And with systems such as building automation and security moving to more network-based operations, they can be compromised remotely to allow access to what is a supposedly secure building and, sometimes more importantly, the data stored on a network inside of it.