{"id":21741,"date":"2024-06-14T11:48:27","date_gmt":"2024-06-14T15:48:27","guid":{"rendered":"https:\/\/www.foundationsoft.com\/?p=21741"},"modified":"2025-04-14T14:05:47","modified_gmt":"2025-04-14T18:05:47","slug":"mobile-and-cloud-security-what-contractors-should-know","status":"publish","type":"post","link":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/","title":{"rendered":"Mobile and Cloud Security: What Contractors Should Know"},"content":{"rendered":"<p>Mobile and <a href=\"https:\/\/www.foundationsoft.com\/learn\/how-technology-bridging-gap-in-construction-efficiency\/\">cloud technologies<\/a> are moving swiftly onto jobsites and into offices across the construction trades. Though <a href=\"https:\/\/www.foundationsoft.com\/learn\/the-value-of-investing-in-construction-accounting-software\/\">accounting software<\/a> has previously been slow to merge with these internet-based business tools, excitement about the benefits of anytime-anywhere computing has begun to catch on.<\/p>\n<p>According to a recent survey conducted by Associated General Contractors of America in collaboration with Sage Construction and Real Estate, <a href=\"https:\/\/builtworlds.com\/news\/cloud-adoption-is-rising-in-the-aec-but-what-are-we-missing-sage-weighs-in\/#:~:text=In%20all%2C%2085%25%20of%20construction,purveyor%20of%20cloud%2Dbased%20solutions.\" target=\"_blank\" rel=\"noopener\"><strong><b>85% of construction contractors use or plan to use <\/b><\/strong><strong>cloud-based solutions<\/strong><\/a><strong><b>. In comparison, back in 2012, a Sage survey found that only 16% of construction workers believed cloud computing was important to their business. <\/b><\/strong><a href=\"#_ftn1\" name=\"_ftnref1\"><u>[1]<\/u><\/a><\/p>\n<a target=\"_self\" href=\"#watch-demo-video\" class=\"blog-cta-image\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/FSL-blog-post-ad-fsl-in-action.png\" alt=\"Watch a Demo\" title=\"Watch a Demo\"><\/a>\n<p>&nbsp;<\/p>\n<p>In simple terminology, \u201cthe cloud\u201d refers to servers that are accessed over the internet. In a larger sense, the cloud also refers to the software and databases that run on those servers.<\/p>\n<p>So, are cloud accounting programs and <a href=\"https:\/\/www.foundationsoft.com\/learn\/the-importance-of-data-security-in-accounting-software-for-contractors\/\"><u>jobsite mobile apps secure<\/u><\/a>? To help answer this question, there are several things that construction companies should know.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Mobile_Cloud_Security_for_Contractors_Top_Takeaways\"><\/span><strong><b>Mobile &amp; Cloud Security for Contractors: Top Takeaways<\/b><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><b><\/b><strong><b>Implement Strict Access Control Measures:<\/b><\/strong>\n<ul>\n<li>Restrict and audit user access rights.<\/li>\n<li>Implement and communicate internet and mobile device use policies.<\/li>\n<li>Regularly revoke access for terminated employees to prevent unauthorized entry.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Ensure Regular Data Backups for Safety:<\/b><\/strong>\n<ul>\n<li>Ensure consistent data backups to prevent total loss.<\/li>\n<li>Use geographically diverse servers for data redundancy and disaster recovery.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Use Proactive Automatic Monitoring Systems:<\/b><\/strong>\n<ul>\n<li>Employ systems that automatically detect and alert suspicious activity.<\/li>\n<li>Respond promptly to potential security threats.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Provide Comprehensive Employee Security Training:<\/b><\/strong>\n<ul>\n<li>Provide extensive security awareness and phishing prevention training.<\/li>\n<li>Educate employees to reduce risks from carelessness and social engineering attacks.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Utilize Robust Cloud Server Security:<\/b><\/strong>\n<ul>\n<li>Utilize secure, encrypted internet connections to access data.<\/li>\n<li>Benefit from physical security measures like concrete walls, steel doors, and continuous monitoring.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Implement Advanced Data Encryption Techniques:<\/b><\/strong>\n<ul>\n<li>Use TLS 1.3 for securing data in transit.<\/li>\n<li>Implement AES-256 encryption for data at rest to ensure high-level security.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Ensure Clear Vendor Agreements for Data Protection:<\/b><\/strong>\n<ul>\n<li>Ensure vendor contracts specify data access, usage, and ownership terms.<\/li>\n<li>Verify provisions for data return and deletion after service termination.