{"id":643,"date":"2021-06-28T13:41:23","date_gmt":"2021-06-28T13:41:23","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=643"},"modified":"2021-06-28T13:41:23","modified_gmt":"2021-06-28T13:41:23","slug":"cybersecurity-challenges-in-the-construction-industry","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/","title":{"rendered":"Cybersecurity Challenges in the Construction Industry"},"content":{"rendered":"<p>Digital transformation is at the heart of every industry.\u00a0There are no longer any industries that are immune to the rapid adoption of this movement.\u00a0When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam.\u00a0However, rapid digitalization has transformed the construction industry and will continue to drive change and encourage innovation. The traditional ways of conducting business brings about additional risks and challenges that the industry has to solve.<\/p>\n<p>While it is impossible to address every contingency, we can examine what may be the most prominent cybersecurity risks a construction company should be wary of.<\/p>\n<h2 id=\"h-what-exactly-is-the-digital-transformation-in-the-construction-industry\">What Exactly is the Digital Transformation in the Construction Industry?<\/h2>\n<p>Construction was once carried out via messengers who delivered contracts, blueprints and architectural drawings to site foremen.\u00a0Logistics were controlled via telephone conversations and, in many cases, via word of mouth between project managers and owners that continued all the way down to line workers who could recommend various tradesmen for a job.\u00a0Now, not only have the gender roles been expanded, but the entire industry is maintained in the same way as all businesses \u2013 through electronic communications.<\/p>\n<p>Personnel can be hired via electronic means. Contracts can be digitally signed. And thanks to modern tracking mechanisms, supplies can be tracked from the factory to the construction site with remarkable precision. All of these developments place construction entities along the same spectrum as any other modern business.<\/p>\n<h2 id=\"h-reputation-loss\">Reputation Loss<\/h2>\n<p>When a company\u00a0<a href=\"https:\/\/www.tripwire.com\/state-of-security\/security-data-protection\/cost-data-breach-security-tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">faces a data breach<\/a>, the fact that all the customers\u2019 private information ends up in the hands of the attackers isn\u2019t even the worst part.\u00a0This is data that was under the care and custody of the victimized company.When a breach occurs, the perception of the affected clients (and prospective clients) is not one of sympathy. Rather, the viewpoint is that sensitive data isn\u2019t safe with you.\u00a0This can cause irreparable reputational damage to a business, driving customers to a competitor.<\/p>\n<p>This means that maintaining a solid cybersecurity reputation has never been more critical. If your organization is in the unfortunate position of suffering a data breach, there are always things you can do to make things right:<\/p>\n<ul>\n<li>Invest in a cybersecurity\u00a0<a href=\"https:\/\/www.tripwire.com\/products\/tripwire-configuration-manager\/worry-less-about-cloud-security\" target=\"_blank\" rel=\"noreferrer noopener\">Security as a Service (SaaS) solution<\/a>\u00a0that works best for your company.<\/li>\n<li>Take accountability.<\/li>\n<li>Show your determination towards fixing the problem for the future.<\/li>\n<li>Establish a reputation management plan.<\/li>\n<\/ul>\n<p>Construction firms hold volumes of client data.\u00a0This dictates that a high level of care must be taken to protect that data and that a strong cybersecurity program should be a priority at the company.<\/p>\n<p>Source: Tripwire<\/p>\n<p><a href=\"https:\/\/www.tripwire.com\/state-of-security\/ics-security\/cybersecurity-challenges-in-the-construction-industry\/\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital transformation is at the heart of every industry.\u00a0There are no longer any industries that are immune to the rapid adoption of this movement.\u00a0When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam.\u00a0However, rapid digitalization has [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":255,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Challenges in the Construction Industry - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Challenges in the Construction Industry - Community\" \/>\n<meta property=\"og:description\" content=\"Digital transformation is at the heart of every industry.\u00a0There are no longer any industries that are immune to the rapid adoption of this movement.\u00a0When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam.\u00a0However, rapid digitalization has [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-28T13:41:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/\",\"name\":\"Cybersecurity Challenges in the Construction Industry - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg\",\"datePublished\":\"2021-06-28T13:41:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Challenges in the Construction Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Challenges in the Construction Industry - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Challenges in the Construction Industry - Community","og_description":"Digital transformation is at the heart of every industry.\u00a0There are no longer any industries that are immune to the rapid adoption of this movement.\u00a0When we think of the construction industry, we may think back to an image of ironworkers sitting over a city and enjoying a lunch break on a construction beam.\u00a0However, rapid digitalization has [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-06-28T13:41:23+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/","name":"Cybersecurity Challenges in the Construction Industry - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg","datePublished":"2021-06-28T13:41:23+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2020\/07\/working-woman-technology-computer-7374.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/cybersecurity-challenges-in-the-construction-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Challenges in the Construction Industry"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=643"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/643\/revisions"}],"predecessor-version":[{"id":644,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/643\/revisions\/644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/255"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}