August 2014
Article
AutomatedBuildings.com

True Analytics™ - Energy Savings, Comfort, and Operational Efficiency
Ecorithm - Cloud-Based Analytics Software

(Click Message to Learn More)


Cyber Security

Points That Need to be Part of the Conversation

Marc Petock


Marc Petock,
Vice President,
Marketing
Lynxspring & Connexx Energy


Articles
Interviews
Releases
New Products
Reviews
Blue Ridge Technologies
Editorial
Events
Sponsors
Site Search
Newsletters
Cube
Archives
Past Issues
Home
Editors
eDucation
Belimo
Training
Links
Software
Subscribe
Distech Controls

Not long ago, cybersecurity was a term rarely, if ever, heard. Those days are gone. Cyber security has emerged as a top priority in today’s connected world. Organizations are increasingly vulnerable as a result of a changing workplace, remote access, big data, cloud computing, social media and mobile technology and more.

With the litany of high profile cybersecurity hacks—cybersecurity has become an increasingly challenging risk that must addressed. It continues to be one of the most dynamic issues within our industry as well.

Today’s connected business world means there are thousands of entry points in and out of companies. These exploding number of access points means our firewalls can have thousands of openings. What has been traditionally seen as a simple component of an organization’s infrastructure – throwing a firewall and antivirus solution down as adequate cyber threat protection has evolved into something that can keep you awake at night. The truth is that network security does not work as well as we thought.

Hacks, breaches, vulnerabilities, threats we can’t ignore them. They are undesired events. Cyber threats are changing constantly. Threats are targeted, and they continue to get even more targeted. It used to be a virus was thrown out there and whomever it hit, it hit. Now the attackers are going after specific companies and systems trying to steal specific information or cause DoS attacks against specific systems or use networked devices as pivot points to gain access into a business network. In addition, there are many unpatched systems, hackers scanning for vulnerability in systems, and cyber criminals using a variety “things” every day to break into companies. And there are thousands and thousands of exposed, unprotected devices on the Internet that are inviting unwanted persons to come right in.

The topic of cybersecurity is a complex issue. There's probably no issue that has become more crucial, more rapidly, but is less understood. There are many factors that influence cyber security; however, we must set expectations first. Cyber threats can be recognized and understood, detected, resolved and managed, but never completely eliminated.

Reliable Controls When it comes to cyber security, understanding the issues, being informed, knowing what the implications are and engaging in dialogues about cyber security are critical. To help you with your conversations here is a link to our new Executive Briefing entitled Cybersecurity. Points That Need to be Part of the Conversation.

http://lynxspring.com/documents/cyber-security-executive-briefing.pdf

In addition, the LYNX CyberPRO Newsroom has a variety of industry information and news related to cyber security.

http://lynxcyberpro.com/company/newsroom

Cyber related issues play a growing role within our building networks and systems. They are not immune to attacks. Don’t underestimate the potential for cyber vulnerabilities. It only takes one breach to compromise the whole infrastructure and cause a serious issue. The best way to approach cyber threats is to realize one simple truth: It is not if an attack will happen; it is only when. It is all of our responsibility to take an active role.

More great reading from Marc Trends to Keep Your Eyes On published in our January 2014 issue.





 

footer

Haystack Connect 2015
[Click Banner To Learn More]

[Home Page]  [The Automator]  [About]  [Subscribe ]  [Contact Us]

Events

Want Ads

Our Sponsors

Resources