Hackers Find Construction Contractors Data An Attractive Target

January 18, 2020

Picture of Cecilia De La Rosa

Cecilia De La Rosa

Contractors Discussing the house project

For many contractors, technology is making your business more efficient and profitable. The future is no longer something to look forward to. It’s here now and it’s not going away. Unfortunately, there is another side to technology that makes you vulnerable and for many contractors it’s overlooked until it’s too late – cybersecurity. Contractors are using technology for payroll, 3D modeling, and payroll – among many other uses. Your companies’ network, computers, devices, and tools are probably all connected to a network. You may have dozens or even hundreds of things connected to a network sharing valuable information at any one moment that a cyber thief would love to get their hands on.

Contractors Discussing the house project

What are the Threats

There are three major cybersecurity threats your company faces every day. Your contracting company’s network is different than most business networks because it’s not always located in one place. Instead, it’s often spread out over multiple locations. Your business’ day-to-day operations are extremely dependent on the network and the data that flows over it. There are also multiple devices from outside your company that may be coming and going on your network. They handle business information, communications, financial data, construction documents, laser scanners, and cameras that monitor job sites. Your company is waiting to be hacked and it won’t be hard for a hacker who knows what they’re doing. What kind of hackers might your business face?

Foreign Hackers

While you’re thinking no one is interested in your business’ network, you may be very surprised to learn differently. Foreign powers who want to do America harm are looking to hack businesses who may have blueprints to vital business infrastructures, blueprints to buildings or power grids, or communications layouts. They don’t know what you have and what you don’t until they have your data.

Company Data and Identity Theft