Agent Logo Trimble Assistant A digital illustration of a glowing padlock overlaid on a circuit board, symbolizing cybersecurity and data protection. The lock is highlighted in yellow, contrasting with the blue and black background of electronic components.

Why cybersecurity matters in construction — Part 1 of 2

3 Minutes Read
|

Share this post:

Agent Logo Trimble Assistant A digital illustration of a glowing padlock overlaid on a circuit board, symbolizing cybersecurity and data protection. The lock is highlighted in yellow, contrasting with the blue and black background of electronic components.

Summary

Read a real-world example of a contractor’s experience with a cyber attack and the steps it took to thwart the next attempt.

Atlanta, Ga.-based E.R. Snell Contractor, Inc. thought its chances of being the victim of a cybersecurity attack were slim. In September 2020, however, the company found out what many businesses have learned: a data breach can happen to any organization.

With an annual project volume between $200,000 and $400,000, E.R. Snell — like most businesses — can’t afford to deal with a significant business disruption, which is why more and more contractors are putting the proper cybersecurity resources in place to help protect their operations from growing cyber threats. Justin Snell, E.R. Snell’s vice president of technology, recently sat down with Mike Dooley, Viewpoint’s information security officer, to discuss the recent cybersecurity event at the company and how it was addressed.

Close-up of a digital screen displaying the word "VIRUS" in bold, bright letters, with warning symbols and tech graphics.

E.R. Snell was first alerted of the cybersecurity attack through its anti-virus software.

Pre-attack

Prior to the attack, E.R. Snell had approximately 90% of its software system on-premises with the other 10% in the cloud. To prevent cybersecurity threats, the company invested in cyber insurance that provided anti-virus protection, but not endpoint detection and response (EDR). Both the cloud and on-prem servers were backed up daily. However, in the case of an emergency, E.R. Snell relied on access to these backups in order to initiate a basic recovery plan.

The Sunday before Labor Day, E.R. Snell began receiving alerts from its anti-virus system. Cyber criminals had encrypted the company’s on-premise servers and deleted almost all of the cloud backups. Due to the company’s lack of a stringent password policy, the hackers were also able to compromise an employee’s email account, place a key-logger on the on premise mail server and gain administrative access. Through the chat service, the hackers then demanded a ransomware payment through bitcoin.

Cyber attack response

With no time to spare, the executive team at E.R. Snell gathered on Labor Day. Within 24 hours, Snell said, they had hired an incident response team and attorney. Luckily, the company was prepared with cyber security insurance and were able to quickly make a claim. The company worked with Viewpoint (it’s provider of construction and financial management solutions) to move its Vista ERP to the cloud — where both stronger real-time data and data security measures could be realized — and set up environments for the estimating and operations software through Azure.

Close-up of a desk with a laptop, tablet and blueprints. A hammer lies on the plans with people discussing in the background.

It took E.R. Snell three months to rebuild all the missing data after the cybersecurity attack.

Multi-factor authentication was also set up on all critical accounts, including email. During these processes, all backups being held for ransom were recovered, giving E.R. Snell the freedom to ignore the ransom demands.

Though the company was able to learn and avoid paying the ransom money, R.E. Snell was far from being untouched by the attack. More than $800,000 in insurance and betterment fees were paid out, in addition to multiple days lost days of work. Due to the lack of available software, multiple departments had to turn to manual processes that required excess time and resources. Throughout the three weeks of triage, R.E. Snell hired an outside accounting firm to rebuild five months of data and an outside IT firm to rebuild more than 200 computers. From beginning to end, it took three months to completely rebuild all the missing data.

Post-attack adjustments

Since its recovery, E.R. Snell has made several companywide adjustments. One of the biggest changes the company made was moving 80% of its systems to the cloud and keeping only 20% on prem. Additionally, knowing the importance of being prepared and ready for future attacks, the company has incorporated more data security measures into its annual budget. Before the attack, the company was spending $20,000 to $30,000 a year on security. Now, it budgets between $100,000 and $120,000 toward cyber security preparedness.

A person works at a desk with a laptop and multiple monitors displaying code, in a modern, well-lit tech workspace.

E.R. Snell made multiple adjustments to its processes to avoid future attacks on data.

E.R. Snell partnered with Crowdstrike to ensure a variety of security services were up and running, including antivirus protection, EDR and threat hunting. To provide further protection, the company also implemented Office 365, enabled multi-factor authentication, provided monthly phishing tests and training, began enforcing a password policy and completes frequent evaluations of server health.

“Technology evolves so fast, and you have to not only stay ahead of the competition, but you have to stay ahead of threat actors. If anything, this was a sobering experience of understanding the threats,” said Snell.

No company, no matter how large or small, should feel that they are immune from being a target of cyber attacks. In the second part of this blog, we will dive into cybersecurity best practices that every organization should consider implementing.

To learn about how Viewpoint is committed to keeping our customer safe from cyber attacks, visit here.

Related Articles

Why cybersecurity matters in construction — Part 2 of 2-summary-image
article

Why cybersecurity matters in construction — Part 2 of 2

Learn the Best Practices to Thwart Common Cyberattacks and What to Look For in Future Threats...
Read full article
Open approach to BIM - Better collaboration-summary-image
article

Open approach to BIM - Better collaboration

Construction project parties should be able to work together smoothly regardless of the tools they u...
Read full article
What is BIM (Building Information Modeling)-summary-image
article

What is BIM (Building Information Modeling)

Across the world, BIM (Building Information Modeling) is a crucial and even mandated process to ensu...
Read full article