SIDEBAR: How To Focus on Mobile Security

SIDEBAR: How To Focus on Mobile Security

Part 3 of a 4-part cover story on how facility managers are making use of mobile technology to create efficiencies.

By Greg Zimmerman, Executive Editor  
OTHER PARTS OF THIS ARTICLEPt. 1: Facility Managers Use Mobile Technology To Access Information Anywhere, Be More EfficientPt. 2: Benefits of Mobile for Facility Managers: Time Saved, Faster Response Pt. 3: This PagePt. 4: SIDEBAR: How Mobile And the Building Internet of Things (IoT) Are Complementary

Even before, but especially after the 2013 attack on Target where hackers broke into the store’s network with stolen credentials from its HVAC vendor, facility managers very much focus on the security of any new technology initiative. That’s true for new mobile technology and devices as well. It’s not always up to the facility manager to implement security on mobile devices, so a good working relationship with IT is key. Beyond no-brainer measures like using passcodes on devices and wiping them if they go missing, here is advice from three facility managers on how to secure mobile technology:

Peter Strazdas, associate vice president of facilities management, Western Michigan University: “Nobody can access our data if they’re off our campus. The idea is that nobody can access our BIM data to plan something bad.” Facility managers use a virtual private network (VPN) to access BIM and CMMS data stored in the cloud.

Larry Morgan, senior facilities manager, SAP: “We work really closely with IT to make sure all technology is outside the SAP firewall. IT would prefer these building controls systems stay outside the firewall so if someone hacks into the BAS, the worst thing they can do is turn the air conditioning off. If inside the firewall, they can get to other systems.”

Jeffrey Tetrault, director of facilities and construction, Crouse Hospital: “Nothing resides on individual iPads; anything proprietary you have to ‘dial in’ through a Citrix app. IT has set up our system so iPads won’t work on another wireless access point other than our own.”
 — Greg Zimmerman

Contact FacilitiesNet Editorial Staff »

  posted on 3/7/2016   Article Use Policy

Related Topics: