{"id":15105,"date":"2015-10-02T17:39:41","date_gmt":"2015-10-02T17:39:41","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4601"},"modified":"2022-04-26T16:48:21","modified_gmt":"2022-04-26T14:48:21","slug":"smart-office","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/smart-office\/15105\/","title":{"rendered":"Don&#8217;t be afraid of the dark: pitfalls of the smart office"},"content":{"rendered":"<p>It\u2019s hard not to notice that the modern office space is no longer just a building with windows, desks and a ceiling. With various automation systems becoming commonplace, the office has essentially become a huge cybernetic organism on its own. All sorts of engineering and logistical solutions, sensors and controllers encompass technologies providing access control, video surveillance, climate control, water supply, lighting, fire extinguishing, elevator control, etc.<\/p>\n<p>This same system can also, to some extent, control information and communications technologies, monitor the state of communication channels, restrict employee access to undesirable Internet resources, and block file downloads by size and type.<\/p>\n<p>All of these solutions, sensors and controllers are tied together into a sophisticated telecommunications network that has a single control center \u2013 a server or any modern computer with specialized software providing support for all the relevant protocols.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Don\u2019t be afraid of the dark: pitfalls of the #smartoffice<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FjB19&amp;text=Don%26%238217%3Bt+be+afraid+of+the+dark%3A+pitfalls+of+the+%23smartoffice\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>These systems are designed to create and maintain comfortable working conditions for the company\u2019s employees, as well as provide a more centralized and less complicated process for managing these technologies. These systems also help to improve efficiency. For example, the early detection of a gas or water leak by the system\u2019s sensors could reduce company\u2019s costs significantly.<\/p>\n<p>A <a href=\"https:\/\/www.alliedmarketresearch.com\/smart-home-automated-building-market\" target=\"_blank\" rel=\"noopener nofollow\">study<\/a> carried out by Allied Market Research found the market for smart building systems is evolving and growing rapidly. The research company forecasts that the market will grow by 29.5% by 2020 and reach a volume of $35.3 billion. This means that more and more office buildings will be built based upon these principles.<\/p>\n<p>But have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life\u2019s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?<\/p>\n<p>It makes no difference in this context whether you are renting an office or have a smart building of your own. Incidentally, the size of your business and its area of work does not matter either, because your company may be of interest to cybercriminals both on its own and as a stepping-stone for attacks against your partners.<\/p>\n<p>This is because the telecommunications network used in the system, while being a key element that is essential to its operation, is also the system\u2019s weak spot. It is used for all communications between the command center and the end devices. The network can use both wired and wireless technologies (such as Wi-Fi and Bluetooth). Moreover, the central computer itself may have an Internet connection to make management and control easier.<\/p>\n<p>For cybercriminals, this is the primary target, since access to the command center, or the corporate network, enables them to take over the entire system.<\/p>\n<p>For example, after gaining access to the network, cybercriminals can monitor the office\u2019s operation using the video surveillance system \u2013 they may even be able to see the information on employees\u2019 monitors. Taking advantage of the access control system\u2019s vulnerabilities, criminals can get into the building disguised as employees without attracting anyone\u2019s attention. After all, the security service does not necessarily know all employees by sight. Taking control of other life-support systems can seriously undermine the office\u2019s ecosystem, to the point of making work impossible. This can result in downtime, missed deadlines, damage to property and other financial losses.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>For cybercriminals access to the command center enables to take over the entire system. #protectmybiz<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FjB19&amp;text=For+cybercriminals+access+to+the+command+center+enables+to+take+over+the+entire+system.+%23protectmybiz\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>This is why a multi-tier, comprehensive approach to IT security is a must. It is essential that security is not limited to protecting corporate resources internally using IT security solutions on employees\u2019 endpoints. It is crucial to provide reliable protection for all elements of the smart building management system that are connected to your corporate system in any way.