views
March 2016
A Cybersecurity Risk in the Construction Industry
Rick White, Partner | DHG Assurance Services
Rodney Murray, Principal | DHG IT Advisory
Connected devices, social media and the cloud are altering the ways companies’ process, share and store information.
These advances allow staff to access company data from remote locations while traveling, on a job site, or from their
home. As new communications mediums, currencies and storage options continue to emerge, attackers see even more
opportunity to steal valuable information. It is becoming more imperative for management to focus on responding to
cybersecurity risk to prevent these attacks.
Why It Matters to Your Company
Failure to address cybersecurity threats increases exposure to
a host of risks to a company’s brand and bottom line. Negative
press has become commonplace in relation to publicized
cybersecurity incidents in recent years. It causes reputational
damage and can result in unplanned costs.
Further, it can
decrease a company’s market valuation, create new legal
complexities and may give rise to fines from some regulatory
bodies for noncompliance. All of these are possibilities when
breach prevention and notification practices have not been
managed or properly handled.
Assurance | Tax | Advisory | dhgllp.com
How Attackers Penetrate Your Company
and Information
There are multiple ways in which your company’s confidential
information can be compromised. Some of the various
methods of attacking your system require a high level of skill
and time on behalf of the intruder, while others require little
to no effort and can be performed by relatively inexperienced
attackers.
Examples of attack methods include:
• Malware – A computer program with malicious intent.
These programs often appear as harmless files that are
designed to trick users to click on the file, yet cause them
to reveal sensitive information.
. views
• Keyloggers – These invisible applications often silently
install themselves after unsuspecting users open a
malicious email attachment or web link. They allow
intruders to collect passwords, credit card numbers and
other confidential data as they are being typed on the
keyboard.
• Does our company have the capability to monitor for
inappropriate use of the system or potential security
events that might arise?
• Does our company have a documented formal policy
regarding use of company networks and data to limit
potential of exposure to unauthorized individuals?
• Password attacks – This includes obtaining and
determining (“cracking”) a username and password. This
can allow unauthorized users to access information via
your “secured” system.
• Has access to critical systems and data been limited to
appropriate individuals?
• Have our employees been trained how to avoid exploits
and how to report potential malicious activity on the
network?
• Denial of service – These attacks occur when attackers
disrupt or impair valid user’s ability to access your
company’s networks.
Finding the answers to these questions could highlight the
need to consider establishing additional cybersecurity controls
within your organization.
• Unpatched software – A patch is an update to a computer
program (e.g. Java or Adobe software) intended to close
vulnerabilities that could be exploited by attackers.
Unpatched applications provide an entry opportunity for
these attackers allowing them into your computer and
network.
What are the Steps You Can Take?
Here are a few simple actions you can take to reduce
cybersecurity risks immediately:
Why is it Important to the Construction Industry?
• Identify your company’s most valuable information and
where that information is located on your network.
Limited regulation and guidance for construction companies
result in less focus on cybersecurity relative to other industries.
Yet, construction companies face the same threats, given
reliance upon IT systems and Internet connectivity for
business operations.
The reduced attention on security risks –
combined with a common belief that they aren’t a target – often
make construction companies low hanging fruit for attackers.
• Establish internal controls and cybersecurity procedures
that consider both internal and external threats.
• Prioritize cybersecurity procedures to protect the most
valuable information. You need to place the highest levels
of protection around your most valuable information.
• On a regular basis, evaluate your cybersecurity controls
and procedures for their effectiveness with thorough
audits and technical assessments by resources with
cybersecurity experience.
Has your business assessed the impact on operations if an
intruder gained access to your proprietary bidding model and
sold it to your competitors, or stole bank account credentials
to conduct fraudulent transactions? Would your business be
able to recover and remain competitive?
• Establish a plan of action in the event that you must
respond to an adverse cybersecurity incident. Test the
plan by conducting a simulation at least once a year.
Ask Yourself the Right Questions
Thwarting cybersecurity threats is challenging, as intruders are
using more sophisticated and always-evolving techniques to
avoid detection.
But, it is imperative for your business that
you ask yourself and your IT advisors the right questions
regarding the security of your company’s critical systems and
data. Some questions to consider include:
• Establish procedures to evaluate your third party service
providers (if applicable) and assess their cybersecurity
processes.
• Communicate cybersecurity measures to the entire
organization and help every employee within your
organization understand the threats your organization
faces, and their role in protecting the company’s assets.
• Is our company heavily dependent on third parties to
support our IT systems or process financial transactions?
Assurance | Tax | Advisory | dhgllp.com
2
. views
What Can You Do if Your Company Lacks These
Resources?
In Conclusion
In today’s evolving information technology world, addressing
security risks can be critical to sustaining a strong brand in
the industry. Don’t let your business be impaired by theft of
sensitive information or fraudulent financial activity as a result
of a data breach. Take the steps necessary to protect your
information and future and avoid damaging interruption of
operations, or worse – becoming the next headline.
The suggestions provide a high level first step in assessing
your company’s IT preparedness. Should additional resources
be necessary to improve the IT security infrastructure,
we recommend you consult a trusted third party service
provider to do an assessment of your IT structure and
risks. Knowledgeable IT advisors can provide you the tools
and counsel you need to help protect your company from
cybersecurity breaches or other IT related issues. When
searching for a trusted third party advisor, you may consider
individuals holding established certifications in the industry,
such as CISSP, CCE, CISA, CRISC and GCIH certifications.
Assurance | Tax | Advisory | dhgllp.com
Rick White
Partner
DHG Assurance Services
703.226.0098
rick.white@dhgllp.com
3
Rodney Murray
Principal
DHG IT Advisory
704.367.7062
rodney.murray@dhgllp.com
.