Cybersecurity and Ransomware – It can get ugly when a hacker takes control of your smart building
Cyber risk affects businesses of every size and industry. A data breach can lead to negative publicity, loss of customer confidence and potential lawsuits. There can be a variety of unanticipated – and costly – business disruptions.
Just ask the owners of the Romantik Seehotel Jaegerwirt hotel, in the Austrian Alps, which recently had their systems frozen by hackers, resulting in the complete shutdown of hotel computers. The hackers breached the hotel’s key card system, making it impossible for guests to enter their rooms and preventing the hotel from reprogramming the cards.
The hackers did not scrape guests’ credit card data, as has happened with other hotel data breaches, but instead demanded a ransom payable in Bitcoin. The Romantik Seehotel Jaegerwirt – which was fully occupied at the beginning of ski season – paid the ransom, at which time control of the key card system was restored.
While highly disruptive, it’s easy to imagine how it could have been worse. Fortunately, the hotel located and fixed the backdoor left by the hackers (which the hackers tried to exploit almost immediately) and secured their systems.
Vulnerability to hackers seeking to take control of a building’s system is a very real threat to organizations of all kinds: hospitals, hotels, law firms, research facilities, banks, retailers – virtually any kind of business that is housed in a “smart” building. Continue reading




One of the great frustrations in contemplating a data security program is that there is no such thing as a one-size-fits-all solution. There is no law or regulation that specifies the exact steps a company needs to take in order achieve data security. While there are some regulatory and industry recognized compliance programs – like health law requirements under HIPPA and the data security standards established by the Payment Card Industry – these provide compliance guidelines, not actual data security. And these compliance guidelines themselves emphasize that each firm must establish security standards which meet the requirements of their business operations.
One of the challenges – perhaps the biggest challenge – to achieving cybersecurity is complexity. Every day we are faced with new threats as hackers display their creativity and new technologies and approaches to addressing those threats. Governments, both U.S. and foreign, regularly propose laws and regulations better to protect us – and to confuse us. And underlying all of it is technical language which seems designed to prevent us from understanding the challenge of cybersecurity.
In Michael Gold’s commentary, “