Skip to main content
homecybersecurity and bems

Cybersecurity and BEMS

Publish date:

Project Sales Engineer

Meet our SSE Energy Solutions experts

What is Cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users via ransomware; or interrupting normal business processes.

Why is Cybersecurity Important?

The report “Trends in cyberattacks, exploits and Malware, 2023 Global Threat Roundup Report” by Forescout Research documents that more than 420 million cyberattacks worldwide were made between January and December 2023. This equates to more than 13 attacks per second and represents a 30% increase over 2022.

Examples

  • Barcelona: A cyberattack shut down a hospital’s labs and pharmacies, surgeries were cancelled, and sensitive information was uploaded to the dark web, with a €4.5M ransom demand.
  • Ireland: 180 houses lost water for two days due to a cyberattack targeting water pumps.
  • Iran: Centrifuges in a nuclear power plant were permanently decreased by 30% efficiency due to hackers accessing through PLCs.
  • Finland: A DDoS attack on a selection of buildings turned off the heating in freezing temperatures.
  • Saudi Arabia: An oil & gas plant’s safety control system was hacked through their Schneider Controllers.
  • USA: in 2023 Johnson Controls spent $27M on cyberattack ransoms and penalties.
  • Austria: Hotel guests were locked inside their rooms because the hackers targeted the booking system and demanded a Bitcoin ransom.

The report also provides a breakdown of the types of vulnerabilities that were exploited and shows that 3% of these attacks were achieved through building automation systems. That is 13 million attacks in 2023

Why are BEMS systems so vulnerable to Cyberattack?

System Vulnerabilities

Legacy Systems

Many buildings use outdated BEMS that were not designed with modern cybersecurity threats in mind.

Default Configurations

Systems often run with default passwords and configurations, making them easy targets for attackers.

Network Security

Insecure Communication Protocols

Data transmitted between BEMS components and to/from external networks can be intercepted if not properly encrypted.

Unauthorised Access

Inadequate access controls can lead to unauthorised access to the BEMS, allowing attackers to manipulate energy systems. Integration with Other Systems

IoT Integration

As BEMS integrates with other systems and IoT devices, the attack surface expands. Each connected device can be a potential entry point for cyberattacks.

Third-Party Services

Dependence on third-party cloud services for data storage and analytics can introduce additional vulnerabilities.

Physical Security

Access to Hardware

Physical access to BEMS hardware can lead to tampering or sabotage.

Insider Threats

Employees or contractors with malicious intent can exploit their access to the system.

Best Practices for Securing BEMS

Regular Updates and Patch Management

  • Ensure that all BEMS components are regularly updated with the latest security patches.

Strong Authentication and Access Controls

  • Implement multi-factor authentication (MFA) for accessing the BEMS.
  • Install a password management tool so that when employees leave, their access can be removed.
  • Define and enforce strict access control policies.

Network Security Measures

  • Use firewalls, intrusion detection/prevention systems (IDS/IPS), and virtual private networks (VPNs) to protect BEMS communications.
  • Segment the network to isolate BEMS from other IT infrastructure.

Encryption

Encrypt data at rest and in transit to prevent unauthorised access and data breaches.

Incident Response Planning

  • Develop and regularly update an incident response plan to quickly address any cybersecurity incidents.
  • Conduct regular drills and training sessions for staff.

Vulnerability Management

  • Perform regular vulnerability assessments and penetration testing to identify and mitigate potential security weaknesses.

Physical Security

  • Secure BEMS hardware in locked and monitored locations.
  • Implement security measures such as CCTV and access control systems.

User Training and Awareness

  • Educate employees and contractors about the importance of cybersecurity and best practices for maintaining security.

Conclusion

Cybersecurity is essential for the safe and reliable operation of Building Energy Management Systems. As BEMS become more interconnected with other systems and devices, the complexity and potential for security vulnerabilities increase. By implementing robust cybersecurity measures and staying vigilant, organisations can protect their BEMS from threats and ensure the continued efficiency and security of their energy management operations.

Talk to SSE about strengthening the security of your building systems

This article can be downloaded as a PDF