{"id":45775,"date":"2023-06-21T13:59:36","date_gmt":"2023-06-21T02:59:36","guid":{"rendered":"https:\/\/www.institutedata.com\/blog\/exploring-cyber-security-in-the-construction-industry\/"},"modified":"2024-07-01T17:20:40","modified_gmt":"2024-07-01T06:20:40","slug":"exploring-cyber-security-in-the-construction-industry","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/nz\/blog\/exploring-cyber-security-in-the-construction-industry\/","title":{"rendered":"Exploring Cyber Security in the Construction Industry"},"content":{"rendered":"<p>The construction industry has become increasingly reliant on technology, from building information modelling (<a href=\"https:\/\/www.ara.ac.nz\/study-interest-areas\/architecture-and-construction-management\/building-information-modelling\/\" target=\"_blank\" rel=\"noopener\">BIM<\/a>) systems to automated machinery. While these technological advancements have streamlined the construction process, they have also led to an increase in cyber security risks.<\/p>\n<p>We explore the growing importance of cyber security in the construction industry, the common cyber threats faced by construction companies, best practices for cyber security, and the role of government and industry regulations in addressing these risks.<\/p>\n<h2>The growing importance of cyber security in the construction industry<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-45555 size-full\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry.png\" alt=\"Cyber security in the construction industry\" width=\"1200\" height=\"900\" srcset=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry.png 1200w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-300x225.png 300w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-1024x768.png 1024w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-768x576.png 768w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-380x285.png 380w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-20x15.png 20w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-190x143.png 190w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-760x570.png 760w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-1140x855.png 1140w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/cyber-security-in-construction-industry-600x450.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>The construction industry has always been known for its physical labour and on-site work. However, with the advent of technological advancements, the industry has undergone a transformation. There has never been a more important moment for the implementation of cyber security in the construction industry.<\/p>\n<p>From drones to 3D printing, from Building Information Modeling (BIM) to Internet of Things (IoT) devices, technology has brought in a new era of efficiency and productivity in the construction sector. To enhance the security of your IoT devices against cyber threats, you can refer to <a href=\"https:\/\/www.institutedata.com\/nz\/blog\/iot-security-the-ultimate-guide-to-protecting-your-connected-devices-and-networks\/\">our article on the topic<\/a>.<\/p>\n<p>However, with these advancements comes a new set of challenges, and one of the most significant challenges is cyber security. As the construction industry becomes increasingly digitised, the amount of data being collected and shared within organisations has grown exponentially.<\/p>\n<p>This wealth of data can be very valuable to cyber criminals, as sensitive information such as proprietary designs, financial data, and employee records are stored electronically.<\/p>\n<p>Construction firms are now more connected to external networks and suppliers than ever before. This interconnectedness can provide entry points for cyber criminals to infiltrate a company&#8217;s network.<\/p>\n<p>As the supply chain expands, the potential attack surface area grows, and the risks associated with third-party vendors become more significant. Therefore, construction firms need to have robust cyber security measures in place to protect themselves from cyber-attacks.<\/p>\n<p>The consequences of a cyber attack can be severe for construction firms. Not only can it result in significant financial losses, but it can also lead to reputational damage that can be immeasurable. A data breach can lead to losing customer trust and brand loyalty, which can have long-lasting effects on a company&#8217;s bottom line.<\/p>\n<p>According to a recent report, The <a href=\"https:\/\/www.securitymagazine.com\/articles\/98486-435-million-the-average-cost-of-a-data-breach\" target=\"_blank\" rel=\"noopener\">global average data breach cost<\/a> increased by 2.6% from $4.24 million (USD) in 2021 to $4.35 million (USD) in 2022. This cost includes direct expenses such as investigation, remediation, and legal fees, as well as indirect costs such as lost business opportunities and damage to the brand&#8217;s reputation.<\/p>\n<p>The cost of a cyber attack can be devastating for construction firms, especially for small and medium-sized businesses that may not have the resources to recover from such an event. These are just some of the reasons why cyber security in the construction industry is on the rise.