Greg Duyka: Keeping Your Mobile Data Safe
Avoid a breach in security and keep your team's information safe.
If your job involves bidding, winning, and building, you may have a hard time imagining how work ever got done before mobile devices—back in the early 2000s. In the wake of the iPhone launch 12 years ago, mobile devices like smartphones and tablets have become as common as hardhats on the jobsite.
Beyond using mobile devices for talking and texting, there are lots of other ways the construction industry is leveraging mobile tech. For example, some contractors use mobile time-card apps to verify their locations with GPS, complete with data and timestamp. With real-time access to job documents and data in the field, contractors can now avoid costly errors and rework with a few taps on their devices.
Even as these devices boost productivity, it’s important to keep in mind that there is also a lot of sensitive business data being shared through mobile apps. Nobody wants to have information exposed—especially considering the cost of a data breach averaged nearly $4 million in 2018, according to the Ponemon Institute.
Advantages of Anytime, Anywhere Access
For many contractors, mobile and cloud capabilities mean they can turn their work trucks into rolling, mobile offices. Problems on the worksite? Snap a few photos, share with the back-office, and revisions can be uploaded via the cloud. It’s all about pushing updates, resolving issues, and hopefully, improving productivity—right from your pocket.
As more and more apps get added to mobile devices for critical workflows, builders can easily access and keep track of everything from drones to blueprints. This means keeping data and communications integrated and flowing is becoming more and more critical to a contractor’s success.
No More Lost Paperwork
Once you’re accustomed to the speed and flexibility of anytime, anywhere data, it’s impossible to turn back the clock. The benefits of mobile tech are many—from the convenience of crew transparency to better accuracy for inventory and materials and from easier scheduling and field reporting, fewer delays, to, you guessed it—no more lost paperwork.
Indeed, mobile has come a long way since the first JBKnowledge ConTech Report in 2012 when most respondents found mobile technology to be “not very important.” Flash forward to 2018, and more than 84 percent of respondents felt mobile development and apps were “important” or “very important.”
To dig a little deeper, when asked in 2018 about the importance of mobile capabilities, 42.4 percent of those surveyed felt it was “important—there must be plans for mobile development,” and 42.2 percent said “very important—there must be a mobile app available.”
A closer look at the ConTech Report showed that smartphones were becoming more valued over laptops. When asked in 2018 about mobile devices used daily, 92.8 percent checked “smartphone,” followed by 79.7 percent for “laptops,” and 62.1 percent reported “tablet.”
Why Contractors Need a Mobile Security Policy
It’s easy to see why today’s contractors have embraced mobile. But how do you secure all these mobile devices in constant use, sharing confidential company information, on construction worksites and in the office? No matter how big or small, all construction businesses should have a mobile management policy to help keep sensitive data safe.
For starters, you should have a policy in place that covers everything from how you choose software to which mobile OS to use and whether devices are provided or if your business prefers a Bring Your Own Device policy.
Without a mobile management policy in place, lines between personal and professional can blur quickly. The 2018 ConTech Report found that more than a third of the nearly 3,000 respondents reported their companies had no mobile data management policies or procedures. However, half did say that their companies secure their mobile devices or don’t allow them to use personal devices at work.
With more than half of the respondents saying their phones are used daily for photos/video and daily reporting, contractors should worry about how this information is being secured and shared. As more and more mobile devices can seamlessly connect to back-office networks, there is always a concern that a stolen or lost device could put a firm’s data and customer information at risk.
Keeping Your Critical Data Safe
For many in construction, the size of your business may determine whether you purchase mobile phones, or whether you have a BYOD policy. For example, some companies will provide tablets at the worksite to be used at any time for collaboration and communication. Your comfort level with how much control you have over the security of personal devices may also play a role in deciding whether to allow BYOD.
One of the most important things to keep in mind when creating a mobile policy for your business, is what happens when an employee leaves the company. Having policies in place will ensure that an employee returns any company device. With the right policy and processes, you could also quickly lock them out of your network. Otherwise, you can only imagine how a disgruntled employee could transfer confidential information, causing harm to your construction business.
It’s important to remember that the construction sector has been ranked as having the highest proportion of hack-prone employees, according to a TechHQ survey. They found 87 percent of small businesses have no data security policies and only 35 percent strictly enforce their password policy.
Want to learn more about keeping your construction data safe? Check out our step-by-step white paper to manage and mitigate risk in your hyper-connected world. Read Managing Risk in the Construction Industry now. W&C