As an architect, thinking you need cyber protection or believing someone would want to hack into your system, is furthest from your mind.
It’s common to think that since you are an architectural firm with just a few staff you may not have much to worry about. Unfortunately, that thinking is dangerous.
Construction has come of age and is more and more reliant on technology to share plans and drawings in the cloud.
In an article “How to Secure Your firm from Cyber Attacks” featured in the Journal of American institute of Architects in March 2018, Nathan Miller wrote:
“As an architect you are connected to those involved in construction who also use technology to track projects onsite. Further, the software you use, be it CAD or some other form of software, relies on a cloud solution to be shared.
Architects and builders have welcomed significant shifts in their digital workflow with cloud-based BIM software for remote project coordination, internet file hosting for global accessibility, and virtual workspaces for team communication. And the end results—the buildings themselves—are slowly but increasingly connected to Internet of Things (IoT) networks, with building management systems storing user information on everything from HVAC usage to lighting preferences.
Consider the following hypothetical scenarios: a hacker targeting an architecture firm could expose sensitive data about a client’s confidential business operations; a data breach at Dropbox could expose any one of the 1.5 billion DWG (drawing) files currently stored on the platform; and a cyberattack focused on a building control system in a hospital or airport could put the safety of its occupants at risk.”
BALANCING SECURITY IN THE CLOUD
Whilst using software like CAD or BIM are convenient and productive ways to complete your work, share them and make the required amendments, it is the simple fact that remote access in the cloud by a hacker who has the desire to attack and hold up a project that has deadlines, provides an easy path to deliver Ransomware or other significant malware.
Finally, you belong to a select group of industries that rely on billable hours to make money. This is another reason a hacker would target you, as any down time once your business is hit, will cost you money when you cannot complete any work. You can’t get those lost hours back.
Any project that could be held up due to a ransomware attack would delight a hacker. And that is so easy to do when most of your business is reliant in the sharing of files in the cloud.
Designing your security architecture when your business is so reliant on cloud solutions for your business to operate would start with:
Recently we presented a national webinar on 18th March 2019 for the Australian Institute of Architects.
We would like to share the recording of the webinar with you, as we are dedicated to your education and awareness.
To play the webinar simply click the link below
Next steps to Design your Architecture Security
Starting your Design Architecture to build your Defence Plan starts here with a strategy call with our Cyber Security Specialist, Gary Lowe.