fbpx
Insurica
Pay Now
Client Login

Construction Industry: We Don’t Have to Worry About Cyber Attacks?

There was a time when that statement was common—and even accurate. But that statement is far from correct now. In this article, we will address only the two (2) most frequent ‘attacks’ on contractors’ businesses.

“Ransomware”—Securing and holding your information for ransom is rampant in all industries—including construction.  This type of attack is especially costly as it has at least two (2) ‘hits’. One is the ransom demanded to release the key that will decrypt the contractor’s information. The other ‘hit’ is the loss of income due to a shutdown of your project—or your entire business, while you wait for access to information so that you can continue your project or business activities.

The attacker captures, then encrypts confidential information about employees, projects, vendors, bid information, blueprints, financial information, etc.—until a ransom is paid. Whether you pay the ransom, your project or business shuts down, your reputation is harmed and you may have to pay penalties on the project for being behind schedule. The costs continue to rise in this situation, no matter what happens after the ransomware attack.

“Social Engineering”, or computer deception, or trickery is the second most common attack on contractors. Contractors are excellent targets for this type of attack. With construction industry employees working mostly in the field – using laptops, smartphones, and tablets, and with there being so many ‘employees’ on a project that perhaps belong to subcontractors, and with a significant ‘turnover’ of employees in this area, it is easy to see that it is difficult to keep control of all information in these scenarios. This allows the attacker to obtain all the information needed to send false invoices to you on behalf of your legitimate vendors. You pay these invoices, but the money diverts to the ‘hacker’ instead.

So, what can a contractor do to protect their company from these and other cyber exposures? The first step is to get rid of complacency! Accept that you are vulnerable too.

A company’s biggest cybersecurity weakness is it’s people – your employees who inadvertently help the attacker, perhaps by opening a ‘bad’ e-mail allowing access to your system. So training would help this, but with high turnover, it’s a continuing weakness. Consider encrypting your information, change your passwords often, and check with your insurance agent about purchasing a cyber liability insurance policy that includes both coverages.

About the Author

INSURICA
INSURICA

Share This Story

Stay Updated

Subscribe to the INSURICA blog and receive the latest news direct to your inbox.

Subscribe to the blog

Related Blogs

OSHA’s Safe and Sound Week Scheduled for Aug. 12-18

July 25th, 2024|Blog, Risk Management, Safety Tips|

Each year, more than 5,000 workers are killed on the job. Additionally, more than 3.6 million employees are seriously injured each year while at work. Because of this, the Occupational Safety and Health Administration (OSHA) holds a nationwide event each August called Safe and Sound Week, which promotes the importance of companies incorporating safety and health programs into their workplace. This year, the event runs Aug. 12-18, 2024.

2024 Midyear Market Outlook: Workers’ Compensation

July 24th, 2024|Blog, Risk Management, Trending|

Profitable underwriting results have generated favorable conditions across the workers’ compensation insurance market for nearly a decade. According to the National Council on Compensation Insurance (NCCI), the segment produced combined ratios of 84.5 and 84.9 in 2022 and 2023, respectively, demonstrating continued profitability.

CrowdStrike, the Most Important Cyber Accumulation Loss Event Since NotPetya, Highlights Single Points of Failure

July 23rd, 2024|Blog, Risk Management, Safety Tips, Trending|

In what is being called “the most important cyber accumulation loss event since NotPetya,” the July 19, 2024, global technology outage (CrowdStrike) will produce scores of insurance claims across a range of policies, test cyber policy wordings,and sharpen the industry’s focus on single points of failure.

Go to Top