Skip to content
Horizontal-logo
  • 125 Years of Exceptional
  • Markets
    • Aviation
    • Cultural Resources
    • Education
    • Federal
    • Food & Beverage
    • Justice
    • Renewable Energy
    • State & Local
    • Transportation
    • Water
  • Services
    • Architecture & Interiors
    • Commissioning
    • Construction Services
    • Engineering
    • Environmental
    • Fabrication & Custom Manufacturing
    • Planning
    • Sustainability & Resilience
    • Technology & Security
  • Portfolio
  • News
  • About
    • Purpose & Values
    • Meet Our Team
    • Inclusion & Belonging
    • Corporate Responsibility
    • Locations
    • Scholarship Opportunities
    • Our History
    • Events
  • Careers
  • 125 Years of Exceptional
  • Markets
    • Aviation
    • Cultural Resources
    • Education
    • Federal
    • Food & Beverage
    • Justice
    • Renewable Energy
    • State & Local
    • Transportation
    • Water
  • Services
    • Architecture & Interiors
    • Commissioning
    • Construction Services
    • Engineering
    • Environmental
    • Fabrication & Custom Manufacturing
    • Planning
    • Sustainability & Resilience
    • Technology & Security
  • Portfolio
  • News
  • About
    • Purpose & Values
    • Meet Our Team
    • Inclusion & Belonging
    • Corporate Responsibility
    • Locations
    • Scholarship Opportunities
    • Our History
    • Events
  • Careers

Cybersecurity: A Project’s Unseen Foundation

  • September 30, 2025
a digital rendering shows a lock on some colorful illustrated data

In 1936, our firm’s founder Daniel Mead published The Engineer and His Code, establishing a framework for ethical engineering that has guided our firm for nearly a century. In his publication, he argued that an engineer’s fundamental duty was to the community, ensuring every project rested on a foundation of integrity, safety, and value.

Fast-forward to today, what does that foundation look like? It’s no longer built on just steel and concrete. In our world of smart buildings, cloud-based collaboration, and interconnected job sites, every project also rests on a digital foundation. A failure in this unseen layer—such as a data breach leaking sensitive blueprints, a fraudulent payment transfer, or a ransomware attack—can be as disastrous as any structural defect. For modern architects, engineers, planners, and construction managers, the ethical duty of care has expanded. Securing our projects’ digital assets is a core professional responsibility.

The New Job Site – Where Digital Risk Meets Physical Reality

Too often, the Architecture, Engineering, and Construction (AEC) industry has treated cybersecurity as an afterthought, more like a coat of paint applied after the structure is complete. As noted in a Construction Seyt article on cyber risk, our risk management has rightly focused on the tangible: site safety, supply chain logistics, and contract disputes. But this has created a concerning blind spot.

The statistics are staggering:

  • ConstructConnect reports that data breaches in the construction sector surged by 800% in a single year.
  • Gallagher Insurance found that over 75% of AEC firms experienced a cyber-incident in the last 12 months.

These types of incidents can severely disrupt projects. Research from Capitol Technology University shows that when cybercriminals deploy ransomware, the average project downtime is about 15 days—a delay that can significantly impact schedules and trigger substantial penalties.

The threat becomes even more visceral when we consider the convergence of Information Technology (IT) and Operational Technology (OT). OT systems—the digital brains controlling HVAC in hospitals, access controls in secure facilities, or purification systems in water treatment plants—were once isolated from one another.

Today, these systems are connected to the internet for efficiency and remote monitoring, creating a direct pathway from a hacker’s keyboard to physical infrastructure. A clever phishing email has the potential to shut down a building’s ventilation or compromise its safety systems.

In this new reality, cybersecurity has become an integral part of project development. Below are three foundational pillars organizations can build into every project starting today.

Pillar 1: Multi-Factor Authentication – The Digital Job Site Gate

Think of your project’s digital access points—email, cloud storage, management software—as the gates to your job site. A password alone is like a single key that can be easily lost, stolen, or copied. Should an unauthorized person gain access to that password, they could do serious damage.

Multifactor authentication (MFA) is the equivalent of requiring both a keycard and a PIN to enter. According to the National Institute of Standards and Technology (NIST), MFA adds a second layer of proof, such as a one-time code sent to your phone. Microsoft’s security research shows that enabling MFA blocks 99% of automated hacking attacks. A remarkably simple step with massive impact.

