The World Cup is Coming to Town—Is Your Business Ready?

The World Cup is Coming to Town—Is Your Business Ready?

This summer, for just the second time ever, the men’s World Cup will be coming to the United States—in fact, to our very own backyard. Hosted across the U.S., Mexico, and Canada, the 2026 World Cup kicks off June 11, 2026, and continues through July 19, 2026. A total of eight matches, including the World Cup Final, will be held at MetLife Stadium (temporarily branded as New York New Jersey Stadium) in East Rutherford, New Jersey. Soccer fans from across the country and the world will be traveling to the New York-New Jersey area to celebrate the world-famous sporting event. With more than 1.2 million visitors expected to travel to the region, the tournament is projected to generate $3.3 billion in economic activity in the area. Here are some ways hospitality businesses throughout New York and New Jersey can prepare for the influx of visitors and make the most of this surge in local tourism.

Tips for Local Hospitality Businesses

  1. Check out the FIFA World Cup 2026TM New York New Jersey Host Committee Community Engagement Toolkit, a comprehensive guide for local businesses and organizations to leverage the economic opportunities provided by the tournament.
  2. Consider extending your operating hours, stocking up on inventory, and/or hiring additional seasonal staff to accommodate increased traffic.
  3. Host watch parties or other World Cup-themed events, such as soccer trivia nights or live music nights featuring music inspired by the participating countries. Consider submitting your event to the NYNJ Host Committee for a chance to be featured on their website.
  4. Market promotions such as special World Cup-themed menu items, discounts, or freebies for visiting fans.
  5. Embrace the World Cup spirit by decorating storefronts or setting up photobooths with soccer-themed props for fans to capture memorable moments (note: make sure you review branding guidelines as FIFA trademarks are strictly protected).
  6. Subscribe to the NYNJ Host Committee newsletter for updates and opportunities.
  7. Join the Welcome World Rewards Program (more on this below).

About the Welcome World Rewards Program

The Welcome World Rewards Program, which launches May 25, is a region-wide economic initiative designed to connect fans of the World Cup with local small businesses through a free mobile app. The purpose of the program is to encourage economic activity throughout communities in New York and New Jersey while also providing visitors with an authentic regional experience. Through the app, which is free for both fans and businesses, users can explore local businesses and earn rewards. Visitors check in with participating businesses and collect points in a digital wallet. The points are redeemable for a range of prizes. The program will even offer the opportunity for up to eight fans to attend the World Cup matches (including the final match) as guests of the NYNJ Host Committee. Participating businesses can display the Welcome World Badge in their storefronts, websites, and/or menus (again, check for branding guidelines). Businesses can sign up to join the program here. Enrollment is open on a rolling basis from April 1 through May 15, 2026.

Are You Ready for Kick-off?

Small businesses across New York and New Jersey have a huge opportunity to benefit from tourism generated by the World Cup this summer. Make sure your business is prepared to make the most of heightened visibility and economic activity in the coming months. Additional helpful information can be found in the NYC Small Business Resource Guide for FIFA World Cup 2026™ and the NJ Diverse Business Advisory Council’s World Cup 2026 Reference Guide. While you focus on preparing for the World Cup festivities, let RBT CPAs’ hospitality and restaurants accounting team take care of your business’s accounting, tax, audit, and advisory needs. Call us today and find out how partnering with RBT can help you reach your personal and professional goals (pun intended).

Accrual vs. Cash Basis Accounting for Healthcare Practices—Choosing the Right Financial Lens

Accrual vs. Cash Basis Accounting for Healthcare Practices—Choosing the Right Financial Lens

For healthcare practices, the choice of accounting method isn’t just a compliance decision; it’s a strategic one. Yet many medical and dental practices often operate on a method that may not fully reflect the economic reality of their business. Understanding the difference between cash and accrual accounting, and when each is appropriate, is key to improving financial clarity and decision making.

