• our story
  • our services
  • HSE
  • WHAT'S HAPPENING
  • FAQ
Logo
  • our story
    • Our History
    • Our Team
    • Our Partners
    • HSE
    • Case Studies
    • Testimonials
    • Training
  • our services
    • Indoor Environmental Solutions
    • Mechanical Services
    • Building Automation Services
    • Energy Services
    • Industrial Services
    • Rental Services
    • Markets Served
    • Hunton Engineered Products
    • Emergency Services
    • Special Projects
  • HSE
  • WHAT'S HAPPENING
  • FAQ
  • CAREERS
contact us
713-643-8336 contact us

BLOG

December 4, 2019

Understanding the Cybersecurity Risks to HVAC and Building Automation Systems

The world of digitized data and automated products is dynamic and constantly advancing. Due to this fact, it is important to be diligent about protecting your business against unauthorized access to your computers and networks. The commercial HVAC industry is no different when you consider Building Automation Systems (BAS). In the last decade, a myriad of large corporations have had their networks hacked and clients’ credit card information compromised. Unfortunately, in some cases, an unsecured connection opened by their mechanical services company left their entire network vulnerable and ultimately hacked.

Although a company’s HVAC data is not normally thought of as highly sensitive data, an unsecured remote connection leaves your network vulnerable to attack. Some clients may use a dedicated network for the BAS connection, but without proper security, this remote connection could still be used in a distributed denial of service (DDoS) attack. A DDoS attack is the intentional paralyzing of a computer network by flooding it with data sent simultaneously from many individual computers or devices. A recent report written by Level 3 Threat Research Labs predict these attacks will become more and more common with the ever-increasing numbers of connected devices. “While compromised hosts and home routers continue to be targeted, bot herders will follow the path of least resistance. Before spending more energy on traditional bot hosts, they’ll take advantage of the abundance of insecure IoT devices.” The time is now to start taking these threats seriously.

In the past, BAS security has been handled by obscurity, allowing clients to put devices online and only giving access to key users. According to the 2015 Compass Intelligence’s Intelligent Building and Cybersecurity, Landmark Research Study, 70% of building owners are growing in popularity with 73% of building owners saying remote access to their buildings is critical. The lines between IT and operations are becoming very blurred with the converging of cybersecurity, connected equipment, and intelligent buildings.

Call Hunton Services to find out how we can help you ensure your system’s security.

BlogCalendarNewsNewsletterPartnersUncategorized
bas bas security building automation system cybersecurity network security

Related posts

Creating Comfort Through Humidity Control

Originally posted by Trane Blog on June 7, 2021. Life…

Blog June 15, 2021

Building Automation System Obsolescence: The Reality & The Options

One of the greatest challenges for any facility operating a…

Blog April 7, 2021
no comments

No comments yet

  • Categories

    • Blog
    • Calendar
    • News
    • Newsletter
    • Partners
    • Uncategorized
  • Recent Posts

    • Two Safety Awards, One Memorable Night: Our ISTC Awards Debut!
      May 2, 2025
    • Energy Management Beyond the Meter: How to Engineer Lasting Efficiency in Your Central Plant
      May 1, 2025
    • 6 Essential Steps For Preventative Boiler Maintenance
      March 24, 2025
    • 7th Annual Cool Rides & Hot Rods Car Show
      February 28, 2025
    • Houston BOMA
      February 28, 2025
  • Recent Comments

    • Archives

      • May 2025
      • March 2025
      • February 2025
      • January 2025
      • December 2024
      • October 2024
      • August 2024
      • June 2024
      • April 2024
      • March 2024
      • February 2024
      • December 2023
      • August 2023
      • July 2023
      • June 2023
      • May 2023
      • December 2022
      • October 2022
      • September 2022
      • July 2022
      • June 2022
      • May 2022
      • April 2022
      • March 2022
      • February 2022
      • January 2022
      • November 2021
      • October 2021
      • August 2021
      • July 2021
      • June 2021
      • May 2021
      • April 2021
      • March 2021
      • February 2021
      • January 2021
      • December 2020
      • November 2020
      • October 2020
      • September 2020
      • August 2020
      • July 2020
      • June 2020
      • May 2020
      • April 2020
      • March 2020
      • February 2020
      • January 2020
      • December 2019
      • November 2019
      • January 2019
      • October 2018
      • September 2018
      • August 2018
      • February 2018
      • December 2017
      • November 2017
    © 2024 Hunton Group
    now hiring HOW CAN WE HELP? RENTALS Request Service
    713 643-8336
    Manage your privacy
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Statistics

    Marketing

    Features
    Always active

    Always active
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    Manage options
    {title} {title} {title}