<\/p>\n<h2>Common threats examples and the need for cyber security in the construction industry<\/h2>\n<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-45559 size-full\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks.png\" alt=\"Cyber security in the construction industry with phising and social engineering attacks\" width=\"1200\" height=\"900\" srcset=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks.png 1200w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-300x225.png 300w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-1024x768.png 1024w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-768x576.png 768w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-380x285.png 380w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-20x15.png 20w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-190x143.png 190w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-760x570.png 760w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-1140x855.png 1140w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Phishing-and-social-engineering-attacks-600x450.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/h3>\n<h3>Phishing and social engineering attacks<\/h3>\n<p>Phishing is a technique used by cyber criminals to trick individuals into giving away sensitive information. Social engineering attacks, such as CEO fraud and pretexting, rely on psychological manipulation to convince people to take actions that may compromise security.<\/p>\n<p>These attacks are commonly used to gain access to construction companies&#8217; sensitive data, such as login credentials or financial data.<\/p>\n<h3>Ransomware and malware<\/h3>\n<p>Ransomware and malware attacks are designed to cause disruptions and sometimes even to paralyse entire systems, making construction companies unable to continue their work.<\/p>\n<p>Attackers use ransomware and malware to gain access to systems or to damage or destroy data. Such attacks can also involve the encryption and holding of data hostage, with a ransom demand for its return.<\/p>\n<h3>Insider threats and human error<\/h3>\n<p>The biggest security threat to a construction company does not always come from outside the organisation. Employees can be a vulnerability if they are not trained or aware of security risks. Innocent mistakes like leaving a password on a post-it note can have devastating consequences. Besides, malicious insiders may intentionally leak or sell sensitive data.<\/p>\n<h3>Supply chain vulnerabilities<\/h3>\n<p>With the construction industry&#8217;s supplier network becoming increasingly global, the risks of cyber attacks from the supply chain also increase. Attackers may use a supplier&#8217;s system as a weak link to access and steal sensitive data or even to inject malware or ransomware into the target company&#8217;s network.<\/p>\n<p>Therefore, companies must work closely with suppliers to maintain cybersecurity hygiene and check for vulnerabilities regularly.<\/p>\n<h2>Best practices for cyber security in the construction industry<\/h2>\n<h3>Employee training and awareness<\/h3>\n<p>Building a strong security culture begins with employee awareness and training. Construction companies should implement mandatory security training programs, requiring that all employees complete cyber security training courses.<\/p>\n<p>Furthermore, employees should be educated on current cyber threats and how to identify phishing scams. Regular cyber security awareness campaigns should also be organised to keep employees updated with the latest threats.<\/p>\n<h3>Implementing strong access controls<\/h3>\n<p>Implementing proper access controls is essential to reduce risks from insider threats. All access to company systems and data should be protected with strong passwords or multifactor authentication. Moreover, employees must only have access to data relevant to their work and position.<\/p>\n<p>Network segmentation can be enforced to restrict network access to certain departments or individuals. To gain knowledge on safeguarding your business&#8217;s networks and applications, you can refer to <a href=\"https:\/\/www.institutedata.com\/nz\/blog\/application-security-vs-network-security-the-ultimate-guide-for-cybersecurity\/\">our article on the subject<\/a>.<\/p>\n<h3>Regular security assessments and audits<\/h3>\n<p>Regular security assessments can identify weaknesses in the company&#8217;s security infrastructure. Regular vulnerability scans and penetration testing can identify where security weaknesses exist that could be exploited by cyber attackers. It is also wise to have periodic independent security audits to ensure that the company&#8217;s security procedures are compliant and up to date with current industry standards.<\/p>\n<h3>Incident response planning<\/h3>\n<p>An <a href=\"https:\/\/www.institutedata.com\/nz\/blog\/disaster-recovery-planning-ensuring-business-continuity-in-times-of-cyber-security-crisis\/\">incident response plan<\/a> can help reduce the speed and severity of a cyber attack&#8217;s impact. Construction firms should prepare a documented incident response plan that outlines the steps to follow in the event of a security breach or incident.<\/p>\n<p>This plan should contain procedures for calling the cyber security experts or law enforcement agencies and communicating with affected parties.<\/p>\n<h2>The role of government and industry regulations<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-45563 size-full\" src=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws.png\" alt=\"Cyber security in the construction industry with government regulations\" width=\"1200\" height=\"900\" srcset=\"https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws.png 1200w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-300x225.png 300w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-1024x768.png 1024w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-768x576.png 768w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-380x285.png 380w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-20x15.png 20w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-190x143.png 190w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-760x570.png 760w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-1140x855.png 1140w, https:\/\/www.institutedata.com\/wp-content\/uploads\/2023\/06\/Compliance-with-data-protection-laws-600x450.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h3>Compliance with data protection laws<\/h3>\n<p>Many countries have introduced data protection laws, such as the General Data Protection Regulation (<a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noopener\">GDPR<\/a>) in the European Union (EU) or the California Consumer Privacy Act (<a href=\"https:\/\/oag.ca.gov\/privacy\/ccpa#:~:text=The%20California%20Consumer%20Privacy%20Act,how%20to%20implement%20the%20law.\" target=\"_blank\" rel=\"noopener\">CCPA<\/a>) in California, to regulate how companies collect, store, and process personal data.<\/p>\n<p>To prevent data breaches and non-compliance with data protection laws, construction companies must ensure that they implement proper data protection measures.<\/p>\n<h3>Industry-specific standards for cyber security in the construction industry<\/h3>\n<p>In response to the growing risks the construction industry faces, some organisations have developed standards and best practices specific to the sector.<\/p>\n<p>The Construction Industry Cyber Security (<a href=\"https:\/\/www.cic.org.uk\/news\/became-a-part-of-cics-network\" target=\"_blank\" rel=\"noopener\">CICS<\/a>) guidelines issued by CIOB and Building Research Establishment is one such example. Additionally, governmental agencies have also published guidelines for digital security in the sector, such as <a href=\"https:\/\/www.nist.gov\/itl\/smallbusinesscyber\/planning-guides\/nist-cybersecurity-framework\" target=\"_blank\" rel=\"noopener\">NIST&#8217;s<\/a> Cybersecurity Framework.<\/p>\n<h3>The impact of government initiatives<\/h3>\n<p>In recent years, government initiatives targeting cybersecurity have grown around the world. Construction companies must pay attention to these initiatives and comply with all relevant regulations. Some governments, such as the UK and USA, have also launched special programs to raise awareness and enhance cyber security in the construction sector.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>The growth of technology in the need for cyber security in the construction industry has brought new challenges and cyber risks. Protecting the vast amounts of sensitive data construction companies generate requires a proactive approach to cybersecurity.<\/p>\n<p>By adopting best practices for cyber security in the construction industry, such as improving employee awareness, implementing strong access controls, conducting regular security assessments, and planning, companies can mitigate cyber threats, reduce financial losses, and safeguard their reputation.<\/p>\n<p><span data-sheets-root=\"1\" data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;If you're interested in pursuing a career in cyber security, you may want to explore Institute of Data's 3-month full-time or 6-month part-time Bootcamps. \\n\\nTo find out more about our programmes led by industry professionals, you can download a Cyber Security Course Outline. \\n\\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1049347,&quot;3&quot;:{&quot;1&quot;:0},&quot;4&quot;:{&quot;1&quot;:2,&quot;2&quot;:14281427},&quot;11&quot;:4,&quot;12&quot;:0,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:245,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:245,&quot;2&quot;:&quot;https:\/\/www.institutedata.com\/nz\/courses\/cyber-security-programme\/&quot;}\uee10{&quot;1&quot;:276}\">If you&#8217;re interested in pursuing a career in cyber security, you may want to explore Institute of Data&#8217;s 3-month full-time or 6-month part-time Bootcamps.<\/p>\n<p>To find out more about our programmes led by industry professionals, you can download a <a class=\"in-cell-link\" href=\"https:\/\/www.institutedata.com\/nz\/courses\/cyber-security-programme\/\" target=\"_blank\" rel=\"noopener\">Cyber Security Course Outline. <\/a><\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The construction industry has become increasingly reliant on technology, from building information modelling (BIM) systems to automated machinery. While these technological advancements have streamlined the construction process, they have also led to an increase in cyber security risks. We explore the growing importance of cyber security in the construction industry, the common cyber threats faced&hellip;<\/p>\n","protected":false},"author":1,"featured_media":45771,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[583,613,598],"tags":[1263,778,1347],"class_list":["post-45775","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-nz","category-data-skills-nz","category-industry-training-nz","tag-business-nz","tag-cyber-security-nz","tag-industry-training-nz"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts\/45775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/comments?post=45775"}],"version-history":[{"count":2,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts\/45775\/revisions"}],"predecessor-version":[{"id":82660,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/posts\/45775\/revisions\/82660"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/media\/45771"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/media?parent=45775"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/categories?post=45775"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/nz\/wp-json\/wp\/v2\/tags?post=45775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}