<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
  <channel>
    <atom:link href="http://reccinc.org/page-18078/BlogPost/6134165/RSS" rel="self" type="application/rss+xml" />
    <title>Real Estate Cyber Consortium Best Practices</title>
    <link>https://reccinc.org/</link>
    <description>Real Estate Cyber Consortium blog posts</description>
    <dc:creator>Real Estate Cyber Consortium</dc:creator>
    <generator>Wild Apricot - membership management software and more</generator>
    <language>en</language>
    <pubDate>Fri, 03 Apr 2026 04:56:47 GMT</pubDate>
    <lastBuildDate>Fri, 03 Apr 2026 04:56:47 GMT</lastBuildDate>
    <item>
      <pubDate>Sat, 07 Jan 2023 01:00:00 GMT</pubDate>
      <title>RECC Tips for Getting Started with Building Cybersecurity</title>
      <description>&lt;div&gt;
  &lt;h1 align="left" style="line-height: 28px;"&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font style="font-weight: normal; font-size: 20px;"&gt;Organizations may be just starting their journey, or further along. We offer these tips and suggestions for anyone starting on their journey.*&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/h1&gt;
&lt;/div&gt;

&lt;ul&gt;
  &lt;li&gt;
    &lt;p style="line-height: 36px;"&gt;&lt;font style="font-size: 20px;"&gt;Smart Building Security should follow the same process patterns provided by &lt;a href="https://us-cert.cisa.gov/" title="Open link" target="_blank"&gt;US-CERT&lt;/a&gt; (Cyber Emergency Response Team), &lt;a href="https://www.cisecurity.org/" title="Open link" target="_blank"&gt;CIS&lt;/a&gt; (Center for Internet Security), &lt;a href="https://www.nist.gov/" title="Open link" target="_blank"&gt;NIST&lt;/a&gt;. The models all follow a &lt;em&gt;Plan&lt;/em&gt;-&lt;em&gt;Do&lt;/em&gt;-&lt;em&gt;Check&lt;/em&gt;-&lt;em&gt;Act&lt;/em&gt; process.&lt;/font&gt;&lt;/p&gt;
  &lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;&lt;font&gt;Pick a&lt;/font&gt; &lt;a href="https://en.wikipedia.org/wiki/Cybersecurity_standards" title="Open link" target="_blank" style=""&gt;&lt;font&gt;national/international security standard&lt;/font&gt;&lt;/a&gt; &lt;font&gt;and audit against it.&lt;/font&gt;&lt;br&gt;
  &lt;font&gt;(&lt;a href="https://www.isa.org/products/isa-62443-1-1-2007-security-for-industrial-automat" title="Open link" target="_blank" style=""&gt;ISA/IEC 62443&lt;/a&gt;, &lt;a href="https://www.iso.org/isoiec-27001-information-security.html" target="_blank" style=""&gt;ISO/IEC 27001&lt;/a&gt;, &lt;a href="https://www.mitre.org/capabilities/cybersecurity/overview/cybersecurity-resources/standards" title="Open link" target="_blank" style=""&gt;MITRE&lt;/a&gt;, &lt;a href="https://www.etsi.org/deliver/etsi_en/303600_303699/303645/02.01.01_60/en_303645v020101p.pdf" title="Open link" target="_blank" style=""&gt;ETSI EN 303 645&lt;/a&gt;, &lt;a href="https://www.nist.gov/cyberframework" title="Open link" target="_blank" style=""&gt;NIST CSF&lt;/a&gt;, &lt;a href="https://en.wikipedia.org/wiki/FIPS_140" title="Open link" target="_blank" style=""&gt;FIPS 140&lt;/a&gt;, &lt;a href="https://www.pcisecuritystandards.org/merchants/" title="Open link" target="_blank" style=""&gt;PCI DSS&lt;/a&gt;, &lt;a href="https://standardscatalog.ul.com/ProductDetail.aspx?productId=UL2900-1" title="Open link" target="_blank" style=""&gt;UL 2900&lt;/a&gt;)&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

  &lt;li style="list-style: none; display: inline"&gt;
    &lt;ul&gt;
      &lt;li&gt;&lt;font style="font-size: 20px;"&gt;&lt;font&gt;Refine your policy&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font style="font-size: 20px;"&gt;&lt;font&gt;Refine your standard operating procedures&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font style="font-size: 20px;"&gt;&lt;font&gt;Ensure you have a sustained annual budget&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;

      &lt;li&gt;&lt;font style="font-size: 20px;"&gt;&lt;font&gt;Define and communicate roles and responsibilities&lt;/font&gt;&lt;/font&gt;&lt;/li&gt;
    &lt;/ul&gt;
  &lt;/li&gt;

