5 Minute Read
Boosting Cybersecurity for Better Construction Management
How Viewpoint For Projects is helping UK contractors better control who gets access to vital project data, when and how
During the lifecycle of a construction project, multiple teams are often involved with different levels of access to technologies and data, making cybersecurity and data security more complex on construction projects. Projects must be completed quickly and on budget — without compromising on security or quality.
When the proper data security and user permissions are in place, your projects can run smoothly and safely without extra roadblocks at each stage of a project.
User Permissions: Right PERSON, Right Time
Today’s modern construction software is providing contractors with quicker, easier access to project data. Having stringent user permissions in place controls who has access to different pieces of data or information. The ability to control timing and structure of these permissions is equally important to keep a project secure without adding additional steps or complications.
For example, if the main contractor invited a flooring subcontractor to use Viewpoint For Projects (VFP), our award-winning Common Data Environment solution, the sub would only be given access for the duration of their contribution towards the project. The robust modelling system of VFP allows end users to see details relevant to their specific roles. That means they can easily access the right information in real-time, such as the latest design and drawings documents needed to complete their tasks in an efficient and timely manner.
Data Security: Right PLACE, Right Time
Using software to capture vast amounts of quality data is only good if it is safe and secure. In other words, this data needs to be in the right place (somewhere secure) and easily accessible at the right time (when properly permissioned users need to access it).
Ensuring your company’s data and workflows are properly secured is more than providing peace of mind for your own business continuity, it directly impacts your ability to win and maintain business relationships. Larger clients and oftentimes government agencies and contracts usually require stringent security measures to be in place in businesses they choose to award work to.. Not only do you need proof that your business data and all associated data is secure, you also need proof that your data security protocol is consistently maintained and updated.
Choosing the right construction software with the latest inbuilt security protocols helps you stay ahead of the cybersecurity curve, with your software vendor doing the heavy lifting. . Inbuilt security measures standardize procedures across a project, meaning relevant information can be accessed and used safely at every stage of the project.
After a project is completed, the data can be stored in a secure location for future use and reporting. So, how does a leading-edge construction technology vendor prove it is staying ahead of the cybersecurity curve? The answer lies with certification from respected cybersecurity authorities.
Viewpoint For Projects, for instance, is certified in the following:
- ISO 27001
- SOC II Type 2
- Cyber Essentials Plus
- Amazon Web Services (AWS)
- Microsoft Azure
How to Control User Access and Data Security
In just 15 minutes, you can learn how easy it is to take control of user permissions and data security with Viewpoint For Projects. Our Take-15 webinar series: VFP Security & Permissions looks at why data security and user permissions are vital to ensure access to information is appropriately controlled and distributed to the right stakeholders at the right time.
In this short product demonstration, our implementation consultant covers:
- The VFP permissions model and how the secure transfer of project information
- How to get the most out of the VFP architecture spreadsheet
- The real-world effect of different user-based permission levels
- VFP’s workflow functionality, giving the right people access to the right data at the right time
Watch the full on-demand webinar below: