Intelligent CIO Europe Issue 26 | Page 75

INDUSTRY WATCH DON’T NEGLECT THE PUBLIC CLOUD AND DON’T BE SHY SEEKING EXPERTISE FROM THE OUTSIDE. W What are some of the unique cyberthreats to the construction sector and why? Decentralisation: By nature, most construction companies are highly decentralised. There are many stakeholders involved in construction projects that are highly dependent on mobile devices and laptops, offering multiple access points to networks and creating vulnerabilities if they are not all adequately protected and trained on cybersecurity. Connected Industrial devices like construction cranes, asphalt pavers: The fourth industrial revolution is slowly creeping into the construction sector, with permanently connected and autonomously operating heavy machinery. Obviously, these need to be properly protected from malicious threats. Confidential information: Although construction companies do not host the type of personal information hackers find desirable (e.g., credit cards or financial records), they still have access to clients’ confidential information. Compromised intellectual property such as building specifications and architectural drawings can provide a roadmap for criminals to gain access to valuable personally identifiable information including financial accounts and employee data. Just like any other company, if you have access to this type of confidential information, you’re vulnerable to the common forms of cyberattacks. Business interruption: As in any industry, cyberattacks can result in www.intelligentcio.com costly business interruptions for construction companies. A delay in construction projects can be quite costly, up to the point where the contract is revoked and passed to a competitor. This potential disruption must be built into the preventative measures of a risk management plan for construction projects. How is the construction sector rising to the challenge of combatting these threats? In an increasingly digitised and connected world, cybersecurity needs to be considered at all stages of a firm’s operation. The construction industry as a whole is unfortunately known to be rather slow at adopting new technologies. Countless studies and surveys over the years have shown that business owners continue to under invest in technology. While it may seem daunting, cybersecurity can be approached and managed in surprisingly the same way as many other risk factors. Luckily, we’re seeing large construction companies already stepping up. Can you outline any use cases of how technology is being used to mitigate threats? Mobility: Just as the fact that construction is carried out in a variety of sites and locations represents a physical risk. Bases can often be temporary locations such as on-site cabins and trailers, with workers connecting to business networks and systems via laptops, tablets and smartphones. Nevertheless, security must not be any INTELLIGENTCIO 75