  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Have trained and competent security staff in-house, or on contract&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Define security metrics for continuous improvement&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Put cascading security expectations in &lt;font&gt;Vendor contracts and&lt;/font&gt;&amp;nbsp;audit against national/international recognized standards&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Harden field-based devices&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Ensure strong password management and that no default passwords are used&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Consider having passwords externally tested for security&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Identify a &lt;a href="https://en.wikipedia.org/wiki/Computer_emergency_response_team" title="Open link" target="_blank"&gt;Cybersecurity Incident Response Team (CSIRT)&lt;/a&gt;&amp;nbsp;and perform tabletop resilience exercises:&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
  &lt;font style="font-size: 20px;"&gt;&lt;font&gt;Identify –&amp;nbsp;Protect – Detect – Respond – Recover&lt;/font&gt;&lt;/font&gt;
&lt;/blockquote&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Educate the workforce to be &lt;em&gt;deputies in security.&lt;/em&gt; &lt;span&gt;If they receive or see something unusual they should report it.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Rights and roles should use &lt;a href="https://us-cert.cisa.gov/bsi/articles/knowledge/principles/least-privilege" title="Open link" target="_blank"&gt;least privileges&lt;/a&gt;&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Keep systems current with security software updates&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Ensure a properly configured firewall protects the network&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Segregate corporate networks from BMS networks (IT vs OT separation)&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Restrict or deny the use of USB flash drives&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Encrypt &lt;a href="https://en.wikipedia.org/wiki/Data_in_transit" title="Open link" target="_blank"&gt;data in transit&lt;/a&gt; and &lt;a href="https://en.wikipedia.org/wiki/Data_at_rest" title="Open link" target="_blank"&gt;at rest&lt;/a&gt; within your systems&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Consider an "assumed breach" model – establish tiered access control, identify choke points, segment assets, and install detection capabilities&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;ul style="line-height: 36px;"&gt;
  &lt;li&gt;&lt;font style="font-size: 20px;"&gt;Consider &lt;a href="https://en.wikipedia.org/wiki/Zero_trust_security_model" title="Open link" target="_blank" style=""&gt;zero trust managed networks&lt;/a&gt;.&lt;/font&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font style="font-weight: normal;"&gt;&lt;font style="font-weight: normal; font-size: 12px;"&gt;* RECC makes no warranties on these recommendations.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://reccinc.org/BestPractices/12152472</link>
      <guid>https://reccinc.org/BestPractices/12152472</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 06 Jan 2023 20:30:00 GMT</pubDate>
      <title>IT Security for OT Systems</title>
      <description>&lt;p&gt;&lt;font&gt;&lt;font style=""&gt;&lt;font style="font-size: 20px;"&gt;Click for:&amp;nbsp;&lt;/font&gt;&lt;/font&gt;&lt;a href="https://reccinc.org/resources/Documents/BP/IT%20Security%20for%20OT%20Systems.pdf" title="Open PDF" target="_blank" class="stylizedButton buttonStyle003" style=""&gt;&lt;font style="font-size: 24px;"&gt;IT Security Best Practices for OT Systems&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font&gt;&lt;font style="font-size: 20px;"&gt;Building Operational Technology (OT), considered a subset of Internet of Things (IoT) technology, broadly refers to systems used to control and monitor critical physical processes within buildings. Unique aspects of OT systems and devices demand modified approaches to minimizing cyber security risk. This best practice list serves as a summarization of industry best practice by corporate, commercial, educational and governmental real estate professionals focused on the design, installation, commissioning, operations, and maintenance of next generation BuildingOperational Technology.&lt;/font&gt;&lt;br&gt;&lt;/font&gt;&lt;/p&gt;</description>
      <link>https://reccinc.org/BestPractices/12152478</link>
      <guid>https://reccinc.org/BestPractices/12152478</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 06 Jan 2023 20:00:00 GMT</pubDate>
      <title>IT Security Assessment for OT Systems</title>
      <description>&lt;p&gt;&lt;font color="#000000"&gt;&lt;font style=""&gt;&lt;font style="font-size: 20px;"&gt;Click for:&lt;/font&gt;&lt;/font&gt; &lt;a href="https://reccinc.org/resources/Documents/BP/IT%20Security%20Assessment%20for%20OT%20Systems.pdf" title="Open PDF" target="_blank" class="stylizedButton buttonStyle003" style=""&gt;&lt;font style="font-size: 24px;"&gt;IT Security Assessment for OT Systems&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;font color="#000000" style="font-size: 20px;"&gt;This questionnaire views building Operational Technology through the lens of an IT security assessment. The modular nature of the questionnaire provides the ability to quickly identify questions for each a specific assessment phase.&lt;/font&gt;&lt;/p&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://reccinc.org/BestPractices/12152522</link>
      <guid>https://reccinc.org/BestPractices/12152522</guid>
      <dc:creator />
    </item>
    <item>
      <pubDate>Fri, 06 Jan 2023 19:30:00 GMT</pubDate>
      <title>Supply Chain Security for OT Systems</title>
      <description>&lt;p&gt;&lt;font color="#000000"&gt;&lt;font style=""&gt;&lt;font style="font-size: 20px;"&gt;Click for:&lt;/font&gt;&lt;/font&gt; &lt;a href="https://reccinc.org/resources/Documents/BP/Industry%20Supply%20Chain%20for%20Securing%20OT%20Systems.pdf" title="Open PDF" target="_blank" class="stylizedButton buttonStyle003" style=""&gt;&lt;font style="font-size: 24px;"&gt;Supply Chain Guidelines for OT Systems&lt;/font&gt;&lt;/a&gt;&lt;/font&gt;&lt;/p&gt;&lt;font style="font-size: 20px;"&gt;&lt;font&gt;&lt;font color="#000000"&gt;Guiding Principles to Improve Vendor Cyber Security Contract Requirements are sourcing and contract guidelines to help improve cyber security protections in all aspects of the building technology supply chain.&lt;/font&gt;&lt;/font&gt;&lt;/font&gt;

&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <link>https://reccinc.org/BestPractices/12152530</link>
      <guid>https://reccinc.org/BestPractices/12152530</guid>
      <dc:creator />
    </item>
  </channel>
</rss>