The availability of construction jobs drops by 17.5%, company offices evolve to the here-to-stay hybrid working model, the House passes a $280 billion semiconductor package, and more.
Our mid-year roundup highlights the top-read Gravel2Gavel posts from 2022 so far. Our authors provided deep industry insights and summarized hot topics that addressed various legal implications and disruptions that affected the market, ranging from topics like investing in real estate metaverse to the clean hydrogen transition.
Over the last several years, the proptech movement has become entrenched in the lexicon of the real estate industry as developers use the term as a catch-all term for using technology in the construction of new commercial buildings and begin planning for Smart Cities. The various technologies incorporate wireless sensors, broadband service and other cloud-based applications to reduce energy costs, improve transportation and enhance security.
From our homes to our workplaces, the deployment of smart technology is becoming increasingly prevalent. The Wall Street Journal notes that smart-building-related companies raised $2.88 billion in venture capital in 2021. In previous posts, we’ve discussed the increased use of smart technology in commercial real estate, the importance of a thorough and rigorous research and evaluation process, and various factors to consider in contracts for smart technology. These evaluation and contract processes are vital for developing security guardrails to which smart technology suppliers must adhere. A rigorous, security-centric approach to smart home technology can help protect real estate companies from catastrophic PR and financial fallout from a security incident such as the Mirai malware attack in 2016 that targeted insecure Internet of Things (IoT) devices. The average cost of data breach incidents increases with each year and, in 2021, the average cost of a data breach incident was $4.24 million. More than ever, companies must not only be aware of the cybersecurity risks of these technologies but take the necessary steps to address their vulnerabilities.