<\/li>\n<\/ul>\n<\/li>\n<li><b><\/b><strong><b>Maintain Stringent Physical Security in Data Centers:<\/b><\/strong>\n<ul>\n<li>Cloud servers are protected by robust physical security measures.<\/li>\n<li>Continuous monitoring and top-tier firewalls safeguard data from physical and digital threats.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"1_How_Does_Construction_Mobile_Security_Protect_My_Data\"><\/span>1. How Does Construction Mobile Security Protect My Data?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>One of the biggest threats to data security is an <em><i>internal<\/i><\/em>\u00a0breach. The term internal breach refers to a hacker \u201cbreaking into\u201d your data servers.<\/p>\n<p>During an internal breach, a hacker can perform an act called <em><i>exfiltration.<\/i><\/em>\u00a0Exfiltration is any unauthorized transfer of information from an information system. So, if a hacker were to export your data onto their own server, that would be exfiltration.<\/p>\n<p>And there\u2019s a catch<strong><b>: internal breaches aren\u2019t always sinister<\/b><\/strong>. Exfiltration can also result simply from a careless or untrained employee who saves her password in her browser or who leaves his tablet behind at the airport.<\/p>\n<p>Such accidental cases account, according to Intel, for about half of internal data loss incidents.<a href=\"#_ftn2\" name=\"_ftnref2\"><u>[2]<\/u><\/a>\u00a0<a href=\"http:\/\/www.forconstructionpros.com\/article\/12141674\/6-steps-to-secure-networks-as-you-innovate-construction-management-systems\" target=\"_blank\" rel=\"noopener\">The Cloud Security Alliance (CSA)<\/a> ranks Insufficient Identity, Credential, Access, and Key Management as the number one threat to cloud computing for 2023.<a href=\"#_ftn3\" name=\"_ftnref3\"><u>[3]<\/u><\/a><\/p>\n<p>Even external breaches such as phishing attacks come down in large part to employee education and accountability, making company-wide use policies and training essential for company-wide security.<\/p>\n<p>Hoping for the best and trusting \u201ccommon sense\u201d simply doesn\u2019t work anymore, phishing has officially outgrown our antiquated fail-safes.<\/p>\n<p><a href=\"https:\/\/cloudsecurityalliance.org\/blog\/2022\/06\/25\/1-threat-to-cloud-computing-insufficient-identity-credential-access-and-key-management\/\" target=\"_blank\" rel=\"noopener\">Verizon\u2019s annual study of global data breaches<\/a> showed that 23% of recipients open phishing messages, and campaigns of just 10 malicious emails have a 90% chance of snaring a\u00a0victim.<a href=\"#_ftn4\" name=\"_ftnref4\"><u>[4]<\/u><\/a><\/p>\n<p>These emails don\u2019t even need to target the CIO or database administrator to get what they want or to deal a devastating blow to a business.<\/p>\n<p>James Benham, CEO of JB Knowledge, has boasted about penetrating entire on-premise networks just by sending the receptionist a cat video, which downloaded a script onto her computer.<a href=\"#_ftn5\" name=\"_ftnref5\"><u>[5]<\/u><\/a><\/p>\n<p>Preventative measures that companies should take include utilizing spam filters, implementing security awareness and establishing a response plan.<\/p>\n<p>As cybersecurity and cloud gurus will say, threats simply exist \u2014 whether you\u2019re on the cloud, use mobile or operate on-premise \u2014 which is why data security always begins at home, with business-level and user-level practices. \u201cIn the absence of these standards,\u201d reports the CSA, \u201cbusinesses are vulnerable to security breaches that can erase any gains made by the switch to cloud technology.\u201d<a href=\"#_ftn6\" name=\"_ftnref6\"><u>[6]<\/u><\/a><\/p>\n<p>One way construction companies can take responsibility for their security is by restricting and auditing access rights, thus making sure that no one has more access than they need and that a process is in place to swiftly revoke access from terminated employees.<\/p>\n<p>This isn\u2019t about not trusting your people; it\u2019s about not trusting the bad guys who could otherwise have free reign of the whole system just by breaking in through any open door.<\/p>\n<p>Companies are also advised to implement and communicate internet-use and mobile-device policies to all employees, regardless of whether they supply devices or have a BYOD program.<\/p>\n<p>So, what does this all mean?<\/p>\n<p>It means that your mobile construction solution is able to protect your data through three key avenues:<\/p>\n<ol>\n<li><b><\/b><strong><b>Limited Use<\/b><\/strong>: Users are able to control who can access info within their company system. When this ability is limited, data is better protected because fewer individuals have open access to it, and there are fewer security risks as a result.