Cyberattacks are on the rise, with three out of four companies in the United States at risk of a material breach. (1) In 2024, the global average cost of a data breach reached $4.88 million, while breaches in the U.S. were even more costly, averaging $9.36 million per incident. (2) The smart building market—valued at $117.42 billion last year—is not immune to these challenges. (3) “As connected systems become more complex, they face significant cybersecurity risks, especially since these systems manage sensitive information such as user data, access credentials, and operational metrics,” highlights Fabio Zaniboni, Founder and CEO of BubblyNet. “This calls for a comprehensive response: As cyberattacks evolve, so must the systems designed to prevent them.”

Cyber Technology Insights: Telenor Norway Launches Call Protection Against Fraud

Keeping Data on the Edge: The Key to Cybersecurity in Smart Buildings
One of the biggest trends in the smart building sector for 2025 is edge computing, with adoption accelerating as 33% of companies have already implemented it. (4) This technology is emerging as a crucial solution for real-time threat detection and mitigation. By processing data closer to the source, edge computing reduces latency, enhances security, and minimizes bandwidth overload. (5) As more smart buildings integrate AI-driven automation, edge computing will become key to strengthening cybersecurity defenses.

“The more data we extract and use at the edge, the less it moves to the cloud—and the less accessible it becomes to malicious attacks,” — Fabio Zaniboni, Founder and CEO of BubblyNet

Traditional smart building systems rely on cloud-based controls for operations like lighting, ventilation, and security. However, this reliance on cloud communication creates a gateway for cyberattacks. “When you open that channel, someone can exploit it to breach the system or disrupt critical operations,” Zaniboni warns.

That’s why, in response to growing cybersecurity threats, BubblyNet has designed airgapped solutions that operate in isolation, eliminating external access points and significantly reducing the likelihood of breaches. “The more data we extract and use at the edge, the less it moves to the cloud—and the less accessible it becomes to malicious attacks,” points out Zaniboni.

As data becomes increasingly decentralized—Gartner estimates that by 2025, 75% of all data will be generated outside traditional data centers and cloud environments—the need for secure, edge-based solutions is more critical than ever. (6) BubblyNet’s system addresses this challenge with a robust 256-bit encryption key, the same standard recommended by the U.S. government for securing highly sensitive data. (7) “With no cloud dependencies and advanced encryption, there is no back door for a hacker to exploit,” emphasizes Zaniboni.

Privacy – Protecting Data at the Hardware Level
One of the factors that make data managed by smart buildings so sensitive is its connection to people’s actions and behaviors. To automate functions like HVAC, lighting, and security, these systems must collect information related to occupants’ activities. BubblyNet addresses this challenge at the source, deploying devices that ensure only the minimum necessary data is processed and shared, safeguarding user privacy from the very beginning.

For example, instead of recording and transmitting full audio streams, BubblyNet’s technology employs microphones that act as decibel sensors rather than traditional recording devices. “Let’s say we are working for a big hotel in Las Vegas, and our client asks us to implement gunshot detection. The technology we’d use in that case would be hardware encoded to detect only specific sound patterns. It would analyze a sound wave with a decibel spike, triggering a simple ‘yes’ or ‘no’ signal, without recording conversations or compromising the privacy of guests,” explains Zaniboni.

This same principle applies to BubblyNet’s People Counting (PC) technology, which leverages thermal motion sensors to differentiate between objects and human presence without capturing identity features. (8) “By using low-resolution infrared sensors, we can only detect whether there’s a person or another infrared source,” continues Zaniboni. “Video cameras were discarded for this application because of the data volume and the privacy and security challenges video and face recognition pose. We always tailor the hardware to ensure no data unnecessary for the application is captured.”

No Backdoors, No Breaches: The Future of Smart Building Security with BubblyNet
As a third safety net against cyberattacks, BubblyNet leverages Bluetooth® Mesh technology to safeguard all client information. This system enhances encryption and authentication at multiple levels, preventing unauthorized access while operating under highly secure protocols.

These three layers of protection ensure that personal or sensitive information remains private, even in environments like hotels or offices. “At BubblyNet, we don’t just protect systems—we protect people’s trust. By maximizing security and privacy, we ensure peace of mind for our clients and their users,” concludes Zaniboni.

Cyber Technology Insights: INTEGRITY Security Services Joins 5GAA for 5G Autos

To participate in our interviews, please write to our CyberTech Media Room at news@intentamplify.com

Source – Prweb