You’re a construction contractor, so there’s no need to worry about computer hackers or cybersecurity thieves beyond installing basic computer security. After all, what are hackers going to find out, how many bricks you ordered?
This approach to cybersecurity can, and very likely will, seriously wound or even kill a construction company. It applies to every company's electronic components: desktop computer; laptops; smartphones; and anything else that can be broken into electronically.
Construction companies are increasingly targeted by cyber criminals, who are quite often very smart people who have dedicated their lives to destroying yours. It’s not personal, it’s business: they don’t care about you. They want your money and information and they’ll spend all day, every day, figuring out how to get it.
What information might criminals be after?
That’s a partial list. Even information you might think is uninteresting, such as a building plan, could be valuable to a hacker. Additionally, if a damaging intrusion is successful it could expose you to legal liability from persons or companies harmed by the breach. The list of criminal acts is long and getting longer. Among the most prevalent are:
Even your computer’s webcam can be used against you by an effective hacker, as the San Diego Union Tribune reported: “This week, web-surfers could watch scientists in a lab at UC San Diego, employees talking at a nearby construction company, and the inside of a house filled with musical recording equipment.”
Various types of attacks aren’t a matter of a thief or scammer coming straight at you. Instead, they come through a side door of which you’re unaware. A DataBreaches.net report on the construction-related hacking of several companies for possible capture of W-2s illustrates that companies are vulnerable even through the actions of another player, as this company’s message to employees stated:
“This information was stolen through a sophisticated social engineering scheme in which an outside party posing as another person convinced an employee of Central Concrete Supply to provide copies of the documents by email on February 23, 2016. The data was not obtained through any breach of the Company’s information technology systems.”
The famous breach of Target stores was accomplished by cyber criminals who gained access to Target’s systems through a HVAC vendor.
The problem is relentless. Here are 8 proactive steps construction companies can take now:
Think of it this way: as a construction company, you’re constantly preaching safety. You protect your employees; building; tools; and equipment. Cybercrime protection is another such measure. It’s frustrating, aggravating, and perhaps even discouraging, but highly necessary.