search.noResults

search.searching

note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
TECHNOLOGY TRENDS Ransomware on the Rise:


Cybercriminals Spare No Mercy For The Construction Industry


By Joe Lish I


n mid-May of this year, news outlets across the globe reported hundreds of thousands of cyber-


attacks made on businesses in the form of malware. Perhaps not-so- cleverly named, “WannaCry” attacked everything from major companies like FedEx to smaller companies that included those in the construction industry. Once the malware virus successfully breached systems, it encrypted files and locked users out. Te entities behind WannaCry (and later, the global Petya attack) would then send messages to their victims demanding money, in most cases in the form of BitCoin, equaling anywhere


from $200 to $50,000. Hence, malware has evolved to become “ransomware.” Although the initial spread of


ransomware predominately attacked overseas systems, some of our AGC of California members here at home also suffered from the outbreak. WannaCry has since been shut down, but the potential for future, similar cyber-attacks will remain a certainty. In fact, data projects the frequency and complexity of attacks will continue to increase each year. According to Te Atlantic’s “How Ransomware Became a Billion-Dollar Nightmare for Businesses,” experts estimate that the impact to small and medium companies may reach $75 million annually.


Proactive Prevention Strategy Most construction business owners


agree that they cannot afford to fall victim to ransomware and lose time, money, and access to critical business data. So, what do you do to protect your operations? How do you react if your company’s files are encrypted, and better yet, how can you prevent a ransomware attack in the first place? Te best advice begins with a proactive prevention and response strategy, and the steps to take are actually quite simple. Your company should ensure


���������������� ������������� �


��������������������� ������������������� ������������������� ������������������� �������������������� ���������������������� ��������������� �������������������


all files and data, especially confi- dential and sensitive information, are backed up and verified regularly. Offline backups to tape (yes, those old tape drives and libraries), remote site or cloud-based storage not directly connected to your computer or local network have proven to be the most effective and reliable means for recovery. Business networks and requirements vary, and there is no single one-size-fits-all backup strategy. We urge you to consult with your IT personnel, service provider or a consultant to review and assess your current backup strategy, and make sure you’re prepared to recover your vital systems with minimal downtime.


CERTIFIED PUBLIC ACCOUNTANTS and BUSINESS ADVISORS


������������������������������������� � ��������������������������


�������������������������������������������� ���������������������������������������������������������� ������������������������������������������� ������������������������������������������������


www.GELMANLLP.com www.ConstructionCPA.com ������������������������������������� ��������������������������������������������� 14 September/October 2017


Up-to-date Anti-Virus Software Key


Next, all computers throughout


your organization should have up-to- date anti-virus software to protect against malware. Furthermore, all desktop operating systems, whether PC or Mac, should be judiciously patched and kept up to date. After all, recent hacking techniques rely on the vulner- abilities of apathy and complacency. Once you have reliable software in place to protect your data, and you’ve


California Constructor


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24