Facilities Management Services

Here are several top facilities management events for 2025-2026 that facilities managers and their teams should be aware of.

BSCAI’s largest in-person event of the year, this conference offers multiple networking events and more than 20 educational sessions for professionals in the janitorial services industry. Learn more.

Designed for HVAC, sustainability, and facilities management professionals, this conference is your chance to network with peers and explore solutions to pressing facilities management challenges like data center cooling, indoor air quality, and energy conservation. Learn more.

For property managers, owners, and investors, this technology conference is the place to go to discover the innovations—in AI, data integration, and green technology—that are driving growth in commercial and multifamily real estate. Learn more.

Bringing education, networking, and product discovery together in one dynamic event. Broad-based education for facilities professionals from every type of organization. Learn more.

IFMA’s Facility Fusion event offers TED-style talks, learning labs, and team-building exercises designed to help you discover your leadership style, learn how to communicate a vision others will follow, and successfully contribute to creating a top-performing organization. Learn more.

Billed at the largest show in facilities management, this conference is for multisite facilities management professionals seeking techniques and technologies to cope with challenges like extreme weather, fluctuating occupancy, and labor shortages. Learn more.

The premiere event for fire and life safety, this conference is a great way to stay up to date with the standards and codes regulating the design, construction, and operations of buildings and facilities. Discover new safety technologies and network with fellow facilities professionals. Learn more.

Network with your peers in the building operations, maintenance, real estate, and rental industries (among others). And get the latest on new building technologies, changing occupant expectations, decarbonization efforts, and hybrid work trends. Learn more.

Billed as the largest gathering of healthcare facilities professionals, this conference lets you connect with fellow professionals and hear from facilities experts about the latest techniques and technologies for advancing the safety of healthcare facilities. Learn more.

Learn how AI and other developments are reshaping the design and operations of healthcare facilities. Network with fellow professionals; and get expert advice on attracting reliable talent and managing crisis situations. Learn more.

Groundbreaking discussions on facility management and the environment. Workplace professionals come to discover innovative FM technologies, build valuable relationships, and sharpen skills. Learn more.

Northern California Facilities Expo 2026
Santa Clara Convention Center / San Jose, CA
Dates: TBD

This event offers networking and learning opportunities for facilities, maintenance, and energy managers in the high-tech manufacturing, education, utilities, biotechnology, government, hospitality, retail, healthcare, finance, and entertainment industries. 

NFMT Remix 2026
Location: TBD
Dates: TBD

Get the latest on facilities management best practices from respected industry professionals, and learn how to optimize your operations with emerging technologies like AI. Discover new products and services, and network with your colleagues from across the country.

North Texas Facilities Expo
Location: TBD
Dates: TBD

This event offers networking and learning opportunities for facilities, maintenance, and energy managers in the food processing, government, healthcare, manufacturing, education, winery, utilities, and other industries.

Ready to enhance efficiency, lower costs, and increase your supplier diversity?

Few companies provide the deep expertise in facilities management services with the opportunity for social impact like PRIDE Industries does.

This is Part Two of a two-part series on ways to enhance facility security. This blog focuses on improving IoT cybersecurity. For a concise overview of protocols and tools for maximizing physical building security, read Part One.

During the past decade, the Internet of Things (IoT) has proven to be a game changer in facilities management. But as with any technology, there are also downsides that must be addressed, especially regarding IoT cybersecurity.

The benefits of incorporating interconnected devices into operations are well known. The International Facility Management Association (IFMA) lists predictive maintenance, energy optimization, improved occupant experience, enhanced security, and streamlined asset management as the technology’s top five benefits.

But because these sensors, connected cameras, and automated systems help manage everything from access control to HVAC to lighting and elevators, a successful cyberattack can wreak havoc—disrupting operations, compromising sensitive data, and even risking physical safety.

IoT cybersecurity protocols in many facilities are too lax or outdated to effectively protect the many linked devices spread throughout the facility.

Why Are IoT Devices Targeted by Hackers?

One reason cybercriminals are increasing their attacks on IoT devices is simply because there are so many of them, and their use is expanding. There are nearly 19 billion IoT devices in use today, and that number is expected to hit 40 billion by 2030.

But it’s not just their ubiquity that makes IoT devices such popular targets. Many of these devices have weak or no security, making them a preferred doorway into corporate building systems. IoT cybersecurity protocols in many facilities are too lax or outdated to effectively protect the many linked devices spread throughout the facility. For example, a recent assessment by Building Cyber Security, a nonprofit dedicated to securing the nation’s critical infrastructure, found that 80% of commercial real estate organizations have no network security at all, and only 5% meet reasonable security requirements.

A lax attitude to cybersecurity can come with a high cost. A Verizon Business survey found that 66% of respondents who suffered a cybersecurity attack deemed the resulting impact as “major.” Of these affected businesses, 59% suffered downtime, 56% lost data, and 29% faced regulatory penalties.

And it’s not just cameras and sensors that are being attacked. Internet-connected devices as ordinary as washing machines have been compromised. Even the smart TV in the boardroom can be a security threat.

Understanding IoT Cybersecurity Threats

Most companies have robust security systems in place to shield their computer networks and protect sensitive data. But this cyber-diligence doesn’t always extend to the devices that are part of the company’s buildings. A high percentage of the IoT devices in use today are susceptible to a wide range of cyberattacks due to weak authentication, outdated firmware, and insecure network configurations. Attackers target these devices not only for direct exploitation but also as entry points to broader networks.

7 Common Types of IoT Cyberattacks

There are several types of cyberattacks that can be employed against IoT devices. These are the most common:

  1. Botnet and DDoS Attacks – IoT devices such as routers and smart cameras are frequently hijacked and added to botnets, which are then used for large-scale distributed denial of service (DDoS) attacks.
  2. Exploitation of Default Credentials and Outdated Firmware – According to Fortinet’s 2025 Global Threat Landscape Report, attackers routinely exploit default passwords and unpatched vulnerabilities in routers and cameras. Around 20% of global exploitation attempts in 2025 targeted IoT devices.
  3. Man-in-the-Middle (MitM) and Eavesdropping Attacks – Attackers can intercept communications between IoT devices and servers, enabling them to monitor or alter transmitted data. These MitM attacks are particularly effective in poorly encrypted or insecure network environments.
  4. Brute-Force Password Attacks – Many IoT devices still rely on highly guessable credentials. Hackers using automated programs can try thousands of passwords in a short amount of time, using this brute-force technique to gain unauthorized access to a single device that then gives them access to an entire corporate network.
  5. Privilege Escalation and Remote Code Execution – Exploiting software vulnerabilities in IoT operating systems allows attackers to gain higher-level permissions or execute malicious code remotely. Once inside, they can manipulate firmware, reconfigure devices, or pivot laterally into enterprise networks.
  6. Physical Tampering and Data Theft – IoT devices deployed in public or industrial settings—such as lobbies, hallways, or kiosks—face risks of direct tampering. Attackers can physically access interfaces or ports to install malware or extract sensitive data.
  7. Ransomware and Supply Chain Attacks – According to cybersecurity firm DeepStrike, ransomware attacks targeting IoT and operational technology (OT) environments increased by 46% in 2025 over the previous year.