<\/li>\n<li><b><\/b><strong><b>Back-ups: <\/b><\/strong>When data is consistently backed up, or saved to an alternative server, users can be assured they will not lose everything if a data breach occurs. Instead, when consistent backups of information are performed, users can simply refer to the backup if the system information is lost.<\/li>\n<li><b><\/b><strong><b>Automatic Monitoring<\/b><\/strong>: Depending on the type of security in place, the mobile system may come with automatic monitoring of a company&#8217;s information and activity. This can help to alert the user if suspicious activity is detected before a breach has time to occur.<\/li>\n<\/ol>\n<h3><span class=\"ez-toc-section\" id=\"2_Where_Is_Your_Data_Stored_if_You_Store_it_on_the_%E2%80%9CCloud%E2%80%9D\"><\/span>2. Where Is Your Data Stored if You Store it on the &#8220;Cloud&#8221;?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>For all of the security risks that exist just on your internet-facing devices, users should have a realistic picture of where their data lives when it\u2019s not being accessed on their machines.<\/p>\n<p><a href=\"https:\/\/www.foundationsoft.com\/it-security-guide-foundation-hosted\/\"><u>The cloud servers<\/u><\/a>\u00a0that store and host client data are maintained under much more robust security than you would see in most construction company offices. Public data centers \u2013 facilities that centralize the shared IT operations and equipment that store and process data \u2013 are practically bunkers. They feature elements like concrete walls, steel doors, continuous monitoring and top-tier firewalls.<\/p>\n<p>Even in smaller-scale operations, like server rooms that are designed to house client data, are <strong><b>secured with restricted access and continually monitored for suspicious activity<\/b><\/strong>.<\/p>\n<p>What\u2019s more, data is not just housed at a single site but is also backed up continuously on additional servers at geographically diverse data centers, hedging against data loss in case of physical disaster.<\/p>\n<p>Contractors can begin to safely store their data by building <strong><b>disaster-resistant server rooms<\/b><\/strong>, <strong><b>hiring a cybersecurity staff or contracting an on-site security company<\/b><\/strong>.<\/p>\n<p>Alternatively, they can also outsource their data storage to experts the same way we outsource our money storage to our bank or a credit union.<\/p>\n<p>When users need to access and work with their data, they \u201cwithdraw\u201d it through a secure, encrypted, authenticated internet connection until they sign off. Unless a user makes the ill-advised move of saving that data to his device\u2019s hard drive, where it becomes vulnerable to some of the exfiltration described above, the data \u201creturns\u201d to the safety of its off-site servers.<\/p>\n<p>The shortcoming of this metaphor, however, is one of the cloud\u2019s biggest benefits: the data never actually leaves the data center servers. Instead, users at a single company have the ability to collaborate, even while accessing the servers from multiple locations simultaneously.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"3_What_is_Data_Encryption\"><\/span><strong><b>3. What is Data Encryption?<\/b><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>While data can largely be secured <em><i>at rest<\/i><\/em>\u00a0with the kind of standards described above, between end-users and vendor or third-party data centers, the other side of the coin concerns securing data <em><i>in flight<\/i><\/em>.<\/p>\n<p>Encryption <em><i>in flight<\/i><\/em>\u00a0is meant to protect data that is in transit. Encryption <em><i>at rest<\/i><\/em>\u00a0maintains protection at the remote destination. In general, data is typically less vulnerable <em><i>at rest<\/i><\/em>\u00a0than <em><i>in transit<\/i><\/em>.<\/p>\n<p><strong><b>When it comes to protecting data in transit, encryption is the key \u2014 or rather, it\u2019s the lock. <\/b><\/strong><\/p>\n<p>Encryption is the process of translating data into an unreadable form that requires a decryption key to render it back into a usable form. It\u2019s the same basic principle that you may have used to pass secret messages during class that only your best friend knew how to decode.<\/p>\n<p>Fortunately, just like with the security measures and processes used by data centers, companies will find that most vendors employ best practices as a standard.<\/p>\n<p>In\u00a0one sense, encryption begins with a secure transfer channel. The industry standard is transport layer security (TLS), currently at version 1.3, which allows a user to send information safely from their device to the web application on the cloud. TLS 1.3 consists of two parts: (1) encoding the data and then (2) establishing a friendly connection between the client and the server.