{"id":18974,"date":"2017-10-28T05:00:44","date_gmt":"2017-10-28T12:00:44","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=18974"},"modified":"2026-02-22T15:28:54","modified_gmt":"2026-02-22T23:28:54","slug":"countering-threats","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/countering-threats\/","title":{"rendered":"Countering Threats"},"content":{"rendered":"<p>A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are increasing in frequency, s<a href=\"http:\/\/www.yardi.com\/blog\/technology\/smarter-buildings\/17911.html\/attachment\/shutterstock_297286526\" rel=\"attachment wp-att-17939\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-17939\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" \/><\/a>ophistication and impact.<\/p>\n<p>Don Goldstein, senior vice president of IT for CBRE, recounted how the \u201cNot Petya\u201d ransomware attack of June 2017 encrypted hundreds of thousands of computers around the world and shut down whole networks and systems for weeks.\u00a0 With the damage still being added up, the initial $850 million economic cost estimate could rise.<\/p>\n<p>\u201cNot Petya hit all verticals, from nuclear plants and pharmaceutical firms to steel makers, consumer lenders and law firms,\u201d Goldstein said.\u00a0 Cautioning against disaster fatigue, he added, \u201cWe need to get people to think about and prepare for this type of event.\u201d<\/p>\n<p>Ryan Allbaugh, business initiatives consultant for Wells Fargo, said that because internet of things (IoT) connected devices don\u2019t have traditional IT operating systems or antivirus and antimalware, cyberattacks are \u201cno longer an IT problem, but an operational problem\u201d for every part of the economy.<\/p>\n<p>As we see more IoT connections, everything is vulnerable, from remote lighting control to elevator and video surveillance controls, Allbaugh noted.\u00a0 \u201cThe challenge with IoT is that these systems often lack centralized visibility, and doing something as simple as getting a physical inventory can be a challenge,\u201d especially with widely dispersed properties.\u00a0 He outlined the National Institute of Standards and Technology <a href=\"http:\/\/www.nist.gov\/cyberframework\">Cybersecurity Framework<\/a>, which offers guidance on assessing and improving prevention, detection and response to cyberattacks.<\/p>\n<p>Lorie Wigle, general manager for Intel, noting that \u201cone company can\u2019t solve this on its own,\u201d urged collaboration and information sharing among IoT participants.\u00a0 \u201cWe need to have ongoing lifecycle security management services in place to continue to measure and detect compromises to components of end-to-end services,\u201d she said.<\/p>\n<p>Given that there\u2019s \u201cno silver bullet, no 100% security,\u201d Ken Malcolmson, executive security advisor for Microsoft, recommended offending hackers\u2019 business sensibilities by placing multilayered defenses across the attack chain, requiring attackers to devote prohibitive amounts of time, budget and attention to achieving their goals.<\/p>\n<p>Referring to insurance, occupant harm, liability, compliance and other issues, Marc Petock, vice president of marketing for Lynxspring, a builder of IoT technology, focused on the business impact of cybersecurity.\u00a0 Security boils down to two things for a company, he said: \u201cHow much risk are you willing to take, and how much will failure to be cybersecure cost you?\u201d\u00a0 With more than 4.6 million exposed building control devices in the U.S. alone, he said, \u201cthe value of making systems secure far outweighs the risk of not making them secure.\u201d<\/p>\n<p>Ron Victor, CEO and founder of secure network infrastructure company IoTium, advocated connecting buildings with a 100% \u201czero-touch\u201d cloud-managed solution that requires no field work and bakes in security at every level from the ground up.<\/p>\n<p>Yardi is experienced at keeping client data secure with cloud services that include data recovery, automatic encryption and the latest in intrusion prevention, security best practices and 24\/7 systems monitoring.\u00a0 Granular settings enable system administrators to create multiple levels of access for users.\u00a0 \u201cThe cyber security world changes very quickly.\u00a0 There is never a point at which you can say, \u2018We are done and we can now focus on something else.\u2019\u00a0 At Yardi, we are constantly reviewing the components we need to deploy to keep our client data safe,\u201d said Jay Shobe, vice president of technology.