Because IoT devices are becoming so common, and because most of them are only weakly secured, they are an appealing target for cybercriminals. Common vulnerabilities like poor authentication, misconfiguration, and lack of patching continue to drive a wide range of cyberattacks.

IoT Cybersecurity Threats to Commercial Buildings

Building control and management technologies used to operate in silos. But today’s smart buildings are integrated into multi-use, internet-based networks. A comprehensive building automated control system (BACS) can include any number of interoperable IoT elements, including:

  • Building and energy management systems (BMS/EMS)
  • Lighting control systems
  • Security systems (such as CCTV) and automated access control systems
  • Vertical transportation systems, such as passenger/goods lifts and escalators
  • Automated parking systems
  • Wayfinding systems
  • IT infrastructure hardware and devices

A cyberattack can allow a threat actor to take control of a critical system and gain the ability to change settings, turn off components, or make equipment operate outside of normal parameters.

Even seemingly harmless devices pose risks, as a North American casino discovered when it installed an internet-enabled fish tank. The tank’s connectivity allowed facilities personnel to automate feedings and remotely adjust temperature and salinity. But that same connectivity let hackers use the tank as an opening to steal and transmit 10 gigabytes of data.

How to Improve IoT Cybersecurity

A close-up of a fish tank in the hallway of an office building
Even a fish tank can be used to steal data, if it’s connected to a network.

Updating and maintaining your IoT cybersecurity is an ongoing process. Recommendations from cybersecurity experts vary, but almost all include the following steps.

Update Building Software Systems

Your facility’s software systems should be regularly updated and patched. Start this process by taking inventory of all your digital components: building management systems, surveillance systems, fire controls, and others. Make sure each system has the latest firmware or software installed and set up a schedule to check for and install upgrades. If your system is so old that it no longer receives patches, it’s time to replace it.

Secure Your IoT Devices and Building Equipment

Every IoT device is a tiny computer that can be hacked if not secured. Even something as ordinary as a smart thermostat can be a doorway into your company’s network. Hackers know the factory default settings and passwords of thousands of devices from dozens of manufacturers. For this reason, whenever an internet-enabled device is installed, part of the installation process should be to change the default password to a strong, unique password.

Strengthen Access Control and Authentication

More than one-third of network breaches involve stolen credentials. To reduce this risk, be sure to require strong and unique passwords and multifactor authentication. Limit permissions to those personnel who truly need access to the system and train all employees in how to spot phishing attacks. Physically secure spaces with sensitive data via keycards or biometrics; and promptly revoke access when staff or vendors leave.

Segment Networks

Consider putting IoT devices on a separate network, so that even if a device is compromised, the hackers can’t jump to your company’s primary data network. And be sure to monitor IoT devices for unusual behavior. Many hacks involve marshalling hundreds of devices into a botnet to stage a denial-of-service attack. If a normally quiet sensor starts sending out large amounts of data, it could be a sign that it’s been compromised.

By separating your building systems network from your corporate and tenant networks, you don’t just protect access to the main network. You also prevent attacks from that network, such as from an infected laptop, that could compromise building operations.

Finally, the firewall and intrusion detection protocols that are applied to your IoT cybersecurity should be just as robust as the cybersecurity protocols used to protect the company network. A strong intrusion detection system can alert you if someone on a guest network, for example, is trying to ping your elevator control. And if vendors need to access the building management system remotely, require them to go through a secure VPN into that network, so that even if an attacker compromises the vendor’s credentials, they won’t be able to easily access your systems.

Protect Tenant and Sensitive Data

Many facilities are the custodians of a wide range of tenant data. In these cases, even a single security breach can be devastating to the facility’s reputation—and its bottom line. In 2023, the average cost of a data breach was an attention-grabbing $4.45 million.

To protect proprietary data, use HTTPS/SSL for web portals or online services, so that data is encrypted as it moves over the network. In addition, be sure to regularly back up and encrypt sensitive data. And impose strong access controls so only staff who absolutely need access to tenant information have it.

Train Your Team and Tenants on Security Measures

According to IBM, 95% of cybersecurity breaches are due to human error, such as clicking on a malicious email link or using a weak password. That’s why IoT cybersecurity training is a must for everyone.

Start by incorporating general cybersecurity awareness training for all employees and contractors who access your systems. Teach employees to:

  • Spot phishing attempts, like emails sent from spoofed sender addresses or urgent money requests. You might use phishing simulations—sending fake emails to employees to see if they click—as a teaching tool, followed by guidance on red flags they missed.
  • Handle passwords safely. Teach employees not to share passwords or write them on sticky notes. Make it clear that no IT staff will ask for someone’s password over the phone.
  • Report suspicious activity immediately. Send a message to employees that all such reports are appreciated, even those that turn out to be false alarms.

Finally, educate staff and tenants about the simple steps they can take to protect your company’s physical and cyber systems. Prohibit tailgating, a practice in which someone follows a worker through a secure door without badging in. Restrict access to sensitive areas to essential, known personnel. And make sure that visitors are accompanied by company personnel at all times.

Manage and Vet Third-Party Vendors

Vendors are an integral part of building operations, but each third-party relationship is another avenue for risk, especially as these workers have physical access to your IoT devices. In fact, a 2024 survey found that 61% of companies experienced a data breach through a vendor.

Therefore, it’s important to vet vendors before and during the relationship. Ask about their cybersecurity policies. What kind of security certifications do they have? Do they conduct employee background checks and security training? Include security requirements in your contracts and limit a vendor’s access to the minimum needed to perform their work.

Assess each vendor periodically to see if there have been any security incidents; confirm that their privileges are still appropriate for the work they are doing. And encourage vendors to let you know when a staff member has left the company to allow you to promptly revoke their credentials.

Implement Continuous Monitoring and Incident Response Plans

On average, it takes companies 204 days to identify a breach, and another 73 days to contain it. But this time can be shortened considerably through vigilance. Facility managers should deploy tools that scan for unusual activity 24/7, and they should have a comprehensive response plan in place. With continuous monitoring, you can significantly reduce the time that attackers are able to lurk unnoticed. And with a rehearsed incident response plan, you ensure that if there is an intrusion, you can quickly retake control of your systems and act decisively to mitigate damage. It’s like having smoke detectors and a fire mitigation plan in place, but for cybersecurity incidents.

Integrate Physical Security with IoT Cybersecurity

Anything in your building that’s smart or connected can be leveraged in an attack, and not all attacks come through a network. An intruder posing as a delivery person, for example, could slip into a restricted area and insert a malware-laden USB stick into a server or a device. Both cyber and physical security must be top notch.

This is why the most secure companies have chosen to break down the silos between their building and IT security teams. Working together, these two groups are able to devise security protocols that combat both physical and cyber intrusions.

Having IT experts team up with security personnel increases security for server rooms, security control centers, and other sensitive spaces. Working with IT also helps building personnel ensure that IoT devices like cameras, badge readers, and alarm panels are secured with passwords, updates, and network segmentation.

Integrating security efforts helps close the gap in the gray area between physical and IoT cybersecurity. It ensures that personnel don’t overlook the wi-fi security of the network port in the lobby or the smart lighting panel in the conference room.

IoT Cybersecurity in Action

The cybersecurity risks posed by IoT devices are increasing. Now more than ever, it’s important to fold IoT devices into your company’s security efforts. FM and IT personnel, working together, are the ideal team to tackle this security issue. And to get the most from these efforts, security experts recommend a five-step process:

  • Gather information. Determine whether specific responsibilities are already assigned, identify all assets and their configurations, review your existing security policies and procedures, and examine records of any past incidents or breaches at your facility.
  • Assess your position. Identify potential risks and evaluate your current security posture. You may need to bring in a specialist to provide additional expertise.
  • Make a plan. Set clear security objectives, perform a gap analysis, outline corrective measures, and assign ownership for each action.
  • Take action. Implement the necessary improvements and create mechanisms to track emerging developments and new technologies.
  • Review. Revisit and update your risk assessment, audit your current environment, and monitor industry trends, incidents, and evolving threats.
The ideal IoT cybersecurity team includes both FM and IT personnel.

Finally, remember that maintaining IoT cybersecurity is a never-ending process. Hacking techniques evolve constantly, and so must your defenses. For facility managers, the first step is simple: Treat every connected device as both a valuable tool and a potential target.

Secure Facilities Management

At PRIDE Industries, we offer deep expertise and decades of experience in preventive and predictive maintenance, custodial services, engineering services, energy systems maintenance, project services, grounds and landscaping, and environmental management. Learn how partnering with us can enhance efficiency, increase security, and lower costs.

This is Part One of a two-part series on ways to enhance facility security. This blog focuses on building security as regards physical infrastructure. For an overview of protocols and digital tools for securing the IoT devices within facilities, read Part Two.

Physical security is a basic human need. In our personal lives, we lock our doors, check expiration dates, and make sure our children are secure in their car seats. The same need for security exists at our workplaces. We want to protect against intrusion, theft, vandalism, and workplace violence. Fortunately, there is a wide range of building security tools available for today’s facilities managers.

Experts group security tactics into five areas, often referred to as the five D’s—deter, detect, delay, deny, and defend. The most secure buildings have tools in place to perform each of these functions:

Not every facility needs a Fort Knox level of security, but all facilities require a multilayered security system that reduces the chance of unauthorized access.

  • Deter. Bright lights, signage announcing the use of security cameras, and similar tactics can discourage potential threats.
  • Detect. Alarm systems allow security staff to quickly respond to a breach.
  • Delay. Physical barriers and access control mechanisms can impede intruders and provide additional time for security or law enforcement personnel to respond to incidents.
  • Deny. Passcodes and biometric access control can prevent intruders from gaining access to sensitive areas or valuable assets.
  • Defend. Comprehensive training programs can prepare facility staff to respond effectively and quickly before law enforcement arrives.

Every facility is unique, and its building security needs are as well. Here’s a look at some important factors to consider when seeking to make your facility more secure.

Perimeter Security

When devising a plan to improve building security, one of the first areas to focus on is your facility’s perimeter. A well-designed perimeter can keep unwanted visitors from gaining access to your facility in the first place, which is why it’s important to consider security goals when planning or redesigning the exterior of your buildings.

For example, if your facility has outdoor storage or equipment areas, electrified security fences can be effective in preventing theft and vandalism.

Of course, it doesn’t make sense to erect electrical fencing around office, medical, and many other types of buildings. But that doesn’t mean they can’t be fortified through the design choices you make. Architectural and landscape design that factors in security concerns will maximize visibility, remove potential hiding places, and establish designated entry points that can be easily monitored. Security-based designs also call for uniform lighting to illuminate walkways and entry points.

Building Security Upgrades

Upgrading existing facilities can require a different approach. If your facility has large ground-level windows, for example, you may want to add security bollards to prevent vehicles from gaining entry by ramming through windows. Fortunately, today’s bollards come in a variety of styles and sizes; and whether a metal pole or a concrete structure, many bollards can serve a dual purpose—as a decorative planter, for example. This allows you to add security without sacrificing aesthetics.

Even smaller windows can make a commercial building vulnerable, if they’re easily broken and large enough for an intruder to slip through. One easy and fairly inexpensive way to protect these windows is to add security bars or grilles. These deterrents can be customized and are highly effective at keeping intruders out.

The side of a glass office building with well-trimmed landscaping and lots of exterior lights
Discourage intruders with well-lit exterior areas and landscaping that provides clear visibility.

But grillwork has its disadvantages, and perhaps the primary one is simply that these additions can be unattractive and make buildings look less inviting to visitors. Bars and grilles can also prevent firefighters from accessing a building—a serious safety issue. They also don’t work well on historic buildings.

For these reasons, facilities managers are turning to more aesthetically pleasing solutions, like window security film. Nearly invisible to the naked eye, this film is typically applied to the inside of a window, and serves two important security functions. It can help prevent flying glass shards from forced entry, vandalism, and even explosions. Window film can also delay intruders, helping to protect occupants (and assets) and giving police and security personnel additional response time.