Cash vs. Accrual Method

The cash method of accounting recognizes financial transactions not when they take place, but when cash is actually received or paid out. Because revenue and expenses are recorded only when money changes hands, cash basis accounting makes it easy to track cash flow and provides a real-time picture of available capital. This method is simpler to manage and involves less administrative complexity than the accrual method; however, because healthcare revenue cycles are inherently delayed due to insurance reimbursements, patient collections, and adjustments, cash basis reporting can distort performance by understating revenue in high-production periods or overstating results when collections catch up.

The accrual method of accounting, on the other hand, recognizes revenue at the time when it is earned and expenses at the time they are incurred, rather than when cash is exchanged. By aligning financial transactions with the period in which goods or services are actually provided or received, the accrual method provides a more accurate picture of an organization’s financial performance. While the accrual method requires more work on the administrative end (such as tracking receivables and payables), it offers more comprehensive insights into the practice’s financial performance. Cash flow, however, must still be monitored separately.

Which accounting method is best for your business?

The accounting method you should choose depends largely on your intended use, as well as the structure of your practice. The cash method may make sense for smaller practices with relatively simple operations due to its ease of use and low administrative burden. However, for larger practices with multiple providers or locations, and those that rely heavily on large insurance reimbursements, the accrual method may be recommended. Not only does accrual accounting result in a more accurate depiction of profitability, but it also helps guide key decisions related to long-term planning and practice management, such as budgeting, forecasting, and cash flow management. However, practices may use both strategically: accrual method for internal reporting, KPIs, and strategic decisions—and cash method for managing liquidity, forecasting, and tax reporting.

Reporting and Benchmarking

Regardless of the method used, financial and operational reporting should be utilized internally by the practice regularly to benchmark its performance against industry peers and to track its progress against strategic goals. There are many relevant KPIs that could be tracked on an ongoing management dashboard, but a few primary ones are accounts receivable aging and net collections percentage.

To sum up, here’s a bird’s-eye view of both methods:

Cash Accounting

  • Revenue is recorded when it is received
  • Expenses are recorded when they are paid
  • Simple to manage
  • Less administrative burden
  • Easy to track cash flow
  • Provides a real-time picture of available capital
  • Less beneficial for long-term planning
  • Useful for managing liquidity, forecasting, and tax reporting
  • May be appropriate for smaller practices with relatively simple operations

Accrual Accounting

  • Revenue is recorded when it is earned
  • Expenses are recorded when they are incurred
  • More administrative work and complexity (i.e., must track cash flow separately)
  • Provides a more accurate view of financial performance
  • Helps guide decisions related to practice management, such as budgeting, forecasting, and cash flow management
  • Makes it easier to benchmark your profitability
  • Better for large or growing practices
  • May be required for reporting to external stakeholders or lenders

Partner with RBT for Expert Accounting Guidance

RBT CPAs’ healthcare accounting team is here to advise and support your organization in all matters accounting, tax, audit, and advisory. Give us a call today and find out how we can be Remarkably Better Together.

LGCA Cybersecurity Guide for Local Governments: Key Points and Takeaways

LGCA Cybersecurity Guide for Local Governments: Key Points and Takeaways

The Local Government Cybersecurity Alliance (LGCA) is an organization dedicated to strengthening the cyber defenses of municipalities and public entities. In October 2025, the LGCA released the “Local Government Officials Guide to Cybersecurity,” designed to help local government leaders navigate today’s complex cyber threat landscape. Developed by cybersecurity professionals, local government officials, and public and private sector partners, the guide offers actionable steps for combating cyber risks and strengthening organizational resilience. Below are some of the key points and recommendations presented in the guide.

Cybersecurity Governance

  • Cybersecurity is a leadership responsibility—not merely an IT concern.
  • Effective cybersecurity requires collaboration across various departments, including IT, legal, risk management, finance, and operational units.
  • Local government leaders must recognize cyber risks as a top priority, assess potential impacts across departments, acknowledge the need to mitigate threats, and ensure decision-makers receive timely, relevant information.
  • Boards and senior leaders must stay informed about new and emerging laws and regulations regarding cybersecurity.

Key Roles and Functions

  • Operational vs. strategic cybersecurity: Operational cybersecurity focuses on day-to-day technical defense and IT system health, while strategic cybersecurity ensures that cybersecurity decisions align with broader organizational priorities.
  • IT and cybersecurity should remain two distinct and independent functions. Guidance on defining IT and cybersecurity roles can be found here.
  • The role of the Chief Information Security Officer (CISO) is to lead efforts to develop, implement, and oversee cybersecurity policies. The CISO must have direct, unfiltered access to executive leadership and boards.
  • Smaller governments that can’t afford to employ a full-time CISO can still maintain strong cybersecurity systems by outsourcing part-time virtual CISO services, forming cybersecurity committees, collaborating with state or regional governments, engaging external experts, and implementing continuous cybersecurity training for personnel.

 Challenges and Risk Areas

  • Barriers to effective cybersecurity include insufficient funding, staffing shortages and skills gaps, lack of leadership involvement, expanded attack surfaces, and emerging technologies.
  • High-cyber-risk areas for local governments include third-party risks, insider threats, AI technologies, privacy and data protection, disinformation, critical infrastructure, operational technology (OT) security, convergence of physical security and cybersecurity, and compliance and regulatory requirements.

Budgeting

  • Cybersecurity funding should account for initial capital investments (e.g., secure infrastructure), ongoing operational costs (e.g., security monitoring), and human resources costs (e.g., salaries, benefits, and training for cybersecurity personnel).
  • Several organizations provide benchmarks to guide cybersecurity budgeting decisions. These include NASCIO (0–3% of the IT budget), GFOA (~2% of the IT budget), and ICMA (0–10% of the IT budget).
  • Leaders must adopt a risk-based approach to cybersecurity budgeting and make cybersecurity investments strategically.

Key Strategies

  • Cybersecurity success depends on strong governance and executive oversight, clear staff roles and accountability, ongoing training, risk-informed decision-making, and operational resilience.
  • Continuous monitoring and improvement of cybersecurity systems is necessary. This includes vulnerability scanning, penetration testing, security control evaluations, regular policy updates, ongoing training, and maintaining a risk register.
  • Leaders should ensure that third-party vendor contracts include cybersecurity provisions and accountability clauses.
  • More municipalities are incorporating cyber insurance into their risk management strategies, with risk pooling offering financial benefits and opportunities for collaboration.
  • Internal audits assess system vulnerabilities, the effectiveness of controls, and risk exposure across departments.
  • Cybersecurity incidents must be reported and communicated to the public in a timely manner to maintain public trust and avoid potential consequences of delayed disclosure.
  • Cybersecurity frameworks (such as the NIST Cybersecurity Framework) provide structure for governments in managing cyber risk, ensure compliance with regulatory requirements, and standardize cybersecurity practices across departments.
  • Raising awareness within municipalities involves regular staff trainings, executive and board briefings, simulated exercises and drills, and clear accountability.
  • Cybersecurity reports should present key metrics regarding threat landscape, risk assessment, compliance, incident response, awareness and training, budget, and security.

Final Thoughts

This LGCA guide for local government officials emphasizes the need for cybersecurity to be treated as an organizational priority and a core leadership responsibility. Municipal leaders should assess their governments’ cybersecurity practices for alignment with the best practices presented in the guide. While you focus on improving your municipality’s cybersecurity mechanisms, let RBT CPAs’ government accounting team support your entity’s accounting, tax, audit, and advisory needs. Call us today and find out how we can be Remarkably Better Together.

Reduce Fraud Risk with These Union Credit Card Best Practices

Reduce Fraud Risk with These Union Credit Card Best Practices

Your union may choose to provide certain officials with credit cards for union-related expenses. While they offer convenience, union credit cards can pose a serious risk to your organization’s finances if the proper policies and oversight are not in place. The Office of Labor-Management Standards (OLMS) recommends unions implement the following practices to manage credit card use and prevent abuse.

