Navigating Cybersecurity Challenges in the Construction Industry
The construction industry is continuously moving toward digitization, adopting advanced technology such as artificial intelligence, the Internet of Things (IoT) and Building Information Modeling software. These innovations help to automate tasks, reduce waste and improve efficiency, productivity and safety.
However, this shift also brings significant cybersecurity risks. As construction companies increasingly rely on digital tools and store large amounts of sensitive data, cybercriminals increasingly view them as attractive targets. As a result, construction businesses must take action to protect sensitive information from data breaches and other cybersecurity incidents that can create financial hardship and reputational damage.
Why Cybercriminals Target the Construction Industry
There are several reasons why the construction industry is an appealing target for cybercriminals, including:
High-value transactions—Construction projects often involve significant financial transactions, making them attractive targets for ransomware, phishing attacks and financial fraud. The high value of these transactions can incentivize cybercriminals to attempt fraudulent payments or extortion.
An abundance of sensitive data—Construction companies manage sensitive data like blueprints, architectural designs, bids, contracts, and employee and client information. This data is valuable to cybercriminals, who can exploit it for financial gain through data breaches or sell it on the dark web.
Complex supply chains—With multiple stakeholders and subcontractors involved in construction industry supply chains, each with potentially varying levels of cybersecurity maturity, the odds of network vulnerabilities increase. Malicious actors may target these weak links in the supply chain, as they may serve as potential access points for cyberattacks.
Outdated cybersecurity measures—Many construction firms rely on legacy systems or outdated software that does not provide adequate protection against modern cyberthreats. These weaknesses present attractive opportunities for intrusion by hackers, who often seek out older systems that have known vulnerabilities and are easier to exploit.
Increasing adoption of digital technologies—The digital attack surface has expanded with the construction industry’s increasing use of digital technologies (e.g., IoT, remote project management, cloud storage).
Common Cyberattacks and Why They Are Utilized
There are many types of cyberattacks; the following are commonly used against the construction industry for various reasons:
Ransomware attacks occur when cybercriminals gain access to a business’s computer system, encrypt the files and demand a payment in exchange for providing a decryption key. This attack can be effective against construction companies because projects often have strict deadlines, making business interruptions extremely costly and prompting targets to pay the ransom quickly in an attempt to avoid further losses.
Phishing attacks involve malicious actors tricking users into providing sensitive information (e.g., passwords) through fraudulent emails, text, calls, websites or links. Construction firms often employ temporary staff and subcontractors who may not be familiar with a company’s internal communications. This makes phishing attacks especially effective, as cybercriminals can exploit this unfamiliarity and trick targets into revealing sensitive information or clicking on malicious links.
Business email compromise (BEC) occurs when a malicious actor impersonates a legitimate individual (e.g., a CEO or in-house counsel) or hacks into that person’s email account and fraudulently requests money or sensitive information. BEC scams are used against construction companies because large amounts of money and sensitive data often move between project stakeholders, so these requests may not raise a red flag and can go unnoticed.
Supply chain attacks happen when a cybercriminal infiltrates a business’s supply chain. Construction companies often rely on multiple subcontractors and third-party vendors, which increases the potential for cybercriminals to target less secure partners. Once a third-party vendor’s system is breached, attackers can gain entry into the main company’s network, compromising sensitive data.
Distributed denial-of-service (DDoS) attacks are when cybercriminals overload a business’s network with traffic,disrupting standard operations or causing a network outage, leading to costly project delays. The cybercriminals can then leverage the interruption to extort a ransom from construction companies in exchange for ending the DDoS attack.
Cybersecurity Best Practices for the Construction Industry
Although cyberthreats are numerous and evolving, there are several measures construction businesses can take to safeguard computer systems and networks:
Employee training and awareness programs allow employees to educate their workers on cyberthreats. They also allow discussion on combating cyber risks by following the organization’s cybersecurity policies and procedures.
Multifactor authentication can add additional layers of protection through authenticators, such as one-time passcodes or time-sensitive links, before a user can access a company’s network or system.
Regular software updates and patch management can ensure software programs are best positioned to defend against the latest cyberthreats.
Network segmentation divides a network into smaller parts so that if it is infiltrated, there will be security barriers to prevent lateral movement across the network.
Access controls limit who can view or access sensitive information and the situations when they may do so.
Data encryption transforms data into an unreadable, encoded format so malicious actors cannot decipher it without the correct key.
Data backup and recovery systems allow businesses to quickly recuperate after cyberattacks (e.g., ransomware or DDoS attacks) because their data is stored in another place (e.g., external hard drives or a cloud) and can be quickly reloaded onto systems to minimize downtime.
Vendor and supply chain management ensures companies select and work with vendors with strong cybersecurity practices. By carefully vetting partners, construction companies can reduce the risk of supply chain attacks.
Incident response planning and testing allow construction firms to proactively build their cyber defenses by having policies and procedures to respond to cyberattacks and test their systems to find and repair weaknesses.
The Role of Cyber Insurance in Mitigating Risk
Even with a robust cybersecurity defense, no system is immune to attacks. Cyber insurance helps mitigate exposure to cyber-related losses, filling gaps that may be left by other policies (e.g., commercial property insurance, general liability insurance, etc.), which typically do not cover cyber-related events. It is specifically designed to cover business interruption and other financial losses that result from cybersecurity incidents, such as data breaches and ransomware attacks.
Many cyber insurance policies provide access to a vendor panel that includes legal counsel, public relations firms, IT specialist sand other experts who are experienced in managing cyber incidents. This can help businesses respond quickly and effectively to mitigate the impact of a cyberattack on operations, reputation and finances. Since cyber insurance policies vary in coverage,limits and exclusions, it is advisable to consult a licensed insurance professional for assistance in selecting a policy that best suits a construction business’s needs.
Conclusion
Cyberattacks are a serious threat to the construction industry. Cybercriminals can utilize many methods to steal data or disrupt computer networks for financial gain. Strong cybersecurity practices with the proper cyber insurance policy are essential to address this risk. By being proactive, businesses can mitigate this exposure and safeguard their finances and reputations.
For further construction and cybersecurity resources, contact INSURICA today.
This is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact legal counsel or an insurance professional for appropriate advice. ©2024 Zywave, Inc. All rights reserved