Doors that Enhance Building Security

The type of doors used in your facility can also have a big impact on safety. Fortunately, there are even more safety options with doors than with windows. Security doors are available in wood, metal, and even reinforced glass. And all of these materials are available with different levels of strength. So, for example, you can choose metal-core doors for exterior purposes, and stick with plain wood for interior doors. There are specialized doors that can resist fire or gunshots, and some doors can shield against radiation—making them ideal for laboratories, data centers, and other sensitive areas.

Compared to reinforced security doors, traditional glass doors provide significantly less protection. Nevertheless, glass can be an appropriate material for low-security applications such as lockable office doors, where appearance is the biggest concern.

But even with glass doors, electric or magnetic strike locks are a must to achieve a reasonable level of security. In addition, doors and locks should be combined with access control systems, security cameras, sensors, and alarms to fully protect a facility.

Lighting and Environmental Design

Lighting and environmental design determine how your buildings look from the street. In many ways, they are your facility’s aesthetic. But these two elements also play an important role in building security.

Lighting is particularly important from a security standpoint. In a randomized controlled study of 80 public housing developments with elevated crime levels in New York, about half received new, temporary street lights and half did not. The study’s authors found that developments that received the new lights experienced crime rates significantly lower than predicted by past history.

Proper outdoor lighting not only deters antisocial behavior, it also makes your cameras and physical security more effective and provides an additional element of protection that helps secure every corner of your property. And these improved security results can be obtained without keeping the lights on 24/7. Motion sensors ensure that lights come on only when needed, saving energy—and even taking a potential intruder by surprise.

High-resolution security cameras provide clear images and video footage under a variety of lighting conditions.

Well-planned exterior lighting is such an effective security tool that it’s included as a key component of Crime Prevention Through Environmental Design (CPTED, often pronounced “sep-ted”). CPTED is a multi-disciplinary approach to building security that leverages architectural design along with careful management of built and natural environments to achieve high levels of security at a reasonable price. The basic principles of CPTED include:

  • Natural Surveillance – using good lighting and trimmed landscaping to increase visibility.
  • Natural Access Control – directing people and vehicles through designated areas.
  • Territorial Reinforcement – personalizing areas with gardens or artwork to signal ownership.
  • Regular Maintenance – keeping spaces well-maintained in order to signal constant occupancy and vigilance.

Technology Plays a Key Role in Building Security

Doors, locks, and other physical barriers are the elementary building blocks of building security. But for higher-level security you need to incorporate technology-based systems—for surveillance, access control, and intrusion alarms—to provide truly comprehensive security. As with all things technological, these systems have grown more sophisticated in recent years.

Surveillance Systems

Surveillance cameras are everywhere. Video doorbells and dash cams can be found all around the world, in major urban areas like London and New York, in suburban areas across the country, and even in rural towns. And this is especially true for commercial buildings.

Offices and other business facilities were among the first places to get surveillance technology. For commercial facilities managers, these tools—and the high-quality images they capture—are essential. Surveillance cameras help building personnel keep tabs on entrances, high-traffic areas, storage spaces, and other key locations, simply by monitoring a video feed in an office.

This is why security experts recommend utilizing high-resolution cameras that provide clear images and video footage in a variety of lighting conditions, and work well with systems that allow for remote monitoring. Camera systems today can also be enhanced with advanced analytics software, allowing them to detect specific objects and types of potential physical threats, so they can alert security personnel before the threat is obvious.

Before installing surveillance systems in and around your facility, however, it’s essential to be familiar with state and federal laws governing workplace surveillance. Generally, employers have the right to monitor workplace activities to ensure security, but there are limits. Certain spaces, such as break rooms and restrooms, are almost universally off limits. Employers must also notify employees about the presence of surveillance technology and the extent of the surveillance.

Access Control Systems

Access control systems manage access to buildings and sensitive areas through smartphone apps, physical credentials like keycards and ID badges, or even (in particularly sensitive areas) through biometrics such as fingerprints, iris patterns, and facial features.

These systems are not restricted to doors. They can also be used to manage access to elevators, gates, lockers, and even printers. Besides preventing unauthorized people from entering your building or certain designated areas inside, the systems can also help manage visitors by setting access schedules and limits for specific groups, such as full-time employees, contractors, and vendors.

Intrusion Detection Systems

As with fire safety systems, a vital part of comprehensive building security is ensuring that any unauthorized access is detected and triggers an alarm. This serves as a deterrent to potential intruders and immediately warns facility staff, a security monitoring center, or law enforcement that there’s an intruder. Sensors can detect if doors are opened, windows are broken, or motion is detected in a particular area. Alarms can be set to silently alert security personnel, or ring loudly, alerting everyone in the vicinity of the intrusion.

A newer type of security, known as thermal perimeter detection, leverages state-of-the-art thermal imaging technology and intelligent analytics to protect facilities from intrusion, theft, and even exterior vandalism—a growing concern for some businesses.

Preventing Vandalism

Even if intruders don’t enter your facility, they can still cause extensive damage through vandalism. The Houston Chronicle reports that a single incident of vandalism costs small businesses an average of over $3,300. And organizations of all sizes are currently coping with an epidemic of copper theft from wiring and pipes. Given the high price of copper, it’s likely this metal will remain a popular target for quite some time.

How can facilities managers deal with this exterior threat?

Among steps that can be taken to prevent vandalism are installing surveillance cameras in parking lots and outdoor storage areas, ensuring that your lighting system covers these areas, and using anti-graffiti coatings on walls and other structures. Protective security patrols can also help.

Maintenance also plays a key role. Security experts warn that vandalism must be repaired quickly, as criminals look for easy opportunities, and signs of graffiti and other types of vandalism can encourage further attacks.

Improving Your Building Security

With any major project, knowing your facility’s existing condition is an essential first step. Before embarking on a building security upgrade, it’s important to conduct a comprehensive audit to identify vulnerabilities, evaluate the existing system, and uncover areas that need improvement.

Key elements of an audit include:

  • Environmental components. The facility’s location and terrain can help or hinder security. Could your existing landscaping and external design features serve as hiding places or means of access?
  • Physical barriers and access points. If the property has gates, are they secure and working properly? Can all access points—doors, windows, and turnstiles—be locked and secured? Be sure to also evaluate bollards, reinforced glass, doors, and hinges.
  • Lighting. Is everything working properly and providing adequate light? Do you have back-up lighting in case of a power failure?
  • Surveillance and intrusion detection. Do you have video cameras monitoring entrances, exits, stairwells, and other access points? Is the footage continually monitored? Do you have ID readers and sensors at all access points to detect forced entry, and are all alarms working properly and tested regularly?
  • Procedures and training. Do you have documented procedures for your program as a whole and for individual, key sectors? Do you have an ongoing training program for security staff? And do your employees understand the need for the security systems, as well as their own security obligations?
  • Emergencies. Do you have procedures in place to respond to natural disasters like fires, floods, and earthquakes, or incidents of workplace violence? In the event of an emergency, will your security personnel be immediately notified? Is there a training protocol in place to conduct regular drills and ensure that all staff know their evacuation routes, roll call practices, and emergency contacts?

An audit should provide information about the state of the systems you have in place and where security may be lacking. To optimize your audit, you may want to consult with external security experts as part of the review process.

Conducting a yearly assessment ensures that your security systems and protocols are effectively safeguarding your facility, people, and assets. Such a review might reveal a need to change safety or maintenance protocols, or invest in new technology. Keep in mind that while installing and maintaining high-quality security systems can be expensive, the cost of not doing so can be even higher.

21st Century Building Security

Unfortunately, building security threats are constantly evolving. To keep up, facility professionals must remain vigilant and be prepared to incorporate new defense protocols and technologies. Not every facility requires a Fort Knox level of security, but all facilities require a multilayered security system that reduces the likelihood of unauthorized access to the facility as a whole, as well as additional security in the interior for particularly sensitive areas.

Of course, in the 21st century, physical security is only half the battle. As every aspect of our lives becomes more intertwined with IoT technology, building cybersecurity has become just as important as physical building security—which is why it’s the topic of Part Two of this series.  

Your Partner in Building Safety

If you need to upgrade your facility’s infrastructure, PRIDE Industries can help. We bring decades of expertise in maintenance, engineering services, and facilities management to every customer we serve. Our comprehensive programs, combined with solutions-oriented management, enable us to deliver exceptional results every day to over 140 million square feet of facilities, from commercial and government buildings to medical centers and manufacturing plants. Contact us to learn what we can do for you.

Energy usage in the U.S. continues to rise, driven by new technologies like electric vehicles and giant, AI-centric data centers. The nation’s electric grids are straining to keep up, and as a result, energy costs are climbing rapidly. In this environment, what can facilities operators do to keep the lights on and energy costs affordable? For many facilities, the answer is a microgrid.

What Is a Microgrid?

A microgrid is a self-contained system of energy generation and storage that can provide much of the power a facility needs for normal use. Depending on the microgrid, it can also provide all the power needed to keep a facility operational in the event of a systemwide failure of the public utility grid.

The U.S. Department of Energy defines a microgrid as ‘‘a group of interconnected loads and distributed energy resources within clearly defined electrical boundaries that acts as a single controllable entity with respect to the grid.’’

A 30-minute power outage can cost a medium or large business more than $15,000. Reliable microgrids keep facilities running when the public energy grid fails.

In plain English, microgrids are small-scale power grids that operate independently to generate electricity for a localized area, such as a manufacturing facility, university campus, hospital complex, or military base. They usually consist of several types of distributed energy sources—such as solar panels, wind turbines, fuel cells, and diesel or natural gas generators—coupled with an energy storage system. Normally, microgrids are connected to the main utility grid, but they can also be disconnected and operate in “island mode,” meaning they function autonomously to deliver power on their own.

Benefits of a Microgrid for Facilities Management

Facilities that absolutely must maintain power, such as hospitals, have been among the early adopters of microgrid technology. But as costs for key components like solar panels and storage batteries have come down, other types of facilities are investing in microgrids as well. Microgrid Knowledge lists eight ways that facilities benefit from having an independent energy system:

  • Reliability – A microgrid can ensure your facility has power even when disasters hit. Superstorm Sandy, for example, knocked out power to 8 million customers when it hit the East Coast in 2021. Some outages lasted more than two weeks. Facilities that had their own microgrid were able to disconnect from the public grid and (in some cases) continue operations until power was restored.
  • Resilience – Even in cases where a microgrid is insufficient to fully power operations, it can be used to maintain vital functions during a natural disaster, allowing the facility to resume normal operations more quickly when the main grid is restored.
  • Lower energy costs – Energy generated onsite, from solar panels or other technologies, can be used instead of higher-priced power from a public utility. Advanced microgrid controllers can adjust the balance of power sources as energy prices rise and fall during the day—using more internally generated power when prices rise and shifting back to utility power when rates drop.
  • Clean energy – Microgrids often utilize green power sources such as solar, wind, and fuel cells, helping companies reach their sustainability goals.
  • Utility grid backup – A microgrid can act as an additional resource that public grid operators can call upon during peak-demand periods. This not only helps the local community but also generates revenue for the facility that owns the microgrid.
  • Cybersecurity – National security experts have expressed concern that a hostile cyberattack against a U.S. public utility could cause widespread power outages. The growing use of microgrids is decentralizing the energy infrastructure in the U.S., making it easier to guard against these threats.
  • Uninterrupted productivity – The cost of power outages to the U.S. economy ranges from $25 billion to $70 billion annually. Just a 30-minute outage can cost a medium or large business more than $15,000. Reliable microgrids keep production lines running during a power outage.
  • Community well-being – In the event of a power outage, the facility served by a microgrid becomes an island of energy. For example, during Superstorm Sandy, Princeton University’s microgrid kept the power on while most of New Jersey was dark and chilly. First responders were able to use university facilities to get warm and share a pot of coffee.

Potential Cost Savings

While there are upfront costs (see below), microgrids provide significant cost savings over time:

  • Pittsburgh International Airport’s switch to a solar and natural gas microgrid led to a reported $1 million in savings during its first year of use.
  • A California winery built a microgrid based on solar technology and reduced its monthly energy bills from $15,000 to $1,000.
  • A cold storage facility in California is projected to achieve more than $43 million in lifetime savings. 
  • A food service logistics provider in Southern California is installing a microgrid that is projected to save over $192,000 a year by optimizing low-cost solar and battery storage.
A close-up of an electrical substation, with multiple transmission lines
The nation’s electrical grids are straining to keep up with rapidly increasing demand.

Savings like this occur through several mechanisms:

Solar savings

Solar panels deliver energy at a much lower cost than traditional utility grids. Over the past decade, costs associated with solar panels have fallen by 90%, and battery costs have dropped by more than 90% as well.

Load shifting

Microgrids equipped with battery storage enable facilities to shift their energy use to take advantage of time-of-day pricing. They can charge batteries during cheaper off-peak hours and then draw on that stored electricity during expensive peak hours.

Reduced demand charges

Utilities typically charge commercial and industrial customers based on the highest level of energy consumed in a given period of time (often just a 15- or 30-minute interval) during the billing cycle. These charges can account for as much of half of a facility’s electric bill. Microgrid controls can optimize battery use to reduce the amount of power that needs to be drawn from the utility at any given time, reducing peak utilization.

Demand response

Demand response programs offer savings to facilities that reduce power usage during high-demand periods. By enabling facilities to draw less energy from the public grid during these periods, microgrids allow organizations to take advantage of these cost-saving programs.

Selling power

A microgrid can be designed and built to generate and store more electricity than a facility needs. This gives microgrid owners the option of selling excess energy to the local public utility, creating a new revenue stream.  

Lower insurance costs

Improved property resilience—the ability of a property to adapt to and withstand external disturbances—can sometimes lead to lower insurance premiums. And during an era in which insurers are reassessing their coverage due to the increased frequency of natural disasters, companies that can show greater infrastructure resilience also increase the likelihood of remaining insured.

Installation Costs

There are two primary ways to acquire a microgrid. One option is to purchase equipment and build and manage the microgrid in-house. This may require a significant capital investment up front, but can make good economic sense in the long run. Or, organizations can avoid the capital expenditure by leasing equipment from an energy-as-a-service (EaaS) firm. EaaS firms own the equipment, and handle both installation and maintenance, making them a good option for companies that want energy independence but lack the capital needed for their own microgrid.

Long term, companies will reap the most benefit by owning their own microgrid. But before taking that step, keep the following capital investments and other costs in mind.

Several long rows of solar panels, situated in a meadow, on a sunny day
The cost of commercial solar panels has fallen by 90% in the past decade.

Equipment and Installation

About 75% of the upfront cost of a microgrid typically goes towards equipment and installation. These include:

  • Generators – Natural gas generators cost about $700 to $1,000 per kilowatt. Diesel generators may cost more.
  • Energy storage – Battery storage systems run between $300 and $400 per kilowatt hour of discharge capacity.
  • Renewable energy – Prices for energy sources such as solar panels vary based on capacity and technology.
  • Control systems – Controllers, the “brain” of the microgrid system, can range from $50,000 to $90,000, depending on how many sensors, assets, or site-specific solutions you need to control.

Construction

Construction oversight and project management account for about 15% of upfront costs, including labor, site preparation, and logistical expenses. Geographic and climate challenges can drive these costs higher.

Design and engineering

Costs including surveying and analyzing the electrical system, creating plans, and ensuring regulatory compliance make up roughly 10% of upfront costs.

Permits and regulations

The cost of obtaining the necessary government approvals varies by jurisdiction, and can be significant. In addition, any delays in obtaining the needed permits may drive up overall expenses.

Maintenance Costs

As with any system, regular maintenance is essential. Costs will vary based on the microgrid’s size and complexity and the technologies used. For example, coastal locations may experience corrosion, while desert locations can expect increased dust accumulation on solar panels.

Equipment should be regularly inspected, cleaned, and serviced as needed. Solar panels require periodic cleaning, and inverters need to be replaced on a regular basis. Wind turbines require regular inspection of blades and gearboxes, and frequent lubrication of moving parts. Generators need periodic servicing and fuel management. Batteries for energy storage have relatively short life expectancies and may need to be replaced frequently, while control systems require software updates and cybersecurity protection.

Much of this maintenance work requires specialized equipment and personnel. Fortunately, microgrid controllers can utilize predictive and prescriptive analysis to identify items that need maintenance before breakdowns, saving money and preventing major problems.

When Does It Make Sense to Install a Microgrid?

Every facility has different needs when it comes to energy security. If uninterrupted power is critical for your organization’s mission, if the local utility’s power is not always reliable, or if your business is seeking to reduce energy costs and/or its carbon footprint, a microgrid may be the answer. To help you determine if that’s the case, here are five key questions to consider.

  1. What are your strategic goals for the microgrid?
    Are you looking for 100% renewable energy? Maintaining resiliency during outages? Earning income by participating in energy markets? Or perhaps a combination of all these factors?
  1. What are your energy consumption patterns?
    How does your facility use energy? When is peak demand? Does your demand change throughout the day and throughout the seasons?
  1. How will you finance the microgrid?
    Have you explored state or local utility financing and incentives? Does it make sense to buy and operate your microgrid or would it be better to partner with an EaaS firm that would minimize your upfront costs?
  1. How much are you willing to pay for increased resilience?
    How many hours of resilience do you need? Would the microgrid you can afford provide that level of resilience? Long term, how would the hourly energy cost of your microgrid compare to the hourly energy cost of your local utility?
  1. Can you future-proof your microgrid?
    Technology will undoubtedly change during your microgrid’s lifespan. Will it be possible to incorporate new technologies? You may want to use solar today, but perhaps fuel cells or some other system will become standard in 10 years. Can you design your microgrid to allow you to swap energy sources if needed?

Getting answers to these questions will help you make a cost-effective decision, whether that’s building your own microgrid, contracting with an energy-as-a-service provider, or continuing to rely on your local public utility.

An Energy Partner You Can Rely On

If you need to upgrade or maintain your facility’s energy infrastructure, PRIDE Industries can help. We bring decades of expertise in energy systems maintenance, engineering services, and facilities management to every customer we serve. Our comprehensive maintenance programs, combined with solutions-oriented management, enable us to deliver exceptional results for all types of facilities, from commercial and government buildings to medical centers and manufacturing plants.

Fire is a growing risk nationally, making building fire safety a top priority for facilities managers.

Over the past decade, nonresidential fires have increased by 19%, with fire-related deaths up 70%. According to the U.S. Fire Administration, there were an estimated 110,000 nonresidential fires nationwide in 2023 alone, resulting in 130 deaths, 1,200 injuries, and losses of more than $3 billion.

Numbers like these are a big reason why fire safety is top of mind for many facilities managers. Fortunately, new technologies are making it easier to enhance any facility’s building fire safety.

Prevention and Suppression Systems for Building Fire Safety

For maximum building fire safety, structures should include both active detection and alarm systems—which can automatically trigger countermeasures like sprinklers—and passive systems that are part of the building’s structure.

In today’s modern commercial facility, the same smart technology that optimizes a building’s energy use and access security can help improve building fire safety.

