— 7 min read
Construction Cybersecurity: Protecting Projects and People
Last Updated Nov 13, 2024
Last Updated Nov 13, 2024
From the streamlined workflows of project management software to the futuristic promises of robotics, tech is introducing opportunities that were previously unimaginable in the construction industry. But all that potential comes with new risks.
The need for comprehensive cybersecurity in construction is more pressing than ever, as the industry increasingly adopts and relies on digital tools. Too often, cybersecurity is treated like an afterthought, something that is done in response to an incident. In reality, realizing the potential of new tools is dependent on having cybersecurity measures that protect their data, the projects on which they’re used and, most importantly, the people impacted by their use.
This article explores cybersecurity in construction, including the need for specialization, common threats and best practices.
Table of contents
The Importance of Cybersecurity in Construction
Part of the challenge of cybersecurity is the continuously evolving nature of cyber threats. Attackers and criminals are constantly searching for new ways to challenge or threaten systems.
Several factors make the construction industry particularly vulnerable to cyber threats:
Increased Digitalization
The industry is moving online — and quickly. Not only does this create more potential targets, it means many people are in the early stages of tech adoption and haven’t thoroughly considered how to protect themselves or their assets and tools.
Numerous Stakeholders
The industry is made up of many stakeholders, including contractors, subcontractors, owners and government partners. Each stakeholder in a project can introduce a potential security weakness. The exchange and sharing of information between parties only increases those risks.
The Presence of Outdated Systems
Legacy systems and tools are still commonly used alongside new technologies. These older tools often aren’t equipped to handle modern threats or to securely work with newer systems.
High-value Projects and Data
Construction projects usually require significant financial transactions and the exchange of sensitive and valuable data. This makes companies and contractors potentially alluring targets.
Critical Infrastructure Projects
Construction companies often work on essential systems, such as water treatment plants or power plants. Cybercriminals sometimes target infrastructure because of its potential for large-scale disruption
Common Threats and Vulnerabilities
Construction companies should be aware of the most common cyber threats.
Threat | Definition | Example in construction |
---|---|---|
Ransomware | Malicious software that captures a victim’s data and demands payment for its release | A construction firm’s project files are captured from either a hard drive or a cloud-based solution. The files are encrypted so the company is unable to access them. This halts all progress on project until a ransom is paid to regain access. |
Phishing scams | A bot or cybercriminal pretends to be a trustworthy source in order to obtain sensitive information from a company | An employee receives an email that looks like it’s from a trusted vendor. They engage and input confidential login details that are used to obtain sensitive information about the company and its clients. |
Data breaches | Unauthorized access and gathering of data | Hackers gain access to a construction company’s database. They steal the personal and financial information of clients and employees. |
Man-in-the-middle attacks | An attacker secretly intercepts and possibly alters communication between two parties | An outside entity intercepts financial transactions between a construction company and a supplier. The payment is redirected to an account controlled by the attacker. |
Supply chain attacks | Attacking a less secure partner or element of the supply chain to gain access to a larger target that is otherwise better secured | A hacker targets a small subcontractor with low-security measures. The hacker gains access to the sub’s systems, including its project management system. Because the sub regularly works with the federal government, the attacker uses the project management system to gain information and access to an infrastructure project. |
Common Misunderstandings
Misconceptions about cybersecurity are common in every industry, and they can lead to extreme vulnerabilities. Here are a few common ones, compared with their respective reality:
Common misunderstanding | Reality |
---|---|
“Security through obscurity”: Small contractors might believe they are less likely to be targeted because of their size or lack of prominence. | There is zero obscurity on the internet. Every company or individual has sensitive information and an IP address, and are therefore vulnerable. Some hackers might even target smaller firms in hopes they have more lax security measures. |
“DIY security is sufficient”: The belief that relying on team members who understand tech but don’t necessarily have expertise in cybersecurity is enough. | The ever-evolving and complex nature of cyber threats can rarely be anticipated or handled by someone without expertise or up-to-date resources. Working with external experts or paying for comprehensive security solutions is more likely to ensure effective protection. |
“IT can run security alone”: The belief that cybersecurity is solely the responsibility of the tech team. | Cybersecurity should be a shared responsibility across an organization and involve input from various departments, including leadership, finance, sales and legal. The consequences of a cyber attack would impact more than just IT, so security should involve participation and understanding from many different departments. |
Best Practices for Cybersecurity in Construction
Threats are ever-evolving and security can look slightly different based on a company's needs and specialization. However, there are a few best practices that almost always increase the effectiveness of cybersecurity.
Invest in expertise.
Engaging with external consultants or investing in specialized security packages helps to make sure the latest information and resources inform security measures. For some larger companies, this might involve creating a specialized cybersecurity team.