<\/p>\n<p>You and your classmate can\u2019t go out in the hall to tell each other jokes about your teacher, so how are going to communicate? First, you write down your message in a code you both know, and second, you flash him a secret look so that only he knows the wadded-up paper you\u2019re about to throw at his desk contains a coded message. That way, only he receives the message and only he can translate it.<\/p>\n<p>On the internet, there\u2019s no equivalent to an empty hallway you can use to communicate sensitive data without the risk of eavesdroppers, but encryption protocols effectively create secure means of passing data right behind the backs of people who would gladly confiscate it.<\/p>\n<p>For even better security, though, encryption goes even beyond the process of transmission. Presently the gold standard for at-rest encryption is AES-256, which stands for Advanced Encryption Standard 256-bits, meaning it has a decryption key that\u2019s 256 binary digits (0s and 1s) long.<\/p>\n<p>The result is a decryption process that takes several dozen steps of translating, transposing and recoding, making it the trusted encryption algorithm of banks and governments.<\/p>\n<p>If we continue the metaphor, after your friend gets your secret note and works out the decoded message, how do you prevent the teacher from confiscating it and reading what you said about her?<\/p>\n<p>At-rest decryption would have your friend translate it from your shared secret code into <em><i>his own<\/i><\/em>\u00a0private code.<\/p>\n<p>Of course, all of this, thankfully, is far more complex and dynamic, using an algorithm that the CSA\u2019s Quantum-safe Security Working Group projects will remain safe for the next 20 to 30 years.<a href=\"#_ftn7\" name=\"_ftnref7\"><u>[7]<\/u><\/a>\u00a0Properly implemented, AES-256 has had no reported cases of being cracked.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"4_Who_Owns_My_Construction_Companys_Data\"><\/span>4. Who Owns My Construction Company&#8217;s Data?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A final concern among skeptics is the proposition of not merely entrusting the <em><i>security<\/i><\/em>\u00a0of their data to someone else but ultimately <em><i>giving<\/i><\/em>\u00a0sensitive data \u2014 including employee and customer information \u2014 over to another party.<\/p>\n<p>This does (and should) raise a series of questions, and any company that considers implementing some form of cloud computing owes it to both its employees and its clients to be sure of the answers.<\/p>\n<p>Along with peace of mind about data security, complete ownership of your own data is a reasonable expectation. However, just as construction companies should do their due diligence in ensuring data safety and investigating the security standards of their cloud provider, ownership of data shouldn\u2019t be taken for granted. Neither should it be taken for granted what \u201cownership\u201d <em><i>means<\/i><\/em>.<\/p>\n<p><strong><b>The first question companies should ask is, <\/b><\/strong><strong><em><b><i>who has access to my data?<\/i><\/b><\/em><\/strong><strong><b>\u00a0<\/b><\/strong>The obvious answer may be \u201cAmazon\u201d or \u201cFoundation Software,\u201d but there\u2019s a big difference between your vendor\u2019s IT department and their marketing department.<\/p>\n<p>Of course, a service agreement isn\u2019t going to provide a manifest of everyone who will get to see a piece of your data along with their position titles, but you might be able to look for a confidentiality clause that mentions access only for employees with a \u201cneed to know\u201d in order to fulfill the vendor\u2019s service obligations.<\/p>\n<p><strong><b>To help illuminate who has access to your data, another important question to ask is, <\/b><\/strong><strong><em><b><i>what are they allowed to do with my data?<\/i><\/b><\/em><\/strong>\u00a0This should be spelled out in the service agreement.<\/p>\n<p>A standard agreement will allow for the sharing of content with third parties only as required to provide the services contracted or in order to comply with subpoenas or other court orders, but these should come with due notification, and the vendor should express its legal commitment in writing to protect the confidential information it receives.<\/p>\n<p>Trust is a virtue, but when it comes to vendor use of your data, <strong><b>trust should be verified<\/b><\/strong>. Without legal assurance, users are right to be concerned about the possibility that their information could not only be held but used.