Blogs

Sanctions & Cyberattacks: Four Attack Methods to Recognize for Contractors

  
By Brian Hunter of BKD



The construction industry may not immediately come to mind when you think of cyberthreats, but hackers are always integrating new industries into their ecosystems to target. We see numerous operational and efficiency benefits as construction companies increasingly integrate and leverage technology into their organizations. However, certain risks need to be considered in the increasingly complex environment we currently find ourselves.

As many countries implement sanctions against Russia, an increase in cyberattacks is expected. It’s now more crucial than ever to be mindful and vigilant with your technology and activities to help limit losses due to business interruption and protect yourself and your organization from cyberattacks. The following list outlines the predominant attack vectors to be cautious of:

Emails and attachments – If you weren’t expecting it, be cautious. This includes spam, phishing, and direct targeted emails from compromised accounts. These will typically either have a URL to a malicious site or an attachment with malware (Excel macros) in it.
 
Internet marketing and advertisements – These run code in your browser. Advertising hosting sites are commonly used to promote malware through malicious advertisements. Be careful with clicking on advertising links, URLs, and banners.
 
Malicious software – Typically, free/low cost (freeware) software. Freeware is used to promote malicious code through easily accessible software that appears legitimate. These may contain ransomware, viruses, remote access controls, etc. Be cautious when installing, running, or using these solutions.
 
Fake support – Hackers and scammers will take advantage of the crisis. This applies to emails, marketing and advertisements, and software donating proceeds. Prior to interacting with, donating to, or purchasing anything in support of Ukraine, please properly research the entity to help keep you, your devices, and your organization secure.


While it’s impossible to eliminate all business risk, these actions can help shore up vulnerabilities. We are here to help with your organization’s needs.

If you have questions about cybersecurity, business interruption claims or any other areas, please reach out to your BKD advisor, submit a Contact Us form on our website, or follow us on Twitter/LinkedIn for relevant news, tips, and resources.



Brian Hunter is BKD's Information Security Officer and IT Director. He is responsible for the policies, processes, controls, technologies, and awareness needed to help ensure the confidentiality, integrity, and availability of BKD's systems and data. He oversees the daily operations and maintenance of BKD's critical infrastructure. He can be reached at bdhunter@bkd.com or 417.831.7283.







0 comments
23 views

Permalink