CC3001
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
TECHNOLOGY focus<br />
Building better security<br />
David Chadwick discusses the issue of security in the cloud and the construction industry in<br />
general with Steve Cooper of Aconex<br />
How secure is the cloud when the<br />
weakest link is, inevitably, the<br />
user? I recently discussed this<br />
topic with Steve Cooper, general<br />
manager, UK & Ireland at Aconex.<br />
Security of data is becoming a major<br />
issue, not just in the construction<br />
industry but in all walks of life. I wanted<br />
to find out what steps are being taken<br />
to mitigate possible lapses in security<br />
in an industry which is increasingly<br />
reliant on sharing its rapidly growing<br />
data files with its workforce across<br />
multiple building sites.<br />
"On the face of it," Steve said,<br />
"systems in use throughout the industry<br />
look pretty secure anyway - secure<br />
servers, distributing password<br />
protected documents to authorised<br />
recipients - what could possibly go<br />
wrong?" There are different degrees of<br />
protection, though, and cyber criminals<br />
are smart and becoming smarter. "If<br />
there is a loophole in any system, they<br />
will find and exploit it."<br />
But what possible information could<br />
they want from the construction<br />
industry? Sub-contractors, site<br />
managers, engineers and other team<br />
members hardly seem like the typical<br />
targets of cybercrime. However as<br />
members of project teams they do<br />
form part of a network, at one end of<br />
which are the daily deliveries of<br />
materials and equipment, and at the<br />
other a financial system for controlling<br />
large amounts of money. Between<br />
these two points lie plenty of<br />
opportunities for fraud, theft and<br />
mismanagement.<br />
BRINGING IT ALL TOGETHER<br />
Aconex provides the most widely used<br />
cloud and mobile project management<br />
platform for the global construction<br />
industry. Last year Aconex acquired<br />
Conject, integrating its construction<br />
management solutions with the Aconex<br />
platform. Originally with Conject, Steve<br />
Cooper explained the role that Aconex<br />
plays in providing as secure an<br />
environment as it can for its clients.<br />
"First", he explained, "the scale of<br />
Aconex, a listed public company,<br />
allowed a significant, sustained<br />
investment in security to protect its<br />
customer and user communities. All<br />
employees are required to take online<br />
awareness and best practice courses<br />
in all aspects of security." He also<br />
stated that one of the big challenges<br />
for customers is clarity about what they<br />
are trying to protect.<br />
"One of the biggest challenges that<br />
Aconex faces from their clients", he<br />
added, "is that individual organisations<br />
are sometimes not very scrupulous<br />
about their information, how to protect<br />
it and the part it plays in a bigger<br />
picture." When information from<br />
multiple project partners across the<br />
supply chain is brought together,<br />
especially when operating with BIM, it<br />
can become considerably more<br />
sensitive and open to misuse.<br />
Aconex, as custodian of their clients'<br />
information, has put in place a highly<br />
secure system of transmission,<br />
requiring every transaction to have at<br />
least two levels of security. Secure<br />
socket layer encryption, encryption at<br />
rest and two-factor authentication<br />
(which operates using unique,<br />
randomly generated codes) are each<br />
becoming significantly more important<br />
to Aconex customers.<br />
In addition to that, customers are<br />
20<br />
January/February 2017