<\/p>\n<p>That doesn\u2019t mean that a vendor will sell your financial information to corporate spies or auction off employee social security numbers to identity thieves, but a bad agreement might grant them the right to mine your data for marketing lists.<\/p>\n<p>Companies should especially be wary of free cloud services and free mobile applications because their revenue is coming from somewhere if not product sales, and one of their income sources could very well be client data.<\/p>\n<p>A final test of ownership is the question, <em><i>what happens with my data in the end?<\/i><\/em> Unlike the traditional desktop software, we used to install floppy disks and CDs, mobile and cloud applications place you in an ongoing relationship with the vendor, but at some point, that relationship might reach an end.<\/p>\n<p>So, what happens to all of <em><i>your <\/i><\/em>data on <em><i>their <\/i><\/em>servers?<\/p>\n<p>If the data truly is yours, the agreement should provide for transition services within a specified window of time following termination to make sure the data gets back to you in one piece.<\/p>\n<p>Think of closing a bank account: you expect them to pay out a standard currency that you can take to any other bank. You do <em><i>not<\/i><\/em>\u00a0expect a private banknote only recognized at Chase branches.<\/p>\n<p>In the same way, vendors should agree ahead of time to provide a standard database format. Following the return of your data, there should also be an expressed commitment to delete it from their servers.<\/p>\n<p>The principle here is so much the same as in the rest of the construction business: <strong><b>get it in writing<\/b><\/strong>. In the end, ownership of your data should be clear and explicit, affirming all rights, titles and interests.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"5_Are_Cloud_Accounting_and_Mobile_Jobsite_Applications_Secure\"><\/span><b><\/b>5. Are Cloud Accounting and Mobile Jobsite Applications Secure?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Are cloud accounting and mobile jobsite applications secure? The answer is, <em><i>they can be<\/i><\/em>, in a similar way to how our hard drives and our filing cabinets can be. Each of these require reasonable and responsible measures taken by companies that handle sensitive data.<\/p>\n<p>These companies must understand that the security of cloud accounting and mobile jobsite applications is not a guaranteed default setting but a result of proper implementation and adherence to security practices.<\/p>\n<p><strong><b>Companies must prioritize data security by establishing secure access management protocols. <\/b><\/strong>This includes restricting and auditing access rights, ensuring that employees have only the necessary level of access and promptly revoking access for terminated employees.<\/p>\n<p>Implementing comprehensive internet-use and mobile-device policies, as well as providing regular security awareness training to employees, can significantly reduce the risk of internal breaches and phishing attacks.<\/p>\n<p>Furthermore, it is important to remember that cloud servers and public data centers often have stringent physical security measures in place, such as concrete walls, steel doors, continuous monitoring, and top-tier firewalls. Data is not only stored at a single site but also backed up on geographically diverse servers, minimizing the risk of data loss due to physical disasters.<\/p>\n<a target=\"_blank\" href=\"\/learn\/#schedule-a-live-demo\" class=\"blog-cta-image\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2024\/03\/FSL-blog-post-ad-see-how.png\" alt=\"Get a Demo\" title=\"Get a Demo\"><\/a>\n<h2><span class=\"ez-toc-section\" id=\"Embrace_Cloud_Technology\"><\/span>Embrace Cloud Technology<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While there are many legitimate concerns about the security of cloud accounting and mobile jobsite applications, it is possible to mitigate risks and ensure data security through proper implementation of security measures.<\/p>\n<p>By adopting best practices, prioritizing employee education, implementing encryption, and reviewing service agreements, construction companies can embrace the benefits of cloud technology while safeguarding their sensitive data.<\/p>\n<p>Ultimately, the <a href=\"https:\/\/www.foundationsoft.com\/learn\/using-technology-to-manage-the-complexity-of-davis-bacon-act-compliance\/\"><u>benefits of cloud technology<\/u><\/a>\u00a0outweigh the alternatives, and it is the responsibility of each company to take proactive steps toward data security and establish a solid foundation for the adoption of these technologies.<\/p>\n<p>And if you&#8217;re needing trustworthy, time-tested cloud-solution, <a href=\"https:\/\/www.foundationsoft.com\/\">FOUNDATION\u00ae<\/a> accounting software has a Hosted version that gives you instant access to your database at any internet-ready workstation and provides automatic backups and updates from a team of experts. Contact a specialist for a demo!<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\"><u>[1]<\/u><\/a>\u00a0https:\/\/builtworlds.com\/news\/cloud-adoption-is-rising-in-the-aec-but-what-are-we-missing-sage-weighs-in\/#:~:text=In%20all%2C%2085%25%20of%20construction,purveyor%20of%20cloud%2Dbased%20solutions.<\/p>\n<p><a href=\"#_ftnref2\" name=\"_ftn2\"><u>[2]<\/u><\/a>\u00a0http:\/\/www.forconstructionpros.com\/article\/12141674\/6-steps-to-secure-networks-as-you-innovate-construction-management-systems<\/p>\n<p><a href=\"#_ftnref3\" name=\"_ftn3\"><u>[3]<\/u><\/a>\u00a0Cloud Security Alliance, <em><i>The Treacherous 12: Cloud Computing Top Threats in 2016<\/i><\/em>\u00a0(2015).<\/p>\n<p><a href=\"#_ftnref4\" name=\"_ftn4\"><u>[4]<\/u><\/a>\u00a0https:\/\/cloudsecurityalliance.org\/blog\/2022\/06\/25\/1-threat-to-cloud-computing-insufficient-identity-credential-access-and-key-management\/<\/p>\n<p><a href=\"#_ftnref5\" name=\"_ftn5\"><u>[5]<\/u><\/a>\u00a0Intel Security, <em><i>Grand Theft Data: Data Exfiltration Study: Actors, tactics, and definitions <\/i><\/em>(2015).<\/p>\n<p><a href=\"#_ftnref6\" name=\"_ftn6\"><u>[6]<\/u><\/a>\u00a0JB Knowledge, <em><i>The 4th Annual Construction Technology Report<\/i><\/em>\u00a0(2015).<\/p>\n<p><a href=\"#_ftnref7\" name=\"_ftn7\"><u>[7]<\/u><\/a>\u00a0Association of General Contractors, <em><i>2016 Construction Outlook Survey Results <\/i><\/em>(2016).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile and cloud technologies are moving swiftly onto jobsites and into offices across the construction trades. Though accounting software has previously been slow to merge with these internet-based business tools, excitement about the benefits of anytime-anywhere computing has begun to catch on. According to a recent survey conducted by Associated General Contractors of America in collaboration with Sage Construction and &#8230; <\/p>\n<div><a href=\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/\" class=\"more-link\">Read More<\/a><\/div>\n","protected":false},"author":60,"featured_media":21725,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","inline_featured_image":false,"footnotes":""},"categories":[9,7],"tags":[],"class_list":["post-21741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-recommended-reading"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile and Cloud Security: What Contractors Should Know - Foundation Software<\/title>\n<meta name=\"description\" content=\"Is your construction data really secure in the cloud? Discover 5 critical security measures that protect your sensitive information from costly breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile and Cloud Security: What Contractors Should Know - Foundation Software\" \/>\n<meta property=\"og:description\" content=\"Is your construction data really secure in the cloud? Discover 5 critical security measures that protect your sensitive information from costly breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/\" \/>\n<meta property=\"og:site_name\" content=\"Foundation Software\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-14T15:48:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-14T18:05:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Barry Kaufman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barry Kaufman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/\",\"url\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/\",\"name\":\"Mobile and Cloud Security: What Contractors Should Know - Foundation Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.foundationsoft.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg\",\"datePublished\":\"2024-06-14T15:48:27+00:00\",\"dateModified\":\"2025-04-14T18:05:47+00:00\",\"author\":{\"@id\":\"https:\/\/www.foundationsoft.com\/#\/schema\/person\/b5bbba7b687d64aacde21ee3edf28988\"},\"description\":\"Is your construction data really secure in the cloud? Discover 5 critical security measures that protect your sensitive information from costly breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#primaryimage\",\"url\":\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg\",\"contentUrl\":\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg\",\"width\":800,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.foundationsoft.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile and Cloud Security: What Contractors Should Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.foundationsoft.com\/#website\",\"url\":\"https:\/\/www.foundationsoft.com\/\",\"name\":\"Foundation Software\",\"description\":\"Construction Software for Contractors\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.foundationsoft.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.foundationsoft.com\/#\/schema\/person\/b5bbba7b687d64aacde21ee3edf28988\",\"name\":\"Barry Kaufman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.foundationsoft.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2021\/05\/cropped-chevron-icon-100x100.png\",\"contentUrl\":\"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2021\/05\/cropped-chevron-icon-100x100.png\",\"caption\":\"Barry Kaufman\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile and Cloud Security: What Contractors Should Know - Foundation Software","description":"Is your construction data really secure in the cloud? Discover 5 critical security measures that protect your sensitive information from costly breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/","og_locale":"en_US","og_type":"article","og_title":"Mobile and Cloud Security: What Contractors Should Know - Foundation Software","og_description":"Is your construction data really secure in the cloud? Discover 5 critical security measures that protect your sensitive information from costly breaches.","og_url":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/","og_site_name":"Foundation Software","article_published_time":"2024-06-14T15:48:27+00:00","article_modified_time":"2025-04-14T18:05:47+00:00","og_image":[{"width":800,"height":500,"url":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg","type":"image\/jpeg"}],"author":"Barry Kaufman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Barry Kaufman","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/","url":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/","name":"Mobile and Cloud Security: What Contractors Should Know - Foundation Software","isPartOf":{"@id":"https:\/\/www.foundationsoft.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#primaryimage"},"image":{"@id":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg","datePublished":"2024-06-14T15:48:27+00:00","dateModified":"2025-04-14T18:05:47+00:00","author":{"@id":"https:\/\/www.foundationsoft.com\/#\/schema\/person\/b5bbba7b687d64aacde21ee3edf28988"},"description":"Is your construction data really secure in the cloud? Discover 5 critical security measures that protect your sensitive information from costly breaches.","breadcrumb":{"@id":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#primaryimage","url":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg","contentUrl":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2024\/06\/2024-06-blog-post-job-costing-800x500-1.jpg","width":800,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.foundationsoft.com\/learn\/mobile-and-cloud-security-what-contractors-should-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.foundationsoft.com\/"},{"@type":"ListItem","position":2,"name":"Mobile and Cloud Security: What Contractors Should Know"}]},{"@type":"WebSite","@id":"https:\/\/www.foundationsoft.com\/#website","url":"https:\/\/www.foundationsoft.com\/","name":"Foundation Software","description":"Construction Software for Contractors","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.foundationsoft.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.foundationsoft.com\/#\/schema\/person\/b5bbba7b687d64aacde21ee3edf28988","name":"Barry Kaufman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.foundationsoft.com\/#\/schema\/person\/image\/","url":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2021\/05\/cropped-chevron-icon-100x100.png","contentUrl":"https:\/\/www.foundationsoft.com\/wp-content\/uploads\/2021\/05\/cropped-chevron-icon-100x100.png","caption":"Barry Kaufman"}}]}},"_links":{"self":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/posts\/21741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/users\/60"}],"replies":[{"embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/comments?post=21741"}],"version-history":[{"count":0,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/posts\/21741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/media\/21725"}],"wp:attachment":[{"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/media?parent=21741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/categories?post=21741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.foundationsoft.com\/wp-json\/wp\/v2\/tags?post=21741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}