  1. Establish clear policies and procedures for credit card use and payment.

OLMS doesn’t provide one specific credit card policy for unions to use, but instead offers general guidelines for developing a strong policy. Your policy should be documented and added to your union’s bylaws or approved at an executive board or membership meeting, and documented in the meeting minutes or other policy manual or document.

According to OLMS, your union’s credit card policy should include the following:

    • Authorized Users: Your policy should establish who is authorized to use union credit cards, whether each authorized user will receive his/her own card or share a single card, and how cards/PINS will be safeguarded.
    • Authorized uses: Your policy should specify the types of purchases that can be charged to union credit cards. The policy should also identify which kinds of purchases require pre-authorization and by whom.
    • Prohibited and/or restricted uses: Your policy should clearly state which purchases are prohibited, as well as the consequences of prohibited credit card use. Examples of typically prohibited credit card uses include ATM withdrawals, personal purchases, and cash back. If certain uses are allowed but restricted, those restrictions should be clearly stated.
    • Expense limits: The policy should specify dollar limits for different types of expenses (i.e., per diem limit for meal charges for union business travelers, air travel class limitations, maximum lodging charges).
    • Documentation requirements: Your policy should specify exactly what documentation credit card users are required to submit, as well as who will review this documentation.
  1. Require detailed documentation for each credit card charge and payment.

The Labor Management Reporting and Disclosure Act (LMRDA) outlines several recordkeeping requirements with which unions must comply. Unions must maintain the following documentation related to credit card use:

    • All credit card statements and information for payments to credit card vendors.
    • Original itemized receipts for each credit card charge.
    • For group meal expenses, a written explanation of the specific union business conducted, and the full names and titles of all individuals incurring the food and beverage charges.
  1. Monitor for compliance regularly.

Unions should carry out regular reviews or audits to ensure compliance with established credit card policies. During these audits, one or more officers’ credit card expense reports and supporting documentation for a given period should be selected and reviewed, and any unusual activity reported to the executive board.

Protecting Your Union’s Financial Health

A strong credit card policy and system of oversight are critical for safeguarding your union against fraud and abuse. Another way you can maintain your union’s financial health is by partnering with RBT CPAs’ union accounting team. Our CPAs are here to support all of your union’s accounting, tax, audit, and advisory needs so that you can focus on your core mission of advocating for your members. Contact us today and find out how we can be Remarkably Better Together.

3 Ways to Increase Your Practice’s Revenue (Besides Raising Fees)

3 Ways to Increase Your Practice’s Revenue (Besides Raising Fees)

Veterinary practices in 2026 are unsurprisingly facing increased price sensitivity among pet owners. The American Veterinary Medical Association (AVMA) has highlighted a downward trend in the number of veterinary visits as households tighten their budgets in response to broader economic pressures. Facing an extended period of inflation, rising labor expenses, and increasing operating costs, many practices have had little choice but to raise their fees. In turn, some pet owners are responding by reducing visits or declining recommended care, posing new challenges to hospital profitability. As cost sensitivity among clients is likely to persist for the foreseeable future, practices will likely need to focus on strategies that increase revenue without raising prices. Here are three ways veterinary practices can boost revenue without relying on fee increases.