Some construction companies treat IT as a sort of auxiliary function, often entrusting important security tasks to team members without specialized training. Working with professionals who live and breathe technology and security is the most effective way to identify weaknesses and find up-to-date solutions.
Implement multi-factor authentication.
Multi-factor authentication is a quick and highly-effective way to add an extra layer of security to all systems. This also helps reduce the risk posed by individuals who might not be as careful or have as much understanding of risk.
Create a culture of security.
The effectiveness of cybersecurity often depends on a shared prioritization that permeates a whole organization. This isn’t to say that all team members need to become security specialists. People simply need to understand the risks, the purpose of new measures and how they contribute to or detract from overall security. Creating this culture often requires training employees on security awareness so they understand common threats, especially phishing scams to which they might be exposed.
Conduct regular security audits.
Much like project teams conduct routine safety inspections on a job site, cybersecurity audits should be done regularly to identify potential vulnerabilities and measure the effectiveness of security measures. External consultants can often do audits more effectively than internal team members, because they are able to see systems more objectively and with an outsider’s perspective.
Stay updated on what’s happening in construction.
Subscribe to Blueprint, Procore’s free construction newsletter, to get content from industry experts delivered straight to your inbox.
Security Incident Response Plans
Security incidents happen, but you never want to find yourself saying, “What do I do now?” Incident response plans should be established as part of tech adoption, and should include procedures and systems for responding to, containing, recovering and communicating about security incidents. Key components of a plan include:
Preparation and Training
Team members should be familiar with the plan and know how to access it in the case of an incident. Training might include scenario rehearsals, one-pagers or feedback sessions.
Involving Experts
Specialists should be consulted to develop and refine an incident response strategy, including how to contain an attack and how to communicate with clients about an incident.
Coordination with Legal and Insurance
Collaboration with legal advisors and insurance agents helps a company withstand and recover from an attack by ensuring plans comply with rules and regulations and have all the necessary protections for the company and employees.
Communicating About Cybersecurity
One of the great challenges of implementing cybersecurity measures is effectively communicating about them. Too often, people implementing the measures get lost in technical jargon. For an industry that has often been hesitant to adopt new technology, cybersecurity needs to be accessible and understandable.
While many construction professionals aren’t experts in digital threats, they are highly specialized in their area of expertise. That’s a good thing. Effective cybersecurity doesn’t require them to retool, but it does require an understanding of the basics of cybersecurity and how each person contributes or detracts to organizational security. Conveying those things in terms that are easy to understand and translate is the responsibility of the people pushing and implementing change. Plain language, open communication and creating trust is a key part of all change management — and it's especially important for establishing comprehensive cybersecurity.
Was this article helpful?
Thank you for your submission.
0%
0%
You voted that this article was . Was this a mistake? If so, change your vote here.
Scroll less, learn more about construction.
Subscribe to The Blueprint, Procore’s construction newsletter, to get content from industry experts delivered straight to your inbox.
By clicking this button, you agree to our Privacy Notice and Terms of Service.
Categories:
Tags:
Written by
Jeff Sample
Jeff Sample has devoted the past 25+ years to transforming companies. Jeff optimizes companies throughout the construction industry by designing solutions, optimizing strategic advantages, and breaking down information silos. His passion for outdoor adventure and Ironman competitions garnered him the moniker, "The Ironman of IT." As an Industry Evangelist, Jeff promotes collaboration and the transformation of construction to help project teams reach their potential. His depth of IT experience in various industries and his passion for continuous improvement have made Jeff a popular speaker and vocal thought leader in construction, spending much of his time educating on multiple topics to better the industry.
View profileJames Hamilton
51 articles
James Hamilton is a writer based in Brooklyn, New York with experience in television, documentaries, journalism, comedy, and podcasts. His work has been featured on VICE TV and on The Moth. James was a writer and narrator for the show, VICE News Tonight, where he won an Emmy Award and was nominated for a Peabody Award.
View profileExplore more helpful resources
How Reality Capture is Reshaping the Construction Industry
On any given day, the scene of a construction site is a place brimming with important information — for example, anything from the percent-complete of drywall install to location of...
How Construction Mapping Transforms Site Management
Gone are the days when construction teams relied solely on paper maps and manual sketches. Today, advanced digital tools are revolutionizing how construction sites are visualized and managed. With the...
Building Buy-In: 8 Keys to Improving Tech Adoption in Construction
Over the years, the construction industry has seen significant changes. New software and tools can be exciting, but without the right approach to evaluating and implementing new technology, even the...
Demystifying 3D Takeoffs in Construction
A construction takeoff refers to the process of using construction plans and documents to determine exactly what materials a contractor will need to complete a project. A 3D takeoff uses...