<\/p>\n<p><a href=\"http:\/\/www.yardi.com\/services\/yardi-cloud-security\/\">Learn more<\/a> about Yardi Cloud Security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are increasing in frequency, sophistication and impact. Don Goldstein, senior vice president of IT for CBRE, recounted how the \u201cNot Petya\u201d ransomware attack of June 2017 encrypted hundreds of thousands of computers around the world [&hellip;]<\/p>\n","protected":false},"author":610,"featured_media":17939,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"yes","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3245,4],"tags":[8,1640,1014,149,1829,1675],"class_list":["post-18974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commercial","category-news","tag-commercial","tag-cybersecurity","tag-internet-of-things","tag-realcomm","tag-smart-buildings","tag-yardi-energy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.yardi.com\/blog\/countering-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Countering Threats\" \/>\n<meta property=\"og:description\" content=\"A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/countering-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-28T12:00:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-22T23:28:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Joel Nelson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joel Nelson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/\",\"name\":\"Countering Threats - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg\",\"datePublished\":\"2017-10-28T12:00:44+00:00\",\"dateModified\":\"2026-02-22T23:28:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/04eb5f3b4bd7f02475913d5982a422c8\"},\"description\":\"A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/countering-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/countering-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Countering Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/04eb5f3b4bd7f02475913d5982a422c8\",\"name\":\"Joel Nelson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2026\/02\/JoelNelsonHeadshot.jpg?w=69\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2026\/02\/JoelNelsonHeadshot.jpg?w=69\",\"caption\":\"Joel Nelson\"},\"description\":\"Joel Nelson, senior marketing writer, joined Yardi in 2007. His byline has appeared in New York Real Estate Journal, Canadian Property Management and Los Angeles Lawyer, among others. He has won multiple awards from major professional organizations including the International Association of Business Communicators and Public Communicators of Los Angeles. Joel earned a bachelor\u2019s degree from Pomona College.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/joel-nelson-aa363113\/\"],\"url\":\"https:\/\/www.yardi.com\/blog\/author\/joel-nelson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.yardi.com\/blog\/countering-threats\/","og_locale":"en_US","og_type":"article","og_title":"Countering Threats","og_description":"A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are","og_url":"https:\/\/www.yardi.com\/blog\/countering-threats\/","og_site_name":"Yardi Blog","article_published_time":"2017-10-28T12:00:44+00:00","article_modified_time":"2026-02-22T23:28:54+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg","type":"image\/jpeg"}],"author":"Joel Nelson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Joel Nelson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/countering-threats\/","url":"https:\/\/www.yardi.com\/blog\/countering-threats\/","name":"Countering Threats - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/countering-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/countering-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg","datePublished":"2017-10-28T12:00:44+00:00","dateModified":"2026-02-22T23:28:54+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/04eb5f3b4bd7f02475913d5982a422c8"},"description":"A panel of corporate security experts held a recent Realcomm-hosted webinar to discuss strategies for managing cyberattacks to buildings that are","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/countering-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/countering-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/countering-threats\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/countering-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Countering Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/04eb5f3b4bd7f02475913d5982a422c8","name":"Joel Nelson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2026\/02\/JoelNelsonHeadshot.jpg?w=69","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2026\/02\/JoelNelsonHeadshot.jpg?w=69","caption":"Joel Nelson"},"description":"Joel Nelson, senior marketing writer, joined Yardi in 2007. His byline has appeared in New York Real Estate Journal, Canadian Property Management and Los Angeles Lawyer, among others. He has won multiple awards from major professional organizations including the International Association of Business Communicators and Public Communicators of Los Angeles. Joel earned a bachelor\u2019s degree from Pomona College.","sameAs":["https:\/\/www.linkedin.com\/in\/joel-nelson-aa363113\/"],"url":"https:\/\/www.yardi.com\/blog\/author\/joel-nelson\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2017\/05\/shutterstock_297286526.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/18974","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/610"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=18974"}],"version-history":[{"count":1,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/18974\/revisions"}],"predecessor-version":[{"id":18975,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/18974\/revisions\/18975"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/17939"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=18974"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=18974"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=18974"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}