  1. Expand Service Offerings: One way to create additional revenue streams is to expand your hospital’s range of services. Heightened attention to overall pet wellbeing is driving demand for preventative care services, such as ultrasound tests for breeds at risk for heart disease, nutrition counseling, and behavioral consultations. Wellness plans—consisting of bundled services such as routine wellness exams, blood work, fecal analysis, dental cleanings, and parasite prevention—offer another potential income stream. Other services you may consider offering include boarding, special boarding services featuring “extras” like additional walks or playtime, grooming services, and telemedicine visits.
  2. Streamline Operations: Improving the efficiency of your operations is another way to boost your hospital’s income. Inefficiencies such as unfilled appointment slots, administrative overload, missed charges, and ineffective inventory management all take a toll on your hospital’s profits. Automating some of your practice’s functions allows your staff to focus on the most important tasks and cuts down on lost revenue. Technologies such as AI-powered scribe tools, cytology apps, inventory management systems, and cloud-based PIMS systems all contribute to smoother workflows and improved overall productivity. Other strategies for improving operational efficiency include cross-training your staff and outsourcing key business functions, such as accounting, to reputable professional firms.
  3. Increase Patient Visits: More patient visits = more income. Streamlining your operations will ideally free up your staff for additional patient visits, which is a great first step—but how do you fill these openings? That’s where marketing comes in. A strategic marketing plan will help to bring in new clients and retain your current base. An effective marketing strategy may include improving your website for SEO and usability, sending automated reminders to clients, establishing an active social media presence, or sponsoring local events to generate brand awareness.

Partner with RBT So You Can Focus on What Matters Most

RBT CPAs’ veterinary accounting team is here to support your practice’s accounting needs so that you can focus on other priorities like exploring new methods of increasing revenue and, of course, providing quality care for your patients. Our team provides veterinary practices with a full range of financial and business planning services, including audits, bookkeeping, CFO services, tax planning, and more. Beyond that, we help our veterinary clients understand how to use financial data to inform strategies critical to growth and success. When you work with RBT, you can be sure you are receiving the highest quality service, personalized to meet your unique needs and goals. Give RBT CPAs a call today and find out how we can be Remarkably Better Together.

The Role of AI in Estate Planning: Uses and Precautions

The Role of AI in Estate Planning: Uses and Precautions

In 2026, AI is all around us—even if we’re not always aware of it. Smartphones, search engines, social media, online chatbots, and email platforms all incorporate AI technology to enhance efficiency and personalize user experiences. Almost every industry is adopting AI in some form or another to enhance productivity and streamline workflows. More and more, people are turning to AI for near-instantaneous solutions and assistance with everyday tasks, from creating meal plans to composing emails and mapping out monthly budgets. So, if AI can help with all of these tasks, can’t it also develop an estate plan for you? Let’s talk about it.

AI Uses in Estate Planning

AI is certainly gaining ground in the world of estate planning, both on the client and professional sides. Individuals are conducting their own estate planning research on AI platforms at home, while businesses are employing automated questionnaires and AI-driven chatbots to exchange information with clients. AI “voice synthesis” is even being used to recreate peoples’ voices for their loved ones after they pass. This technology opens the door to new possibilities for both clients and estate planning professionals alike. However, caution must be exercised. While it’s true that AI-powered tools like ChatGPT can provide generalized information about the estate planning process and can even generate templates of certain documents, AI alone should not be relied upon for your estate planning needs.

Here’s why.

What are the risks?

Due to the convenience and low cost of many AI programs, you may be tempted to rely solely on artificial intelligence for estate planning guidance, without consulting with professionals like attorneys or accountants. However, doing so can result in errors and misinformation, incorrect documentation, and a plan that does not carry out your wishes as you intend. AI systems operate on statistics, algorithms, and data available on the internet. These programs cannot think or discern as a human being can, and therefore can miss important nuances or even portray misinformation as fact. Such nuances and errors can have a significant impact on your estate plan—a single incorrect word, number, or legal oversight can completely alter how your assets are managed after you pass. An improperly executed will or trust can lead to confusion, legal battles, inheritance disputes, and tax consequences for your heirs. Beyond that, any personal information you submit to an AI model such as ChatGPT automatically becomes part of its database, risking the exposure of your confidential data to outside parties.

Why You Still Need Human Advisors

Estate planning professionals, such as accountants and attorneys:

  • possess a deep knowledge and understanding of complex legal concepts and tax laws specific to your state
  • have real experience working with a wide range of clients with unique situations
  • meet with you to understand your goals, personal wishes, and family dynamics
  • customize your estate plan to align with your specific intentions
  • provide expert advice on legal and tax considerations
  • know the right questions to ask to ensure that your needs and goals are met
  • provide ongoing support throughout the estate planning process
  • ensure your sensitive personal and financial information remains confidential

Partner with RBT for Estate Planning Guidance You Can Trust

While AI certainly offers some helpful benefits for both individuals and professionals throughout the estate planning process, this technology should be used as a supplement to the role of human advisors—not a substitute. RBT CPAs’ Trust, Estate, and Gift practice is here to take the guesswork out of estate planning. In conjunction with your attorney, our tax professionals are here to ensure your estate plan aligns with your financial goals and intentions. You can rely on our team to handle both your personal and business tax needs with the utmost professionalism and attention. Give RBT CPAs a call today and find out how we can be Remarkably Better Together.

Top Cybersecurity Threats and Strategies for Manufacturers in 2026

Top Cybersecurity Threats and Strategies for Manufacturers in 2026

It’s been a while since we’ve assessed the state of cybersecurity in the manufacturing space—and now seems a more fitting time than ever to revisit the topic. Between the rapid uptake of AI-driven technologies, increasingly sophisticated cyber threats, and heightened geopolitical tensions, cybersecurity has climbed to the top among priorities for manufacturing firms in 2026. According to an analysis by Cybersecurity Dive, “cybersecurity firms have repeatedly found that manufacturing is the most targeted of the 16 critical infrastructure sectors recognized by the U.S. government.” Cybercriminals in 2026 are going beyond just stealing data—they are seeking to cause major operational disruptions as a means of maximizing extortion leverage.

So, what makes manufacturing companies attractive targets for cybercriminals? Not only do manufacturing companies house sensitive intellectual property, but they also rely on complex supply chains and are highly sensitive to operational disruptions. To add to that, current heightened global tensions have made U.S. manufacturing firms prime targets for threat actors seeking to weaken critical U.S. infrastructure. And large firms aren’t the only ones being targeted. In fact, small and medium-sized businesses are increasingly becoming the preferred targets for cybercriminals due to their lower security levels compared to larger firms. Cyberattacks can have debilitating impacts on manufacturing companies, ranging from delayed or halted production to supply chain disruptions and significant financial losses. These attacks also often result in the theft of critical company data, loss of intellectual property, and exposure of sensitive personal information. Incidents like these may not only lead to higher insurance costs but may also damage a company’s public image as well as its relationships with its customers.

With that said, let’s talk about the top threats to manufacturing cybersecurity in 2026 and what companies can do to mitigate these risks.

Top Threats to Manufacturing Cybersecurity in 2026

  • Rapid AI adoption: The widespread adoption of AI poses serious risk to companies that lack sufficient safeguards or governance frameworks. Research from IBM and Ponemon Institute shows that “AI is greatly outpacing security and governance in favor of do-it-now adoption” and that “ungoverned AI systems are more likely to be breached and more costly when they are.”
  • Interconnected IT and OT systems: The integration of information technology (IT) and operational technology (OT) systems, made possible by advances such as cloud-based networks and the Internet of Things (IoT), significantly expands a company’s attack surface. While IT/OT integration creates operational efficiency, it also exposes a company’s networks to greater risk, allowing threat actors to move laterally across connected systems.
  • Legacy OT systems: Operational systems that rely on outdated technology are vulnerable and not easily patched, making them prime targets for cybercriminals.
  • Skills shortage: A lack of specialized cyber-professionals in manufacturing firms leads to inadequate monitoring of networks and weakened security. Additionally, as Manufacturing Business Technology points out, cybersecurity leaders are often positioned too low within midmarket manufacturing businesses, which can prevent security issues from receiving board-level attention.
  • Third-party risks: Large networks of third-party vendors, suppliers, and contractors open up more points of entry for threat actors, especially if those third parties’ security systems are not properly vetted.

So, what can manufacturers do to address some of these threats?

Mitigating Cybersecurity Risks in 2026: What Can You Do?

  • Segmentation: Segment IT and OT systems to prevent lateral movement of cyberattacks and more easily contain threats.
  • Prioritize cybersecurity roles: Establish a dedicated cybersecurity lead with direct access to company leadership.
  • Leverage AI: Use AI-powered security systems to detect threats and automate responses to attacks.
  • Third-party oversight: Minimize third-party cybersecurity risks by conducting risk assessments and limiting/monitoring vendors’ access to company networks.
  • Incident response plans: Develop an incident response plan detailing how your organization will detect, address, and recover from cyber incidents.

Partner with RBT for Accounting Services You Can Trust

While you tackle the latest challenges on the cybersecurity front, let RBT CPAs’ specialized manufacturing team take care of your accounting needs. At RBT, we understand the unique challenges faced by manufacturers, and we’re here to support your business’s accounting processes every step of the way. Give us a call today and find out how we can be Remarkably Better Together.

Construction Cyberattacks on the Rise: Threats, Impacts, and What You Can Do

Construction Cyberattacks on the Rise: Threats, Impacts, and What You Can Do

As construction technology advances rapidly—from automation and 3D printing to the use of drones and robots—concerns over system security are growing—and for good reason. The last several years have seen a steep rise in the number of cyberattacks targeting construction companies, with ransomware, fraudulent wire transfers, and data breaches among the most common threats. The industry is targeted largely due to its reliance on legacy systems, lack of security, complex supply chains, large amounts of confidential data, and sizable financial transactions. Cyberattacks can result in huge financial losses for construction companies, as well as operational and reputational damage. These attacks have the potential to seriously disrupt a company’s operations by threatening company financials, project timelines, infrastructure, and stored data. As cyberattacks become more sophisticated and frequent, it’s more important than ever that contractors take the necessary steps to safeguard critical systems and sensitive information.

Common Cyberattacks

  • Ransomware is one of the most common forms of cyber threats facing construction companies. Ransomware is a type of malicious software that cuts off a company’s access to its computer systems, data, and networks until a ransom payment is made.
  • Wire transfer fraud is another type of attack in which a scammer deceives a company into sending money to a fraudulent account (for example: a fraudster hacks a subcontractor’s email and requests a contractor send payment to a fake account).
  • Data breaches are another category of cyberattacks frequently threatening the construction industry. Data breaches occur when an unauthorized party gains access to a company’s sensitive data, including blueprints, project plans, financial information, employees’ personal details, and more.

Impacts on Construction Companies

Companies that fall victim to a cyberattack may suffer the following consequences:

  • Major financial losses
  • Delayed or halted projects
  • Exposure of confidential company and employee information
  • Loss of intellectual property
  • Potential legal consequences
  • Loss of confidence from clients and the public

What Can You Do?

Below are some preventative measures construction companies can implement to strengthen cybersecurity and minimize risk.

  1. Robust cybersecurity training: Implement regular company-wide cybersecurity training so employees can recognize threats and avoid falling victim to cyber scams.
  2. Security systems: Install protections such as network firewalls, anti-malware and antivirus software, and intrusion detection systems (IDS).
  3. Password protocols: Secure company devices and sensitive data by requiring strong passwords, multi-factor authentication, and regular password changes.
  4. Updated software: Routinely update software, replacing legacy systems with updated programs if necessary.
  5. Regular risk assessments: Regularly assess systems for vulnerabilities or hire a third-party cybersecurity service to conduct risk assessments.
  6. Vet third parties: Review the cybersecurity protocols of third-party vendors, suppliers, and service providers.
  7. Response plan: Prepare a detailed incident response plan establishing protocol for when cybersecurity incidents do occur.

Conclusion

This new age of technology for the construction industry brings with it a great deal of opportunity, excitement, and innovation—but also a new level of risk. Contractors must be vigilant and prepared for the threat of cyberattacks at all times to avoid serious operational and financial damage. Implementing the proper protections now can save you a world of trouble later on.