{"id":8955,"date":"2024-04-28T15:09:27","date_gmt":"2024-04-28T15:09:27","guid":{"rendered":"https:\/\/wisebuilding.pt\/cybersecurity-in-technical-building-management-systems\/"},"modified":"2024-04-28T15:09:35","modified_gmt":"2024-04-28T15:09:35","slug":"cybersecurity-in-technical-building-management-systems","status":"publish","type":"post","link":"https:\/\/wisebuilding.pt\/en\/cybersecurity-in-technical-building-management-systems\/","title":{"rendered":"Cybersecurity in Technical Building Management Systems"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8955\" class=\"elementor elementor-8955 elementor-8884\">\n\t\t\t\t\t\t<main class=\"elementor-section elementor-top-section elementor-element elementor-element-18df198 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"18df198\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e8887f1\" data-id=\"e8887f1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dff499f flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"dff499f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">No ghosts in the machine<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9821f37 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"9821f37\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Imagine a completely automated city, where every building is a living organism, pulsating with electronic systems that regulate everything from energy consumption to the safety of its occupants. In a forgotten corner of this technological landscape, a hacker, thousands of kilometres away, inserts a line of malicious code that spreads like a virus. Within minutes, harmony gives way to chaos, with lifts stopped, lights flashing erratically, and security systems disabled. This scenario is not taken from a science fiction film, but a tangible possibility in the world of <strong><a href=\"https:\/\/wisebuilding.pt\/en\/building-management-system\/\" target=\"_blank\" rel=\"noopener\"><span style=\"color: #77c5d5;\">building management systems<\/span><\/a><\/strong>, where cybersecurity is a fundamental element.   <\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d9b65eb\" data-id=\"d9b65eb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-84d6150 e-transform elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-video\" data-id=\"84d6150\" data-element_type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;hosted&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;mute&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;_transform_flipX_effect&quot;:&quot;transform&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"e-hosted-video elementor-wrapper elementor-open-inline\">\n\t\t\t\t\t<video class=\"elementor-video\" src=\"https:\/\/wisebuilding.pt\/wp-content\/uploads\/2024\/04\/cyber-security-lciberseguranca-gtc-bms-sace.mp4\" autoplay=\"\" loop=\"\" muted=\"muted\" controlsList=\"nodownload\"><\/video>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/main>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f695b96 elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"f695b96\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:250}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-348b105\" data-id=\"348b105\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-be45aa9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be45aa9\" data-element_type=\"section\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c0742b3\" data-id=\"c0742b3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-300315a flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-image\" data-id=\"300315a\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<img width=\"800\" height=\"420\" src=\"https:\/\/wisebuilding.pt\/wp-content\/uploads\/2024\/04\/ciberseguranca-no-GTC-SACE.png\" class=\"attachment-large size-large wp-image-8900\" alt=\"ciberseguranc\u0327a no GTC SACE\" srcset=\"https:\/\/wisebuilding.pt\/wp-content\/uploads\/2024\/04\/ciberseguranca-no-GTC-SACE.png 800w, https:\/\/wisebuilding.pt\/wp-content\/uploads\/2024\/04\/ciberseguranca-no-GTC-SACE-300x158.png 300w, https:\/\/wisebuilding.pt\/wp-content\/uploads\/2024\/04\/ciberseguranca-no-GTC-SACE-768x403.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" title=\"Cybersecurity in Technical Building Management Systems\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-e47b067\" data-id=\"e47b067\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de9c283 elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"de9c283\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Threat Profile for Technical Management Systems<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aff2108 elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"aff2108\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>In today&#8217;s context, it is crucial to be aware of the threats that can affect critical infrastructures such as energy, medical and other systems. Such threats include ransomware intrusions that can disrupt operations and sensitive data leaks due to outdated software. Denial-of-service (DoS) attacks that can paralyse entire systems, and phishing, which aims to trick individuals into divulging confidential information, as well as attacks targeting poorly protected network interfaces, allowing unauthorised access to control systems. All of this decreases <i>uptime<\/i> and undermines trust<i>. <\/i> However, with significant technological advances in incident detection and response, organisations are able to maintain effective control over these risks without cause for excessive alarm. Modern security strategies ensure that most threats are managed proactively and efficiently.    <\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<div class=\"elementor-element elementor-element-60ed20e elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"60ed20e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Barriers and Armour: Technologies and Defence Strategies<\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cd18c1 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"6cd18c1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Implementing robust defences is essential to protecting SGTE. In addition to traditional practices such as firewalls and anti-virus, emerging technologies are being adopted: <\/p>\n<ul>\n<li><strong>AI-enhanced Detection and Response Systems:<\/strong> These systems use artificial intelligence to detect unusual attack patterns, continuously learning to improve detection. The BrainBox AI technology we use has a <a href=\"https:\/\/securityscorecard.com\/security-rating\/brainboxai.com\" target=\"_blank\" rel=\"nofollow noopener\">Security Scorecard Rating &#8220;A&#8221; of 97 per cent.<\/a> <\/li>\n<li><strong>Integrated Encryption Systems: <\/strong> <a href=\"https:\/\/bacnetinternational.org\/bacnetsc\/\" target=\"_blank\" rel=\"nofollow noopener\">BACnet Secure Connect <\/a> (BACnet\/SC) is an extension of the BACnet protocol (the global data communications standard for building automation that we use at WiseBuilding) that provides a secure, encrypted communication layer for IP networks in building automation systems. This protocol uses WebSockets and TLS to guarantee peer authentication, message encryption and reliable, connection-orientated communication. With this, BACnet\/SC allows devices within building automation systems to establish secure connections, transmitting BACnet messages securely and privately, essential for applications sensitive to cybersecurity issues, on a par with banking applications. <\/li>\n<\/ul>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3e8be67 elementor-section-content-middle elementor-reverse-mobile elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"3e8be67\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;animation_delay&quot;:500}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-771c27b\" data-id=\"771c27b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0251469 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"0251469\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"title-h4 elementor-heading-title elementor-size-default\">Real Consequences: Case Studies and Impact Analyses\n<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-feaed11 elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"feaed11\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>Cyber attacks have significant financial consequences for the organisations affected. For example, the WannaCry ransomware attack cost the UK&#8217;s National Health Service more than 100 million dollars, according to data from 2023. In addition, the average cost of a data breach in financial services can reach up to 4.45 million dollars, highlighting the high vulnerability and costs associated with these incidents in critical sectors. <span class=\"\" data-state=\"closed\"><span class=\"text-token-text-secondary\">(<\/span> <a class=\"text-green-600 !no-underline\" href=\"https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\" target=\"_blank\" rel=\"nofollow noopener\">varonis<\/a> <span class=\"text-token-text-secondary\"> )<\/span>\u200b.<\/span>  <\/p>\n<p>As far as mitigation strategies are concerned, the adoption of a zero-trust architecture is highly recommended to address the risks arising from remote access and integration with the Internet of Things (IoT), which can create significant vulnerabilities (McKinsey &amp; Company). <\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-78feee0\" data-id=\"78feee0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-665b7e3 elementor-widget__width-initial flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-lottie\" data-id=\"665b7e3\" data-element_type=\"widget\" data-widget_type=\"lottie.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e02b5ab elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"e02b5ab\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;animation_delay&quot;:1000}\">\r\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\r\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c22a9f3\" data-id=\"c22a9f3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65e890b flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"65e890b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Navigating the Future of Cybersecurity <\/h4>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-34cf99f flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"34cf99f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>The industry is moving towards a more holistic approach to cybersecurity, which not only responds to incidents, but also anticipates and prevents them. The development of stricter security standards and protocols, along with an integrated security culture, are critical steps for the future. <\/p>\n<p>However, it is crucial to recognise the growing sophistication and frequency of attacks. Studies indicate that more than 40 per cent of industrial systems connected to the Internet have been the target of intrusion attempts in the last two years. What&#8217;s more, techniques such as network segmentation have reduced security incidents by 55%, demonstrating the effectiveness of modern defences. The implementation of artificial intelligence and machine learning is also catching on, with forecasts suggesting that 60 per cent of security operations in smart buildings will be automated by 2025, providing faster and more accurate responses to threats.   <\/p>\n<p>The evolution of technical management systems brings numerous advantages to building management, but it also increases the responsibility of protecting these systems against threats. <strong>Is your building protected?<\/strong><\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-30a45b7 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"30a45b7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:1250}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c67214d\" data-id=\"c67214d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a294fc5 elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"a294fc5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>WiseBuilding\u00ae is technically qualified <strong>to support any project that includes the integration of GTC\/SACE, IoT, automation and energy management systems without ever losing focus on safety. <\/strong> <a href=\"https:\/\/wisebuilding.pt\/en\/wisebuilding-contacts\/\" target=\"_blank\" rel=\"noopener\">Contact us.<\/a><\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-18d814a elementor-reverse-tablet elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18d814a\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-ce7306e\" data-id=\"ce7306e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6972777 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-heading\" data-id=\"6972777\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"title-h4 elementor-heading-title elementor-size-default\"><span style=\"letter-spacing: 1.2px;\">WISEFRAMEWORK<\/span> - The certified and customised solution.<\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed20329 elementor-widget-mobile__width-inherit flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-text-editor\" data-id=\"ed20329\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\t<p>WISEFRAMEWORK is a BACnet B-AWS certified software solution for state-of-the-art integration, control, management and visualization in building automation systems. Designed to redefine the way buildings are operated through an open platform and seamless harmonization between building-generated data by supporting multiple protocols including BACnet, Modbus, KNX, OPC-UA and MQTT. Through the use of Haystack technology, the software also empowers the building for the future at the forefront in the integration of the various technical systems.  <\/p>\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0500610\" data-id=\"0500610\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ffaefc2 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-thegem-styledimage\" data-id=\"ffaefc2\" data-element_type=\"widget\" data-settings=\"{&quot;image&quot;:{&quot;url&quot;:&quot;https:\\\/\\\/wisebuilding.pt\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/wiseframework_app.png&quot;,&quot;id&quot;:5715,&quot;size&quot;:&quot;&quot;,&quot;alt&quot;:&quot;wiseframework app&quot;,&quot;source&quot;:&quot;library&quot;},&quot;_animation&quot;:&quot;fadeInUp&quot;,&quot;thegem_elementor_preset&quot;:&quot;default&quot;,&quot;icon_show&quot;:&quot;yes&quot;}\" data-widget_type=\"thegem-styledimage.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\n<div class=\"styled-image-wrapper\">\n\t\t\t<div class=\"gem-image gem-wrapbox gem-wrapbox-default gem-wrapbox-position-left lazy-loading \">\n\t\t\t<div class=\"gem-wrapbox-inner  lazy-loading-item\"  data-ll-effect=\"move-up\">\n\t\t\t\t\t\t\t\t<a href=\"https:\/\/wisebuilding.pt\/wp-content\/uploads\/2022\/10\/wiseframework_app.png\" class=\"fancybox\">\n\t\t\t\t\t\t\t\t\t\t<img class=\"gem-wrapbox-element img-responsive \"\n\t\t\t\t\t\t src=\"https:\/\/wisebuilding.pt\/wp-content\/uploads\/2022\/10\/wiseframework_app.png\"\n\t\t\t\t\t\t alt=\"wiseframework_app\">\n\t\t\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-camera\"><\/i>\t\t\t\t<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/div>\n\n\n\t\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>A completely automated city, where every building is a living organism, pulsating with electronic systems that regulate everything. In a forgotten corner, a hacker, thousands of kilometres away, inserts a line of malicious code&#8230; <\/p>\n","protected":false},"author":2,"featured_media":8890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"single-fullwidth.php","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"Cybersecurity in Technical Building Management Systems","_seopress_titles_desc":"Cybersecurity in Technical Building Management Systems as a fundamental element","_seopress_robots_index":"","footnotes":""},"categories":[47,190],"tags":[80,79,192,191],"class_list":{"0":"post-8955","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-bms","8":"category-security","9":"tag-bms-en","10":"tag-bms","11":"tag-cybersecurity","12":"tag-security"},"menu_order":0,"_links":{"self":[{"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/posts\/8955"}],"collection":[{"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/comments?post=8955"}],"version-history":[{"count":1,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/posts\/8955\/revisions"}],"predecessor-version":[{"id":8957,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/posts\/8955\/revisions\/8957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/media\/8890"}],"wp:attachment":[{"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/media?parent=8955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/categories?post=8955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wisebuilding.pt\/en\/wp-json\/wp\/v2\/tags?post=8955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}