Organizational Action Plan:

  • Require MFA on all critical platforms, starting with email and any cloud-based file-sharing service where blueprints, contracts, and client data are stored.
  • Make MFA a non-negotiable standard for your team.

Pillar 2: Third-Party Risk – Vetting Your Digital Subcontractors

On any project, the general contractor is responsible for the quality and safety of every subcontractor brought on site. No electrical subcontractor would be hired without verifying their license, insurance, and safety record. Apply the same due diligence to digital subcontractors, including software vendors, cloud providers, and external consultants who handle or manage project data.

A vulnerability in a subcontractor’s digital assets can create an unsuspecting gateway into your network. If your vendor is breached, the legal, financial, and reputational fallout may land on your organization.

Organizational Action Plan:

  • Integrate basic security vetting into procurement. Ask:
    • Do you enforce MFA for all employees?
    • Can you provide a recent security audit, like a SOC 2 report?
    • What’s your breach notification process?
  • Include cybersecurity requirements in contracts, just as you would for insurance and safety compliance.

Pillar 3: Incident Response Plan – The Emergency Action Plan

Every well-run construction site has an Emergency Action Plan for safety incidents, such as fires or chemical spills. You don’t hope for these events, but you plan for them. Apply the same logic to the digital world with a Cyber Incident Response (IR) Plan. An IR plan outlines how to detect, contain, and recover from cyberattacks.

Organizational Action Plan:

Start simple. Answer these four questions with your team:

  1. Who do we call? Identify key contacts (IT, leadership, legal, cyber insurance).
  2. How do we contain it? First steps to stop the bleeding, like disconnecting an affected machine.
  3. How do we communicate? Protocol for informing leadership, employees, and clients.
  4. How do we recover? Steps to restore systems and data from backups.

From Afterthought to Forethought

The goal isn’t to turn architects and engineers into cybersecurity experts. It’s to empower you to ask the right questions at the beginning of a project—not after a breach.

Here’s a simple step: add a “Cybersecurity Pre-Mortem” to every project kickoff. Spend 15 minutes imagining a catastrophic cyber incident and work backward to identify weak points. This exercise builds resilience from day one.

Daniel Mead’s vision of ethical engineering was about building things that last. In the 21st century, that means building projects resilient in both the physical and digital worlds. By weaving these cybersecurity principles into project management, we go beyond managing risk. We uphold a timeless professional duty.

headshot of Royce Holden

Royce Holden

Royce Holden is the go-to guy when it comes to IT, cybersecurity and AI strategy—he’s been leading the charge at Mead & Hunt for the past 18 months, helping clients future-proof their digital landscapes. From IT transformation to smart, responsible AI adoption, Royce brings energy and expertise to every challenge. When he’s not shaping the future of tech, he’s globe-trotting with his family, kicking it on the soccer field, or soaking up nature. And if there’s a karaoke mic at a conference, you can bet Royce is already on stage bringing the party to life!

Linkedin Envelope Readme
PrevPrevious
NextNext

Most Popular

John Rathke’s Journey from Bridge Designer to ACEC Board Chair
October 1, 2025
A Three-Phase Approach to Hydroelectric Dam Rehabilitation
September 26, 2025
Justin Kise Named Mead & Hunt’s Water Group Leader
September 25, 2025
Nicki Combs Named President-Elect of ACRA
September 10, 2025

Main Menu

  • Home
  • Markets
  • Services
  • Portfolio
  • News
  • About
  • Careers
  • Home
  • Markets
  • Services
  • Portfolio
  • News
  • About
  • Careers

Useful Links

  • Ebids
  • Corporate Responsibility
  • Equipment & Parts
  • GSA Schedules Program
  • Government Contract Vehicles
  • Policy for Third-Party Recruiters
  • Transparency in Coverage
  • Ebids
  • Corporate Responsibility
  • Equipment & Parts
  • GSA Schedules Program
  • Government Contract Vehicles
  • Policy for Third-Party Recruiters
  • Transparency in Coverage

Get in touch

  • Apply Today
  • Contact Us
  • Locations
  • Title VI
  • Apply Today
  • Contact Us
  • Locations
  • Title VI

Connect with us

Linkedin Facebook Instagram Vimeo

© 2025 Mead & Hunt, Inc. All rights reserved.

[uc-privacysettings] | Privacy & CCPA Policy | Do Not Sell | Site Map
This website uses cookies to improve your experience. Read full privacy policy
ACCEPTREJECTSETTINGS
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo