You are on page 1of 20

Cyber security for

construction businesses
Cyber security guidance for small-to-medium businesses working in the
construction industry and the wider supply chain
Foreword

Sarah Lyons Caroline Gumble


NCSC Deputy Director Economy & Society Resilience Chief Executive of the Chartered Institute of Building (CIOB)

The National Cyber Security Centre (NCSC) Whilst we cannot guarantee protection Understanding the role of cyber security Cyber security has been highlighted by the
is delighted to partner with the Chartered against all the cyber threats you face, by within the construction industry is now an CIOB for some time. Our Digital Technologies
Institute of Building (CIOB) to produce this implementing the steps described, you’ll be essential requirement for organisations of & Asset Management Special Interest
guidance to help small-to-medium sized protected from most common cyber attacks. all sizes. Digital assets are commonplace Group has supported members and the
construction businesses protect themselves And should the worst happen, you should be in most businesses (including those in the wider industry (with particular reference to
from cyber attacks. able to quickly recover. construction sector), so managing data and supply chains and client relationships) to
digital communications channels is more understand the principles of good security
The NCSC is the UK government’s lead for We’re always looking to improve our important than ever. planning, and to encourage the use of design
cyber security. Our aim is to make the UK the guidance, so if you have any feedback, good measures to mitigate and manage the
safest place to live and work online, and to or bad, please get in touch with us using the The consequences of poor cyber security potential risks for construction projects. We’re
help us achieve this, we work closely with key NCSC website. should not be underestimated. They can now delighted to partner with the National
organisations of all sizes across all sectors, have a devastating impact on financial Cyber Security Centre (NCSC) and the Centre
including construction. margins, the construction programme, for the Protection of National Infrastructure
business reputation, supply chain (CPNI) to produce another invaluable
Like many other sectors that are embracing relationships, the built asset itself and, resource, the Cyber security for construction
new technologies and adopting new digital worst of all, people’s health and wellbeing. businesses guide.
ways of working, the construction industry Understanding the digital aspects of
continues to be impacted by cyber crime. a business (and then minimising and This guide provides a timely opportunity
This document includes clear and concise managing the risks presented) is therefore of to focus on the risks presented by cyber
cyber security guidance that can help you to prime importance. crime. It’s particularly aimed at the small-to-
safeguard your business. medium sized businesses which make up the
majority of construction companies in the UK,
and is an accessible resource that can help
organisations understand and prevent cyber
crime across the sector.

Caroline Gumble
About this guidance In this guidance

Section 1
For business owners and managers
This guidance is aimed at small-to-medium sized businesses working in the
construction industry and the wider supply chain (including the manufacture
of building supplies, surveying, and the sale of buildings). Why cyber security matters

Who is behind cyber attacks?

• Section 1 of this guidance is aimed at business owners or managers. This section describes Design stage
why cyber security matters to the construction industry, and then summarise the cyber threats Construction stage
associated with each stage of the construction process (design, construction and handover). Handover stage

• Section 2 provides guidance that can be implemented to make your construction business
more resilient against common cyber attacks. The guidance is aimed at staff responsible for IT
equipment and services within a construction business. Smaller businesses with no such role
may want to start by reading the NCSC’s Small Business Guide.

Section 2
For staff responsible for IT

Cyber security guidance

1. Back up your data


2. Protecting your office equipment from malware
3. Keeping your phones and tablets safe
4. Using passwords to protect your data
5. Dealing with phishing
6. Collaborating with suppliers and partners
7. Preparing for (and responding to) cyber incidents

Where to go for more help

4 National Cyber Security Centre National Cyber Security Centre 5


Section 1
Why cyber security matters
For business owners and managers

6 National Cyber Security Centre National Cyber Security Centre 7


Why cyber security matters

Recent high profile cyber attacks • Although construction businesses


against the construction industry don’t store the same kind of financial
information a bank does, they still store
illustrate how businesses of all sizes (and have access to) valuable data. Who is behind cyber attacks?
are being targeted by criminals. Criminals could be looking for details
As the industry continues to embrace about the company’s next bid (or The construction industry faces numerous Malicious insiders: they use their access to
and adopt new digital ways of building design) in order to gain an unfair groups and individuals that seek to take businesses data or networks to conduct
working, it is more important than advantage. Cyber criminals might be advantage and do harm, which is why it’s malicious activity, such as stealing sensitive
looking for sensitive employee data, like so important to secure all digital aspects of information to share with competitors.
ever to understand how you might national security numbers, bank account your business. You may be targeted by:
be vulnerable to cyber attacks, and numbers and payroll data, in order Nation states: target both public and private
what you can do to protect your to engage in identity theft, or to craft Online criminals: they are good at identifying sector organisations. Even if you don’t think
business. realistic authentic-looking emails for and conducting cyber attacks to make you’re large enough to be of interest to
phishing attacks. money, for example stealing and selling foreign governments, you should understand
Cyber security is about safeguarding the sensitive data, or holding systems and the value you might represent. Perhaps
technology we rely on, and protecting the You may not think it, but regardless of the size information to ransom. you work with larger organisations (or on
services and information that all businesses, and nature of your business, the information government projects) who are their main
large and small, need to function. The that you hold is of value to a criminal. And Hacktivists: individuals with varying degrees target.
construction industry specifically needs although they may not target your business of expertise, often acting in an untargeted
to take the cyber threat seriously for the directly, it’s all too easy to be damaged by way (perhaps to test their own skills or cause
following reasons: phishing emails that cyber criminals send disruption for the sake of it). This might
out, indiscriminately, to millions of businesses. include political activists, out to prove a point
• Construction businesses are seen by for political or ideological and environmental
cyber criminals as an easy target, many Even if you don’t lose money directly, a data reasons, or to expose or discredit your
of which have high cash-flows. Perhaps breach (which is when information held by businesses activities.
understandably, smaller and mid-sized an organisation is stolen or accessed without
businesses have a ‘We’re only a small authorisation) or a ransomware attack
business, it won’t happen to us’ attitude could cause a temporary shutdown of your
towards cyber security, and are reluctant business whilst the breach is investigated,
to invest time, money, and training into and systems are recovered, as well as
what they perceive an unlikely threat. reputational damage with customers and
• The extensive use of sub-contractors partners. It could also leave you open to an
and suppliers involving large numbers of investigation (and fines) from the Information
high value payments makes construction Commissioner’s Office (ICO).
businesses an attractive target for spear
phishing, which is when attackers send
a targeted email that’s pretending to
be from a legitimate organisation, in an
attempt to trick the construction business
into paying money into a criminal’s
account.

8 National Cyber Security Centre National Cyber Security Centre 9


Why cyber security matters

Looking after critical documents and data Engagement and training

It’s important you have a system in place At all stages of construction, it is important to
The three key stages in the to receive, track and store electronic and ensure that you communicate cyber security
construction industry (design, paper-based documents. The system, requirements with your staff, both on site and
construction and handover) all Design whether physical or digital (or a combination at any remote locations. The importance
involve extensive digital workflows, stage of the two) should control access to sensitive of - for example - wearing a hard hat, is
information, as well as maintaining a ‘golden self explanatory. By contrast, explaining the
so all of them are at risk. thread’ of information (quality and up-to- danger of clicking on links within suspicious
date information records throughout the emails might be a harder sell, especially
Everything from the computers, phones asset lifecycle) that is critical to a project within a construction business where the IT
and tablets used to access emails, to the or business transaction. This is formerly function is less prominent.
essential software used to process and store recommended in the Independent Review
information, to sophisticated site equipment Construction of Building Regulations and Fire Safety: Hackitt Good cyber security takes into account the
and digital-based systems installed within review. way people work in practice, and doesn’t
buildings. And of course, throughout the
stage
burden them with processes or procedures
entire construction process, you’ll need Having a system in place to keep records of that get in the way of getting their jobs done.
to manage and protect your business what has been shared, when, and with whom Supporting your staff to obtain the skills and
information (including client, staff, and helps prevent sensitive information, such as knowledge required to work securely is often
project information). client or employee details, being accessed done through the means of awareness or
by the wrong people. You should also take training. If you conduct safety briefings for
The early stages of the construction process, Handover steps to protect your business so that staff, visitors or staff, use them to provide guidance
such as the tender process, will generate suppliers, contractors and other third parties (including on cyber security) and to raise
for example, detailed quotes and signed stage
only have access to resources required to security awareness.
contracts. A cyber attack at this stage might do their job. This authorisation helps control
prevent a business from being able to win who has access to your physical and Staff generally want to do the right thing,
current tenders for work, and impact on digital assets, and is covered in detail in the but not knowing why they’re being asked
future opportunities. By implementing the NCSC’s guidance on Identity and access to do (or not do) something can seem like
guidance in this document, your business management. ‘security for its own sake’. Try educating staff
will be in a more secure and resilient position on security in a positive way, rather than
against cyber attacks. You’ll also find it easier using fear. Focus on how their actions have a
to obtain related certifications (such as positive effect, rather than the trouble they’ll
Cyber Essentials and ISO27001) which can be in if they make a mistake.
demonstrate a degree of cyber maturity
which some government contracts require.
To educate employees on cyber security the
NCSC has developed an e-learning package
‘Top Tips For Staff’, which can be completed
online.

10 National Cyber Security Centre National Cyber Security Centre 11


Why cyber security matters

Design
stage
Cyber security risk assessment

The design stage is the process of It’s really important to make sure that the A risk assessment is a vital part of any you care about, and why it is important,
software is always kept up to date. Applying construction project, and this should should help you to prioritise where to protect
developing the project brief so the
these updates (a process known as include cyber security risks (as well as your business most.
building can be constructed. Much patching) is one of the most important things long-established health and safety ones).
of this stage is carried out digitally, you can do to improve cyber security. Conducting a cyber security risk assessment Cyber security requirements should then
and you probably use a wide variety at the outset of the project allows you be identified and implemented to manage
of different software tools during the On some projects, you may join or create a to identify what cyber security risks your the assessed risks. This includes access
Common Data Environment (CDE) with other business might face, and to build in to information, access to IT systems and
design process, such as:
businesses. These environments include large precautionary steps you can take. software and access to offices and sites.
amounts of project information with access You should continue to revisit and refresh
• computer aided design (CAD) and 3D
given to third parties. The NCSC’s identity and Cyber security is as much about knowing your assessment as the project develops to
modelling packages
access management guide can help you how your business functions as it is about ensure that you are continuing to manage
• collaboration tools for sharing project
control who can (and who can’t) access your technology. Think about what people, risks effectively.
information
data. You should also implement a ‘need to information, technologies and business
• simulation packages to assist in structural
know’ process, where access is only granted processes are critical to your business. What
and other specialist engineering
for the information that is required for that would happen if you no longer had access For more information about using risk
disciplines
task, and ensure staff are removed when they to them (or if you no longer had control over assessments to improve cyber security, refer
• general IT systems for storing information
leave the project or business. them)? This basic understanding of what to the NCSC’s Board Toolkit guidance.
and data (either locally or on a business
network

12 National Cyber Security Centre National Cyber Security Centre 13


Why cyber security matters

Construction
Stage
Digital technology and connected
systems
Compared to the design stage, Consider how IT equipment used on
construction sites differs from equipment If you’re involved in any way with the - then in addition to your regulatory
activities during the construction
in the office. For example, the premises following: requirements, you’ll need to consider the
stage usually require a larger themselves may be less secure, or they might cyber security aspects. This is beyond the
workforce, more materials and be limited/no space to securely house your IT • building management systems (BMS) scope of this document, so please refer to
equipment, and more interaction equipment. There may be restricted access • building automation and control systems the following resources:
with third parties. As the complexity to your businesses networks or services. You (BACS)
may even have no (or limited) connection • building energy management systems • 2021 IET Code of Practice for Cyber
and scale of a project ramps up
to the internet. All these factors may make (BEMS) Security in the Built Environment
during construction, businesses will it more difficult to access and secure you • industrial automation and control (sponsored by the NCSC)
naturally focus on project data. IT equipment left or stored in vehicles systems (IACS) • NCSC Connected Places Cyber Security
deliverables and deadlines. or site office can be particularly vulnerable to Principles
It’s important that security is not opportunistic thieves.
overlooked at this stage of the project.
You should also consider what personal data
is stored on a construction site. For example,
Securing construction sites and high-tech details of individuals and their emergency
equipment contacts, biometric data, and health and
safety incident reports. Remember that this
The use of high-tech equipment to survey information is personal and covered by
buildings or sites is becoming increasingly data protection legislation and should be
common. Drones and GPS equipment can protected accordingly. The NCSC provides
create detailed models and visualisations. information on GDPR and what it means for
The data and information gathered might cyber security.
also include neighbouring assets whether
above or below ground.

Equipment can be a target for thieves,


both for resale and especially if they store
site, project, or sensitive data. While some
equipment may not be especially expensive
to replace (for example a camera or GPS
device), the data stored on them could be
very valuable to a cyber attacker. You should
secure surveying tools, cameras, tablet
computers, lifting equipment and suchlike,
to prevent their theft and any data stored on
them. CCTV and other security technologies
provide significant defence against casual
and opportunistic theft.

14 National Cyber Security Centre National Cyber Security Centre 15


Why cyber security matters

• lighting automation and control


Handover • heating, ventilation and air conditioning
Stage (HVAC)
• fire, smoke detection and alarms
• motion detectors, CCTV, security and
On completion of the project, access control
there may be installed building • lifts and escalators
management systems (for example • industrial processes or equipment
• shading devices
BMS, BACS, BEMS and IACS). It is • energy management and metering
important that these systems are
handed over to the client so that they It is extremely important that these are fully
can continue to secure the building documented, and all details of installation,
and any digital-based systems it operation and maintenance are included
in any handover to the client or building
might contain. operator. These details should include any
steps taken to secure the systems as well
The installed systems will depend on a
as any steps or documentation required
project’s nature and use, but may include
to maintain the security of these systems
combinations of the following:
throughout their lifetime. You will likely retain
information relating to the project after
handover for insurance purposes. For more
detailed information refer to the CPNI’s
guidance on releasing documents.

16 National Cyber Security Centre National Cyber Security Centre 17


Section 2
Advice & Guidance
For staff responsible for IT

18 National Cyber Security Centre National Cyber Security Centre 19


Cyber security guidance

Identify what you need to back up Using cloud storage (where a service provider Make backing up part of everyday
stores your data on their infrastructure) business
Following the steps described in this Start by identifying your most important means your data is physically separate
section will reduce the likelihood of information (that is, the information that your from your location. You’ll also benefit from We know that backing up is not a very
your construction business being a business couldn’t function without or that a high level of availability. Service providers interesting thing to do (and there will always
victim of a cyber attack, and will help you’re legally obliged to safeguard). Make a can supply your business with cloud-based be more important tasks that you feel should
backup copy on a USB stick, an external hard storage without you needing to invest in take priority), but the majority of network or
you get back on your feet should the
drive, or ‘in the cloud’. Having made your expensive hardware up front. Most providers cloud storage solutions now allow you to
worst happen. backup, make sure you know how to recover offer a limited amount of storage space for make backups automatically.
the information from it. To get you started, free, and larger storage capacity for minimal
here are some ‘how-to’ guides for setting up costs to small businesses. Many off-the-shelf backup solutions are easy
cloud storage: to set up, and are affordable considering
Before contacting service providers, we the business-critical protection they offer.
01 • Apple (iPhone, iPad and iPod Touch, encourage you to read the NCSC’s Cloud When choosing a solution, you’ll also have to
Back up and Mac) Security Guidance. This guidance will help consider how much data you need to back
your data • Google (Android) you decide what to look for when evaluating up, and how quickly you need to be able to
• Microsoft (Windows 10) devices. their services, and what they can offer. access the data following any incident.

Think about how much you rely on your Keep your backup separate from your Ransomware often encrypts online backups,
business-critical data, such as project plans, computer which means your cloud-based backups For more detailed information about backing
CAD models, customer details, quotes, orders, could also be unavailable, leaving you up your data, refer to the NCSC’s Small
and payment details. Now imagine how long Whether it’s on a USB stick, on a separate with no backup to recover from. For more Business Guide.
you would be able to operate without them. drive or a separate computer, access to resilience, create offline backups, the
backups should be restricted so that they: importance of which is covered in the NCSC
It’s important to keep a backup copy of this blog Offline backups in an online world.
essential information in case something • can only be accessed by appropriate
happens to your IT equipment, or your staff
business premises. There could be an • are not permanently connected (either
accident (such as fire, flood, or loss), you physically or over a network connection)
could have equipment stolen, or ransomware to the device holding the original copy
(or other malware) could damage, delete, or
lock your data.

20 National Cyber Security Centre National Cyber Security Centre 21


Cyber security guidance

02 Only download approved apps As IT equipment reaches the end of its Manage how your IT equipment is
Protecting your office supported life, you should replace it with a accessed by third parties
You should only download apps for mobile supported alternative. If you continue to use
equipment from malware phones and tablets from manufacturer- equipment that is no longer supported: Organisations and individuals outside your
approved stores (like Google Play or Apple business may have legitimate reasons to
App Store). These apps are checked to • it won’t receive updates that contain new access your IT equipment. Perhaps a service
Malware is malicious software, which provide a certain level of protection from features and performance improvements provider or consultant provides your business
malware that might cause harm. You should • it won’t receive the security updates from with IT (or construction-related) services.
- if able to run - can cause harm in prevent staff from downloading third party the manufacturer (and without these your You need to understand how this access is
many ways, including: apps from unofficial sources, as these will not device is easier to hack) granted and monitored, and ensure that third
have been checked. parties only have access to what is required
• causing a device to become locked or Switch on encryption to carry out their work. Left unmanaged (or
unusable Keep your IT equipment up to date set up incorrectly), criminals can exploit this
• stealing, deleting or encrypting data Make sure that your office IT equipment - so ‘remote access’ to carry out cyber attacks, or
• taking control of your devices to attack Like power tools or machinery, IT equipment your laptops and PCs - all use an encryption steal information.
other businesses (including computers, laptops, tablets and product (such as Bitlocker on Windows
• obtaining login details which can be used mobile phones) need maintaining and devices, or FileVault for macOS). This means
to access your businesses (or services servicing to ensure they work effectively and that if even if your computer is lost or stolen, For more detailed information about
that you use) securely. This maintenance includes updating the data stored on it can’t be accessed. For protecting your business from malware, refer
• using services that may cost you money the software the equipment runs on. advice on configuring disk encryption, please to the NCSC’s Small Business Guide.
(e.g. premium rate phone calls). Across all your IT equipment, make sure that refer to Bitlocker and FileVault guidance.
the operating system and other installed
software is always kept up to date with the Control how USB sticks/removable media
Turn on antivirus software latest versions. Applying these updates (a are used
process known as patching) is one of the
Antivirus software - which is often included most important things you can do to improve It’s tempting to use USB drives and SD cards
for free within popular operating systems security. Devices, operating systems and to transfer files between businesses and
- should be used on all computers and apps should all be set to ‘automatically people. However, it’s all too easy to plug
laptops. For your office equipment, it is as update’ wherever this is an option. in an infected stick into a device, only to
easy as clicking ‘enable’, and you’re instantly inadvertently introduce potentially
safer. For phones and tablets, separate damaging malware into the business.
antivirus software might not be necessary.
When drives and cards are openly shared,
Similarly, you should make sure that your it becomes hard to track what they contain,
firewall is switched on. Firewalls create a where they’ve been, and who has used them.
‘buffer zone’ between your own network and You can reduce the likelihood of infection by:
external networks (such as the Internet).
Most popular operating systems now include • blocking access to physical ports for
a firewall, so it may simply be a case of most users
switching this on. • using antivirus tools
• only allowing approved drives and cards
to be used within your business
(and nowhere else)

22 National Cyber Security Centre National Cyber Security Centre 23


Cyber security guidance

Don’t leave your phone (or tablet Keep devices and apps up to date Take care when connecting to public
03
unlocked Wi-Fi hotspots
Keeping your phones As with office-based equipment, it is
and tablets safe Set a screenlock password, PIN, or other important to keep phones and tablets up to When you use public Wi-Fi hotspots (for
locking method (such as fingerprint or face date at all times. All manufacturers release example in hotels or coffee shops), make
unlock). As we explain in step 4, avoid using regular security updates to keep the device sure that you’re connecting to a legitimate
Mobile technology is now an the most common passwords (such protected. This process is quick, easy, and service; a member of staff will be able to
as ‘password’). free; devices should be set to automatically confirm the name of the service to use. If you
essential part of a construction update, where possible. connect to a ‘rogue hotspot’ (that is, a Wi-
business, with more and more being Make sure lost or stolen devices can be Fi hot spot set up by a cyber criminal), they
used on construction sites and on tracked, locked or wiped All the applications that you have installed could access:
the move, storing increasing should also be updated regularly with
amounts of important data. Staff are more likely to have their tablets or patches from the software developers. These • what you’re working on whilst connected
phones stolen (or lose them) when they are updates will not only add new features, but • your private login details that many apps
What’s more, these devices are now on site. Fortunately, the majority of devices they will also patch any security holes that and web services maintain whilst you’re
as powerful as traditional computers, include free web-based tools that are have been discovered. logged on
and because they often leave the invaluable should you lose your device. You
safety of the office (and home), can use them to: The simplest precaution is not to use
they need even more protection unknown hotspots, and instead use tethering
• track the location of a device to share your mobile phone’s connection with
than desktop equipment. • remotely lock access to the device (to your other devices. Alternatively, you can use
prevent anyone else using it) a wireless ‘dongle’ provided by your mobile
• remotely erase the data stored on the network to connect to the internet.
device
• retrieve a backup of data stored on the
device For more detailed information about keeping
your phones and tablets safe, refer to the
NCSC’s Small Business Guide.

24 National Cyber Security Centre National Cyber Security Centre 25


Cyber security guidance

Remember to switch on password It’s really important not to re-use the same You can also use a password manager,
04
protection password for your different online accounts. which can create and store passwords for
Using passwords to In particular, use a strong and separate you that you access via a ‘master’ password.
protect your data Set a screenlock password, PIN, or other password for your email. If a hacker can
locking method (such as fingerprint or face access your mailbox, they could access If more than one person is accessing a
unlock). Most devices will require you to set information about your payments, invoices, computer, you should ideally have different
Your laptops, computers, tablets and up a password when you use them for the contractors and suppliers), as well as send accounts, and different passwords for each
first time, but it may have been switched off emails pretending to be from you. person. Where this isn’t possible, make sure
phones will contain a lot of your own by somebody else. you know who has access to your devices,
business-critical data, the personal Use 2FA for important accounts who knows the password, and that you’re OK
information of your customers, Avoid using predictable passwords with this. Don’t write the password on a Post-it
contractors, suppliers, and also If you’re given the option to use two-factor that’s stuck to the computer, for anyone to
details of the online accounts that Passwords should be easy to remember, authentication (also known as 2FA) for any use. For the same reasons, lock your device
but hard for somebody else to guess. A accounts you should, and especially for when you’re not at your desk, and make sure
you access. Passwords - when good rule is ‘make sure that somebody email, banking and purchasing. This adds a you change your passwords when a member
implemented correctly - are a free, who knows you well, couldn’t guess your large amount of security for not much extra of staff with access to your devices leaves.
easy and usually effective way password in 20 attempts’. Staff should also effort. 2FA requires two different methods to
to prevent unauthorised people avoid using the most common passwords ‘prove’ your identity before you can use a Change all default passwords
accessing your devices. The NCSC (such as ‘password’), which criminals use to service, generally something you know (like
brute force access to your account, or ones a password) and something you have (like Finally, one of the most common mistakes
has some useful advice on how to that someone could guess from your social a phone). This could be a code that’s sent to is not changing the manufacturers’ default
choose a non-predictable password media profile (so avoid using family names, your phone (or a code that’s generated from passwords that phones, laptops, and other
that you can remember. pet’s name, place of birth, or something a bank’s card reader) that you must enter in types of equipment are issued with. These
related to a favourite sports team). addition to your password. can be easily found online. Change all default
passwords before devices are distributed
Looking after your passwords to staff.

Of course most of us have lots of online


accounts, so creating different passwords For more detailed information about using
for all of them (and remembering them) is passwords to protect your data and devices,
123456 difficult. However, to make this easier, you refer to the NCSC’s Small Business Guide.
can:
qwerty
1. Write all your passwords on a piece of
password paper and keep it somewhere safe (and
away from your computer).
111111
12:00
********* abc123
2. Let your browser save your passwords for
you - it’s safe for you to save them when
you’re asked, (although if you share your
asdasd computer with anyone, they’ll also be able
to access the accounts).

26 National Cyber Security Centre National Cyber Security Centre 27


Cyber security guidance

Reporting scam emails, texts, websites to Think about your usual working practices and 3. Emotion - Does
05
the NCSC how you can help make these tricks less likely the message
Dealing with phishing to succeed. For example: have a tone
If you or a member of staff have received an that can make
email you are not quite sure about, forward it • Do staff know what to do with unusual employees
to NCSC’s Suspicious Email Reporting Service requests, and where to get help? feel panicked,
‘Phishing’ is when criminals use scam emails, (SERS) at report@phishing.gov.uk Suspicious • Ask yourself whether someone fearful, hopeful
SMS or chat messages, phone calls or social text messages should be forwarded to 7726 – impersonating an important individual or curious?
media to trick their victims. it is free of charge. (a customer or manager) via email Criminals often
should be challenged (or have their use threatening
Their goal is often to convince you to click Make yourself a harder target identity verified another way) before language, make
a link, or open an attachment. Once clicked action is taken. false claims of
(or opened), malware may be installed via a Information about you that’s easily viewed • Think about how you can encourage and support, or tease you into
dodgy website you have been sent to, or via on your work and private websites (including support your staff to question suspicious wanting to find out more.
the attachment you have opened. Over the social media accounts) can be used by or just unusual requests – even if they
phone, the approach may be more direct, criminals to make their phishing messages appear to be from important individuals. 4. Scarcity - Is the message offering
asking you for sensitive information, such as appear more convincing. Review your privacy Having the confidence to ask ‘is this something in short supply, like materials,
banking details. settings, and think about what you post genuine?’ can be the difference between tools or software? Fear of missing out on
across your social and professional accounts. staying safe, or a costly mishap. a good deal or opportunity can make
Some criminals may even send a more Be aware what your friends, family and people respond quickly.
targeted scam message (a process known colleagues say about you online, as this can Check for the obvious signs of phishing
as spear phishing), which pretend to be also reveal information that can be used to 5. Current events - Are you expecting to
from a legitimate company you deal with. target you. Scammers hope to quickly gain your trust see a message like this? Criminals often
These more targeted attacks appear to and persuade or pressure you into acting exploit your relationships with clients and
be from more legitimate sources, and are Think about how you operate without thinking. Scam messages will often suppliers to trick you into paying sums
sent to senior staff or budget holders within have one or more of the following 5 tell-tale of money and also make use of specific
larger businesses, who may have access to Consider ways that someone might target signs. times of year (like tax reporting) to make
finances and more valuable information. your business, and make sure your staff their scam seem more relevant to you.
Unlike standard phishing messages that are all understand normal ways of working 1. Authority - Is the message claiming to be
sent out indiscriminately to millions of people, (especially regarding interaction with from someone official or an organisation
spear-phishing attacks are crafted to appeal other businesses), so that they’re better you work closely with? For example,
to specific equipped to spot requests that are out of your bank, clients, suppliers, or a local What to do if you’ve already clicked
individuals, and the ordinary. Common tricks in construction authority. Criminals often pretend to be
can be even include tricking staff into transferring money important people or organisations to trick If you’ve lost money or have been hacked as
harder to detect. or information by sending emails that look you into doing what they want. a result of responding to a phishing message,
Phishing (and authentic. Another is to send an invoice you should report it:
spear-phishing) for a service that you haven’t used, so 2. Urgency - Are you told you have a limited
is a threat to all when the attachment is opened, malware time to respond (such as ‘within 24 • In England, Wales or Northern Ireland, visit
businesses of all is automatically installed (without your hours’ or ‘immediately’)? Criminals often www.actionfraud.police.uk or call 0300 123
sizes and across knowledge) onto the computer. threaten you with fines or other negative 2040.
all sectors, consequences. • In Scotland, report to Police Scotland by
including calling 101.
construction. • Your bank may also be able to help if you
think you’ve been tricked into transferring
money to a criminal.

28 National Cyber Security Centre National Cyber Security Centre 29


Cyber security guidance

Conversely, your suppliers may be targeted Look for information published by your Consider the implications if your supplier
06
as a route into your business. Or you may be existing suppliers that help you understand is attacked
Collaborating with sharing sensitive or valuable information that how they provide services securely. Ensure
suppliers and partners you want suppliers to protect. you understand the terms and conditions in No matter how good your own cyber security
your contract or licensing agreement, and is, you should assume that you and your
Construction businesses may also want what parts of security each are responsible partners will experience a cyber incident at
Construction businesses rely upon suppliers to encourage their suppliers to get Cyber for. This will help you to develop a common some point, and plan for this accordingly.
to deliver materials, machinery, labour, and Essentials certification. Cyber Essentials is understanding of each party’s security This is also worth considering in your security
digital information (such as specifications a government-backed, industry supported responsibilities, and what subcontracting agreements; what are you expecting of them
and designs). Even for smaller businesses, scheme to help organisations protect decisions you are happy to delegate to them. and their response? Do they have to notify
your supply chain can quickly become large themselves against common cyber It might be useful to include references to the you? Do they have to assist you if you are
and complex, involving extensive use of sub- attacks. Organisations with Cyber Essentials following NCSC guidance that can help to consequently also attacked?
contractors and suppliers with a high degree certification have demonstrated that they establish a baseline of cyber security:
of payments flowing to and from businesses. take cyber security seriously, and can use
this reassurance to attract new business and • 10 Steps to Cyber Security For more detailed information about
Then there’s the less-obvious organisations reassure their customers. • Small Business Guidance collaborating with suppliers and partners,
that you rely on. For example the provider of • Cyber Essentials please to the supply chain section of the
your email service, or the company behind Understanding your supply chain NCSC’s Board Toolkit guidance.
the accounting software you use.
Until you have a clear picture of your existing
Cyber attacks on your suppliers can be supply chain, it will be very hard to determine
just as damaging as an attack on your how to secure it. Ensure you have a list of
own business. This is why it’s important to all your suppliers, and partners, and identify
employ cyber security when collaborating which ones are highest priority (in terms of
with suppliers and partners. You may be risk) to concentrate your efforts on. Where
targeted as a way into the organisation you possible include subcontractors beginning
are supplying. This is very common in the with your highest priority direct suppliers.
construction industry, as you might already
be working with organisations that the
attacker wants to access through you.

30 National Cyber Security Centre National Cyber Security Centre 31


Cyber security guidance

Prepare for incidents Identify if you’re being attacked


07
Preparing for Identify what electronic information is The first step in dealing effectively with a To help with this, you can use the NCSC’s
(and responding to) essential to keep your business running, cyber incident involves identifying it. That Logging Made Easy tool, which has
cyber incidents such as contactor and supplier details, is, how can you detect that an incident has been specifically designed to help small
emails, invoices, and essential documents. occurred (or is still happening)? businesses who lack the budget, time
When something unexpected Find out where this information is stored. Is or understanding to set up their own
happens, such as a cyber incident, it on single machine in your office? Is it on a Things that might indicate a cyber incident logging system.
remote server? Is it stored in the cloud, or by include:
it can be difficult to know how to a third party? Your antivirus software can also provide you
react. Naturally, you will want to • messages demanding a ransom for the with indicators of compromise; complete
resolve the problem as quickly Make sure you keep the important release of your files a full scan and analyse the results to see
as possible so you can resume information you identified above in a • computers running slowly if it has detected any malware. Advice
business quickly. Malware (and safe place so that you can use it if your • users being locked out of their accounts about what to do is usually available on the
equipment is stolen or damaged by a cyber • users being unable to access documents antivirus company’s website
especially ransomware) is becoming attack. Ensure you know how to restore a • people informing you that they’ve
increasingly common in the backup in the event of any type of data loss, received unusual emails from you (continued on next page)
construction industry, so it’s essential such as a ransomware attack, and train the • redirected internet searches
to be prepared. relevant people in your business so they can • requests for unauthorised payments
do the same. Being prepared and having • unusual account activity
It’s impractical to develop detailed step-by- relevant documents that are up to date and
step instructions to manage every type of also accessible when an incident occurs
incident, as the list could be endless. Instead could make all the difference.
you should prepare plans to handle those
incidents most likely to occur. If you have cyber insurance, have your
insurer’s details documented including policy
The best way to test your staff’s number and any specific information your
understanding of what’s required during an provider asks for. Understand any legal or
incident is through cyber exercising, which regulatory compliance you must adhere to
involves rehearsing your response to a cyber and implement any guidelines/policies/rules
incident. Consider using the NCSC’s Exercise they set out for you. You should check if your
in a Box product, which is especially designed trade association or professional body has
for smaller organisations, to test your any help or advice lines that you can contact
business resilience and preparedness. to help you in this situation.

WARNING

32 National Cyber Security Centre National Cyber Security Centre 33


Cyber security guidance

Resolve the incident Learn from the incident

The actions in this step will help your After the incident, it’s important to review
business get back up-and-running as soon what has happened, learn from any mistakes,
as possible. You’ll also need to confirm that take action to try and reduce the likelihood of
everything is functioning normally, and fix any it happening again. To do this:
problems.
1. Review actions taken during your
If your IT is managed externally, contact the response. Make a list of things that went
right people to help. These contacts are there well and things that could be improved
to fix the problem and establish the impact to from the response stage.
your business.
2. Review and update your incident plan,
If you manage your own IT, put the plans you and where necessary, make changes to
made earlier into action. Depending on the the incident plan you created, to reflect
type of incident you are responding to, this the lessons learnt.
may involve:
3. Strengthen your defences by making any
• replacing compromised hardware necessary changes.
• restoring services through backups
• patching software For example, if you were a victim of a
• cleaning infected machines password attack, you may need to create a
• changing passwords new password policy.

You could use a company in the NCSC’s


Cyber Incident Response (CIR) scheme if your For more detailed information about
organisation was the victim of a significant preparing for incidents, refer to the NCSC’s
cyber attack. The CIR-certified company Small Business Guide to Response
would conduct all the cyber incident & Recovery.
response activities in relation to the attack to
help your organisation recover.

Note that you’re legally obliged to report


certain incidents (such as a data breach) to
the Information Commissioner’s Office (ICO),
regardless of whether your IT is outsourced.
Check the ICO website to find out which
incidents require this. Other regulatory bodies
which you belong to may also require you to
report a breach.

34 National Cyber Security Centre National Cyber Security Centre 35


Where to go for more help

If you receive a potential phishing message, If you are looking for advice on the security
you can report it to the NCSC using the of built assets and the public realm,
Suspicious Email Reporting Service (SERS). members of the CPNI sponsored Register
Just forward the message to of Security Engineers and Specialists (RSES)
report@phishing.gov.uk. If the message is can provide specific advice or guidance,
found to link to malicious content, it will be including the security of digital systems in the
taken down or blocked, helping prevent built environment.
future victims of crime.
If you want more information and advice
Suspicious text messages should be on physical or personnel security issues
forwarded to 7726. This free-of-charge short or security-mindedness, including risk
code enables your provider to investigate assessment, site security, accredited security
the origin of the text and to take action, products and information management,
if it is found to be malicious. please refer to the CPNI website at
www.cpni.gov.uk.
If your business suffers a cyber incident or
is affected by fraud (e.g. money lost a result
of a phishing email or your IT systems are
compromised), report it to Action Fraud by
calling 0300 123 2040 or go to
www.actionfraud.police.uk, or in Scotland
through Police Scotland’s 101 call centre.

36 National Cyber Security Centre National Cyber Security Centre 37


For further information, or to contact us, please visit: www.ncsc.gov.uk

@NCSC

National Cyber Security Centre

@cyberhq

© Crown copyright 2020. Photographs produced with permission from third parties.
NCSC information licensed for re-use under Open Government Licence
(http://www.nationalarchives.gov.uk/doc/open-government-licence).

Information correct at the time of publication - January 2022

Designed and created by Agent Marketing Ltd.


agentmarketing.co.uk

You might also like