<\/p>\n<p>We recommended the following approach to ensure your company\u2019s systems remain reliably protected:<\/p>\n<ul>\n<li>A comprehensive <a href=\"https:\/\/www.kaspersky.com\/enterprise-it-security\/security-intelligence-services\/\" target=\"_blank\" rel=\"noopener nofollow\">IT security audit<\/a> will help to identify all the weak spots in the company\u2019s IT network.<\/li>\n<li>Developing a threat model will enable you to create a detailed map of potential attack vectors.<\/li>\n<li>Implementing a specialized, <a href=\"https:\/\/www.kaspersky.com\/business-security\/small-to-medium-business\" target=\"_blank\" rel=\"noopener nofollow\">multi-layered IT security solution<\/a> will help to provide protection for all nodes on the corporate network, including protection against Internet threats, data <a href=\"https:\/\/www.kaspersky.com\/images\/Kaspersky_Lab_Whitepaper_Encryption-10-261918.pdf\" target=\"_blank\" rel=\"noopener nofollow\">encryption<\/a> on endpoints, <a href=\"https:\/\/www.kaspersky.com\/business-security\/fraud-prevention\" target=\"_blank\" rel=\"noopener nofollow\">protection of financial transactions<\/a>, protection for <a href=\"https:\/\/www.kaspersky.com\/business-security\/mobile\" target=\"_blank\" rel=\"noopener nofollow\">mobile devices<\/a>, the <a href=\"https:\/\/www.kaspersky.com\/business-security\/mail-server\" target=\"_blank\" rel=\"noopener nofollow\">mail server<\/a> and data <a href=\"https:\/\/www.kaspersky.com\/business-security\/storage\" target=\"_blank\" rel=\"noopener nofollow\">storage<\/a> facilities connected to the network, timely software and signature database updates, etc.<\/li>\n<li>Employee <a href=\"http:\/\/media.kaspersky.com\/en\/business-security\/IS%20datasheets_EDUCATION.pdf?icid=en-GL:ent-content\" target=\"_blank\" rel=\"noopener nofollow\">training<\/a> in IT security and office system operation rules, as well as the rules of conduct in critical situations, will help to reduce the chances of attackers gaining access to your data by using social-engineering techniques.<\/li>\n<\/ul>\n<p>With the market for embedded solutions evolving at such a pace, some vendors are now looking to develop specialized technologies to cater for this growing market. Our own company, Kaspersky Lab, for example is developing an <a href=\"https:\/\/www.kaspersky.com\/industrial-security-cip\" target=\"_blank\" rel=\"noopener nofollow\">embedded secure operating system<\/a> and is now close to the pilot stage. Specifically, one of its components, <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Lab_whitepaper_Kaspersky_Security_System.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security System<\/a>, is already available in the market as an embedded OEM solution. The component can be built into any real-time operating system, providing security for operations performed under that operating system.<\/p>\n<p>The operating system itself can be built directly into controllers and sensors used in smart building systems. All of these end devices are microcomputers that need protection as much as other computers that are better known to the world. Since conventional security tools cannot be installed on such devices, a specialized solution implemented as a secure operating system can provide security of smart building systems at the end device level, safeguarding the company against cyberattacks that use the system as an entry point into the company\u2019s corporate network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever considered your smart office from an IT security viewpoint? Did it occur to you that by equipping your office with devices designed to provide life&#8217;s comforts, cybercriminals are handed even more opportunity to gain access to your corporate information and even to cause physical damage?<\/p>\n","protected":false},"author":2706,"featured_media":15521,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[97,2341],"class_list":{"0":"post-15105","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-security-2","10":"tag-smartoffice"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/smart-office\/15105\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/smart-office\/15018\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/smart-office\/15105\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/smart-office\/15105\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/security-2\/","name":"security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/2706"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=15105"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15105\/revisions"}],"predecessor-version":[{"id":26593,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15105\/revisions\/26593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15521"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=15105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=15105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=15105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}