The use of digital systems in construction has been growing rapidly for years. Increasingly, systems from different parties are being linked in cloud solutions, via APIs, plugins and external services. This provides many benefits: more efficient collaboration, less duplication of effort, real-time progress information and cost savings. In the design phase, challenges can be addressed early, and a lot of data remains usable in facility management.
'You're the weakest link, goodbye!'
At the same time, every party and every link increases the risk of a cyber attack. Where is data actually stored, and who - outside the project - can access it? Often there is no ill will, but a small mistake can have major consequences. After all, a project is only as strong as its weakest link.
Second Chamber
The more participants and connections, the greater the likelihood of attacks. Imagine a foreign power gaining access to construction drawings and security measures of the new House of Representatives? Security must be secured from the earliest stages, with the understanding that people will always remain the biggest risk factor.
Basics of security
Although little is known about the security of large projects like the House of Representatives, basic principles always apply. A checklist for every BIM project:
-
Use multi-factor authentication.
-
Access to BIM data is role-based.
-
Revoke rights immediately when employees leave.
-
Work exclusively with encrypted connections.
-
Create and test backups regularly.
-
Monitor activities, intervene in suspicious situations.
-
Update and monitor all devices, APIs and plugins.
-
Train employees in cyber security.
-
Make strict agreements with chain partners.
-
Have periodic penetration testing.
Gap between large and small
Security requires continued investment in infrastructure, and those costs must be shared. Large construction firms and governments often have resources and knowledge. Smaller architecture firms, consulting firms and subcontractors do not always. This can cause them to drop out at the tender stage, which can create inequality in the market.
Affordable risk mitigation
Still, there are solutions. Vendors such as Autodesk BIM 360, Trimble Connect and Dalux offer cloud platforms with built-in security, monitoring and updates. SaaS solutions are scalable and easy to deploy: you don't have to reinvent the wheel yourself and the investment remains manageable. Small parties can also hitch a ride on the client's secure environment.
In addition, standardization through ISO 19650 and government guidelines provide clear frameworks. Smart use of existing solutions often keeps costs for a small architectural or consulting firm between €12,000 and €30,000 per year. Relatively affordable, in other words.
Awareness crucial
The real risk is less in affordability than in awareness among smaller companies. They too must take cybersecurity as seriously as large parties, even if they work with simpler tools. Because in a BIM process, the following always applies: the chain is only as strong as its weakest link.
Visit DigiBouw 2025 and put your organization ahead digitally
Want to know more about cybersecurity? Visit DigiBouw on November 19 & 20 at the Beatrix Building in Utrecht and get your organization digitally ahead.