All fields are required.
Part 5: Best Practices for Securing BAS
July 2014 -
With the recent security breaches at corporations like Target, what is the current thinking around best practices for properly securing the BAS?Internet connectivity is highly desirable in building automation systems, but comes with critical responsibilities. The responsibility to secure these systems cannot lay with the customers. By adhering to IT best practices, and taking advantage of cloud computing and wireless technology, the buildings can enjoy powerful, convenient and secure BAS systems. Building automation systems’ rapid technical evolution has to include cutting edge security practices. Answers by Raed Salem, director of MEP Engineering, Larson & Darby Group.
Ask an Expert: Raed Salem, BAS
Part 1: How To Know The Right Level of Automation
Part 2: Missed Opportunities When Specifying or Operating BAS
Part 3: Intriguing BAS Innovations FMs Should Have On Their Radar
Part 4: Optimal Life Cycle for a Typical BAS