fnPrime



Best Practices for Securing BAS





OTHER PARTS OF THIS ARTICLEPt. 1: How To Know The Right Level of AutomationPt. 2: Missed Opportunities When Specifying or Operating BASPt. 3: Intriguing BAS Innovations FMs Should Have On Their RadarPt. 4: Optimal Life Cycle for a Typical BASPt. 5: This Page


With the recent security breaches at corporations like Target, what is the current thinking around best practices for properly securing the BAS?

Internet connectivity is highly desirable in building automation systems, but comes with critical responsibilities. The responsibility to secure these systems cannot lay with the customers. By adhering to IT best practices, and taking advantage of cloud computing and wireless technology, the buildings can enjoy powerful, convenient and secure BAS systems. Building automation systems’ rapid technical evolution has to include cutting edge security practices.
 
Answers by Raed Salem, director of MEP Engineering, Larson & Darby Group.




Contact FacilitiesNet Editorial Staff »

  posted on 7/3/2014   Article Use Policy




Related Topics: