Modern BMS increasingly rely on digital connectivity, making them potential risks for cyberattacks . These sophisticated threats can impact critical infrastructure , leading to operational downtime . Establishing robust BMS security protocols – including regular software updates and user awarenes