Smart Office

Make your job easier, not the hacker’s.

The Smart Office is a rapidly evolving concept. It consists of integrating technologies into work environments, in order to facilitate a series of common tasks in the daily organisation of work. The goal is to gain flexibility and productivity and allow employees to focus on their essential tasks. Beacons, sensors and mobile applications constitute the basic building blocks of the Smart Office which make it possible to streamline or even automate a large number of processes. Example: a connected coffee machine allows you to better manage its operation as well as the coffee supply, but be careful: a coffee machine can pose risks to your privacy and the security of your data.

Advantages:


• Comfort in the workplace
• Security
• Employee productivity
• Optimised use of space
• Reduced energy consumption

The ingredients of the Smart Office are in particular:


• Smart sensors (e.g.: to measure air quality, movements, temperature, etc.)
• Remote control applications
• Real-time space reservation applications, to optimise space occupancy
• Applications with indoor location
• Digitised access badges, guaranteeing simplified security
• Collaborative applications that simplify teamwork
• Video conferencing systems.

Main risks

Protection tips

Network

Once you have made your choice for an IoT product, it is important to identify it and know what the properties of the product are that you integrate into your computer network. By taking an inventory of all connected devices and their particular characteristics, normal activities can be separated from suspicious or unwanted ones. Regular monitoring of the local area network (Wi-Fi), connected devices and their activity will also detect any problems and close doors when they are no longer in use.
Multiple IoT security vulnerabilities cannot always be controlled. The residual risk that a potential attacker could exploit one of these flaws and thus interfere with the local computer network remains very high. If other mission-critical applications are hosted on the same internal network, it is strongly recommended to separate this network into several segments. One logical segment or network should host and/or interconnect the IoT devices, while a second dissociated network would be used exclusively for the hosting of critical information systems.
Certain network elements (routers and firewall for example) allow filtering the information circulating between two networks or network segments. The filtering can, for example, relate to the source or destination addresses and ports, communication protocols, content, bandwidth or the volume of information. In the case of network segmentation, it would thus be possible to filter information exchanged between two segments and, for example, only accept connections between devices identified beforehand according to a well-defined exchange protocol.