Detection and Alarm Systems

Commercial fire alarm systems include detection devices for smoke, heat, and flames, a control panel, and notification devices such as sirens and strobes. There are two primary types of commercial fire alarm systems: conventional and addressable.

Conventional systems have long been the industry standard. They use wired analog signals to link initiating devices (like smoke detectors) to the control panel and allow responders to determine the general location of the fire. These systems are reliable and affordable, but there is a tendency for false alarms.

Addressable systems are digital. Each device in this system has its own unique address, which enables building personnel to pinpoint a fire’s location within a building. In addition, because addressable systems use a single cabling loop, it’s easy to integrate new devices into the system, which makes addressable systems much more scalable and customizable than conventional ones. This is a big reason why, despite their higher cost, managers of large buildings prefer them over conventional fire detection and alarm systems.

Wireless systems use radio frequency or other wireless communication methods, rather than physical wiring, to transmit signals between initiating devices and the control panel. This type of system can be either addressable or conventional, and is typically easier to install than a conventional system. Because wireless technology eliminates the need for extensive wiring, this type of system is ideal for historic buildings and other structures where it’s difficult to run new wiring.

Initiating Devices

Whether a fire detection system is conventional or addressable, it relies on sensitive detection technology to initiate a response. These initiating devices include:

  • Smoke detectors that detect smoke particles in the air
  • Heat detectors that respond to changes in temperature
  • Flame detectors that use infrared or ultraviolet sensors to detect flames
  • Gas detectors that pick up on harmful gases which could indicate a fire or other health hazard
  • Duct detectors that are designed to detect smoke or heat within HVAC systems

The oldest initiating device is the manual pull system, which is still an essential part of any fire safety system.

Passive Systems Improve Building Fire Safety

In addition to using technology to detect a fire and alert first responders, today’s facilities are also built to mitigate the impact of a fire when it does occur, using passive systems that can contain and slow down the spread of fire and smoke within a building. The following passive safety measures are required by modern building codes, but if the buildings you manage were built before these codes went into effect, you may want to retrofit to include these improvements:

  • Dampers to prevent the fire and smoke from spreading through ducts and wall openings
  • Fire Doors that can withstand high temperatures and contain a fire’s spread
  • Fire-Resistant Glass Partitions that can withstand high temperatures for an extended period
  • Smoke and Fire Curtains made of flexible fire-resistant fabric that automatically deploy when a fire is detected, sealing off elevators, stairwells, and other openings

Fire Suppression Systems that Support Building Fire Safety

Once a fire has been detected, the next step is to put it out. Fortunately, there are several types of commercial fire suppression systems, each with its own distinct benefits.

The wet pipe sprinkler system is the workhorse of fire suppression systems. The system relies on a network of pipes that are filled with pressurized water, ready for immediate discharge. Each sprinkler head contains a heat-sensitive element—either a glass bulb filled with liquid or a fusible link. When a fire starts, the heat causes the temperature around the sprinkler head to rise. Once the temperature exceeds the rated threshold (around 155°F/68°C), the glass bulb bursts or the fusible link melts, opening the sprinkler head.

A triangular graphic showing the three elements required for a fire to burn—heat, fuel, and oxygen
To prevent or extinguish a fire, you need to remove one or more of the elements of the fire triangle.

Because the system’s pipes are already full, water is released immediately through the activated sprinkler head and directed onto the fire. Only the sprinkler heads exposed to sufficient heat will activate, ensuring that water is delivered directly to the fire’s location rather than the entire building. The water is sprayed in a specific pattern, controlled by the sprinkler head’s deflector, to cool the flames, reduce heat, and limit the spread of fire. The wet pipe sprinkler system is extremely reliable, and the National Fire Protection Association (NFPA) recommends it as the go-to system for most buildings.

But in areas where temperatures drop below freezing, dry pipe systems are preferred. Dry pipe systems operate much like wet pipe systems, except that instead of being filled with pressurized water, the system’s pipes are filled with pressurized air or nitrogen. Once a sprinkler head is triggered, the pressurized gas escapes and a valve opens, allowing water from insulated pipes to flow.

Pre-action sprinkler systems add an extra layer of activation to dry pipe systems. Instead of relying only on heat to trigger the sprinkler head, a secondary initiating device, like a smoke detector, must confirm that there is a fire before the suppression system can deploy. This precautionary approach prevents accidental water discharge, making pre-action sprinkler systems ideal for environments where water damage would be especially costly or disruptive, such as data centers, museums, libraries, archival vaults, and freezer warehouses.

While water is the most common fire suppressant used in fire safety systems, it’s not ideal for certain types of structures. Water is highly destructive to electronics, paper documents, and sensitive artifacts, which is why some museums and factories rely on chemical non-liquid systems that use inert gases like argon, nitrogen, and carbon dioxide to snuff out flames through oxygen starvation, minimizing collateral damage. These gases also leave no residue and so make post-fire cleanup easier.

Similarly, areas with flammable liquids or chemicals may need to look at foam water systems, where water is mixed with foam concentrate to smother the fire.

Portable Fire Suppression

In addition to building-wide, automated fire suppression systems, hand-held fire extinguishers provide another layer of defense against fire. Regulations in most states require that fire extinguishers be mounted within 75 feet of any area within a building. This proximity can allow building occupants to begin fighting a fire even before the automated systems kick in.

There are four different types of fire extinguishers:

  • Class A extinguishers use water-based agents for standard combustible materials like paper and wood.
  • Class B models use chemical agents to smother commercial grease, motor oil, and gasoline fires.
  • Class C varieties use non-conductive agents to fight electrical fires.
  • Class K extinguishers use wet chemical agents to extinguish the cooking oil and grease fires that can occur in restaurants and other commercial kitchens.

Extinguishers should be inspected monthly and replaced every five to 15 years.

Smart Technology Enhances Building Fire Safety

As with most aspects of operating a modern commercial facility, fire prevention and suppression is benefiting from new technologies. The same smart building technology that optimizes a building’s energy use can help improve building fire safety.

Smart fire alarms can be integrated with HVAC and access-control systems to provide a unified emergency response. Smart systems deliver real-time notifications, including the nature and location of the emergency, to smartphones. These systems can automatically initiate defensive actions, like shutting down elevators and unlocking doors for evacuation. Smart systems can also improve proactive maintenance by analyzing data from sensors to predict when problems are likely to occur.

The spread of the internet of things (IoT) is one of the developments that has brought fire safety into a new era. For example, smart smoke detectors can differentiate between harmless smoke and a real fire, reducing false alarms. And if there is a fire, these devices can catch it sooner. Using thermal imaging cameras, these systems can quickly identify unusual temperature increases, even in low-visibility conditions—enabling fire alarms to sound earlier and suppression systems to deploy sooner.

Smart signage and wayfinding systems are two more developments that are making buildings safer. In the event of a fire, these systems provide occupants with clear and swift evacuation routes, and can even modify routes as conditions change, making evacuations safer. 

And fire safety technology continues to evolve. Experts see several new developments on the horizon—using AI for predictive maintenance and risk analysis, employing virtual reality in emergency scenario responses, and adding 5G connectivity for faster speeds and more efficient communication.

Maintenance and Continuous Improvement

Installing the most up-to-date fire safety equipment is only effective if the equipment is properly maintained and your response teams are fully prepared. This is why proper recordkeeping and regular inspections are so critical to building fire safety.

Routine Inspections and Training to Enhance Building Fire Safety

A well-defined inspection and maintenance schedule that follows national and local standards is critical for ensuring the safety of your facilities. Trained personnel should conduct regular visual inspections to check for obvious signs of wear and tear, note any obstructions to fire protection system components, and check for changes to furniture layouts or other structural matters that could affect system performance.

The wet pipe sprinkler system is the most common fire suppression system found in commercial buildings.

Facilities staff should also regularly test alarm systems and emergency lights, ensure emergency exits and pathways remain unobstructed, and conduct spot checks on high-risk equipment.

Smoke detectors should be tested monthly. Heat detectors should be inspected every six months or so for signs of dust or debris that might affect performance. And both these types of initiating devices need to be replaced after 10 years, as their reliability diminishes over time.

Manual pull stations should be cleaned and tested annually by a professional technician. In addition, fire extinguishers should be checked for any signs of tampering and to ensure optimal pressure. Any problems discovered should be addressed immediately to maintain compliance and safety.

Recordkeeping and Documentation

Fire safety recordkeeping isn’t just essential for maintaining your fire detection and suppression systems, it’s required by law. Regardless of size, every business must maintain an organized, up-to-date log of all fire protection systems, inspections, and maintenance. Doing so is essential for proving compliance with fire safety regulations and preparing your facility for inspections. 

The types of records that should be maintained include:

  • Fire Drill Logs that record the timing and results of scheduled fire drills, ensuring that employees know how to evacuate the building safely in the event of a fire
  • Equipment Maintenance Logs that track the servicing, repairs, and inspections of fire protection systems
  • Inspection Reports that must be kept up to date and stored in an accessible format, whether inspections are conducted by internal teams or third-party fire safety companies

Here again, smart technologies can help. A Computerized Maintenance Management System (CMMS), for example, makes it simple to maintain fire drill logs and fire safety equipment maintenance records by automating, centralizing, and streamlining critical safety tasks. A CMMS system is also ideal for automating scheduling and issuing reminders. The system can both assign tasks and track their completion, providing managers with real-time alerts and updates.

A New Era in Building Fire Safety

In 2023, fires in commercial facilities led to almost $3.2 billion in commercial property and other losses. As this figure makes clear, building fire safety is a crucial element of any business’ asset management strategy. Fortunately, new technology is making fire risk mitigation easier than ever. Today’s smart building technologies help facilities managers respond faster, meet compliance requirements more easily, and optimize operational efficiency—using a proactive, layered approach to fire safety that protects people, property, and operations.

Your Partner for Optimal Efficiency and Safety

Looking to bring greater automation to your facilities maintenance? PRIDE Industries can help. With more than 35 years of facilities management experience, and expertise in the latest safety and maintenance technologies, we can help you minimize energy consumption, reduce fire risk, and optimize the value of all your facility’s assets.

Legacy Resort Partners with PRIDE Industries for Reliable Housekeepers

Legacy Resort Hotel and Spa in San Diego, California, opened its doors in 2020 and has since hosted hundreds of thousands of guests from across the U.S. and the world. With a footprint that includes a 126-room hotel, conference facilities, and multiple event spaces spread across more than 17 acres, Legacy is one of the largest hospitality venues in the region offering guests a full luxury experience. To maintain this high level of service and ensure that every guest has a memorable stay, the resort relies on a dedicated team of employees, including housekeepers, who keep Legacy’s reputation sparkling.

The Challenge: Staffing Housekeepers

From the start, Legacy Resort Hotel and Spa has been committed to delivering outstanding services to its guests, which is why hiring the most qualified, reliable, and dedicated staff, including housekeepers, has always been a priority. However, like many businesses in the hospitality industry, Legacy Resort has felt the impact of staffing shortages.

According to the American Hotel and Lodging Association, 76% of hotels are experiencing staffing shortages, with 13% describing themselves as severely understaffed. Additionally, the survey revealed that 50% of hotels identified housekeepers as their top hiring need.

With the pressure of a labor shortage and high standards for staffing, the hotel faced the challenge of finding qualified candidates.

The Solution: Partnering to Provide Housekeepers

For Legacy, being understaffed and relying on underqualified employees was simply not an option. Committed to finding the right team members, they turned to PRIDE Industries.

PRIDE Industries, a social enterprise dedicated to creating employment opportunities for people with disabilities, provided just what Legacy needed. Through this partnership, Legacy was able to hire skilled housekeepers and custodial staff, filling critical positions in their operations. This collaboration allowed the resort to maintain its cleanliness standards while providing meaningful employment opportunities for people with disabilities.

The Results: A Reliable, Dedicated Staff

Today, housekeeping teams provided by PRIDE Industries not only keep Legacy spotless, but they also bring a positive attitude to work every day. A standout example of this is Ben Godown, who was hired in a custodial role through PRIDE Industries. Ben has become an integral part of the Legacy Resort team, and his impact can be seen and felt by everyone on staff.

“Ben, in a lot of ways is the shining star that sets the example for everyone in the hotel. He’s one of the most conscientious employees and he has a very strong work ethic. We always know that he has a keen attention to detail and will do a fantastic job,” said General Manager Brad Naucler.

Housekeeping Manager Irma Ruiz agrees.

“It is a pleasure to have Ben on our housekeeping team,” she said. “He understands what we do and goes the extra mile every time he is assigned a task.”

Housekeepers: Legacy Resort Hotel and Spa logo

“Ben, in a lot of ways is the shining star that sets the example for everyone in the hotel. He’s one of the most conscientious employees and he has a very strong work ethic. We always know that he has a keen attention to detail and will do a fantastic job.”