industry
                tenants’ personal data. This data is now on a network,
                and therein lies the potential exposure. Many companies   and the incredible investment in digital
                servicing the industry operate in an entrepreneurial   products means that the profile of real
                fashion, as contractors to large real estate organizations.
                Service and speed are important, and people need to work   estate is increasing as never before;
                effectively—with all the access that entails. There must   it is now creeping into one of the top
                be a balance between security and efficiency, so that
                employees can do their jobs while still staying secure. As       areas for nefarious infiltration.
                the industry standardizes security protocols, more third-
                party entities will be subject to vendor security reviews.

                On the asset side, the goal of a comprehensive user   by attacks like these because the procedure is familiar—
                experience is effectively changing the game. Capturing   it’s not anything unusual.
                and tracking data about the user experience in a building
                creates information that’s never been electronically   As time goes on, violations will become more creative. The
                available before and is no longer under closed proprietary   Schneier on Security blog recently posted an article about
                systems. Consequently, there’s an uptick in focus by   hacking construction cranes. Cranes now have the capability
                the investment community about cybersecurity. This   for remote wireless diagnostics. Can you imagine a crane in
                is driving behavior within companies to examine their   the hands of someone intent on doing harm?
                security policies and programs.
                                                                     Another existing possibility exploits a very common
                Unanticipated events                                 activity: parking. Imagine the location is a high-value
                Today, 90% of compromises start with business email   downtown Class A office building that contains building
                and some kind of phishing attack, and they have become   systems everyone uses. How are the tenants using those
                quite sophisticated. These emails appear to be from   systems and how are they connected? How are the
                someone you know, asking for information or money.   tenants accessing that building’s parking area? In some
                They may have a signature block that looks exactly like   cases, it’s a proprietary system using a badge, or perhaps
                the one you are expecting. For example, a supplier who   it reads your license plate. But in many buildings you
                has completed a service ‘sends’ an email enclosing an   enter using your toll tag. The property manager is given
                invoice and new bank account or new wire instructions   the toll tag number and vehicle information. As a tenant,
                for payment. People develop habits that can be exploited   it’s very convenient because there’s no need for a fob or




                  Considering the statistics,    •  Cybercrime damages will cost the world    sensors will be embedded in the world
                  it’s not a question of ‘if’ a   $6 trillion annually by 2021       around us, with up to 45 trillion in 20 years
                  small-to-midsized business    •  FBI’s Internet Crime Complaint Center (IC3)   •  Hacking tools and kits for cyberattacks,
                  will be hacked, but ‘when’     stated reported cybercrimes only represent   identity theft, malware, ransomware,
                                                 10 to 12 percent of the total number   and other nefarious purposes have price
                                                 actually committed in the U.S. each year  points starting as low as $1
                                                •  FBI reports that the Business Email   •  More than 90 percent of successful hacks
                                                 Compromise (BEC), a sophisticated scam   and data breaches stem from phishing
                                                 targeting both businesses and individuals   scams
                                                 performing wire transfer payments—has
                                                 cost more than $12.5 billion in losses   •  More IP traffic will be created in 2022 than
                                                 over the past 4.5 years             in the 32 years since the Internet started
                                                •  Less than half of companies globally are   •  Global spending on cybersecurity
                                                 sufficiently prepared for a cybersecurity   products and services will exceed $1
                                                 attack, according to PwC            trillion cumulatively over the five-year
                                                                                     period from 2017 to 2021
                                                •  Number of connected devices on the
                                                 Internet will exceed 50 billion by 2020.     According to the Cisco/Cybersecurity Ventures
                                                 And by 2022, one trillion networked   2019 Cybersecurity




                54



         RC19 EDGE Spring All but Covers - final - 19APR.indd   54                                                   4/19/19   3:17 PM
   51   52   53   54   55   56   57   58   59   60   61