From healthcare to finance to government, cyber attacks are becoming more prevalent across all industries. For many years, construction was largely unaffected by these attacks, but unfortunately, that has changed. Contractors manage large sums of money, and with fewer security regulations, they are excellent targets for cyber attacks. Several large construction companies in recent years have been affected by ransomware, fraudulent payment, data breaches, and other malicious cyber attacks, making construction one of the most hacked industries in the world. In honor of Cybersecurity Awareness Month, we’re highlighting why this issue is so important to contractors and what measures we’ve taken to optimize security in Extracker’s Change Order Communication tool.
Don't be a target.
As contractors, it’s imperative to protect sensitive data for projects. In addition to vast amounts of financial data, construction projects store sensitive documents like drawings and 3D models that are maps of schools, banks, hospitals, government buildings, and other common security targets. Establishing high levels of data security is critical to protect this information. When construction companies rely on paper, email, and other insecure methods of communication, there is an increased risk for cyber attacks that can wreak havoc on construction operations. Moving sensitive communication and data to a secure platform like Extracker keeps project financial information secure and reduces the risk of data breaches.
Your data is safe with us.
The security of our customers is top-of-mind at Extracker, and we’ve developed multiple features to protect all data stored and adhere to even the strictest security policies. Here’s a look at some of our upgrades.
Federated Identity & SSO
Federated Identity refers to separating authentication from the rest of the application. Single Sign On (SSO) is the practice of requiring users to sign on one time and to use that same authentication across multiple systems and is a component of Federated Identity. This feature is important because it allows administrators to control access to several systems in one place and reduces the frequency of password theft.
Project permissions allow users to designate access to the COR Log, T&M Log, and associated emails for their invited customers. Using the permissions feature also enables users to manage permissions for their team on documents and alerts received from specialty contractors. Users can only control permissions on a project they have created, not projects they have been invited to.
SOC 2 Compliance
SOC 2 is a security auditing process that ensures service providers securely manage data to protect the interests and privacy of their clients. Extracker is fully SOC 2 compliant, which means we meet or exceed industry standards for security, system accessibility, processing integrity, confidentiality, and privacy.
One of the most effective data protection methods is data encryption. All data stored and transmitted into or out of Extracker is fully encrypted to prevent data from being stolen. This is especially critical when data is shared between Extracker and our integration partners.
Protect your business.
Extracker is the modern solution for Change Order Communication that allows GCs, Specialty Contractors, and Owners to collaborate in real time using a suite of digital tools. Extracker doesn't just save time by streamlining your existing procedures, it also improves collaboration and reduces risk while keeping your project data safe.
Schedule a demo with our team to see how it works.