• About
  • Subscribe
  • Contact
Thursday, February 19, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Technology Data Protection

Construction under cyber siege: SEA targeted

FutureCISO Editors by FutureCISO Editors
July 9, 2025
Construction under cyber siege: SEA targeted

Photo by SevenStorm JUHASZIMRUS: https://www.pexels.com/photo/green-and-yellow-crane-439416/

Share on FacebookShare on Twitter

Southeast Asia's construction industry faces a growing wave of cyber threats. The industry, a key driver of economic progress in the region with an expected compound annual growth rate (CAGR) of 6.2% from 2024 to 2028 , is seeing an increase in malicious activity targeting its Industrial Control Systems (ICS), according to Kaspersky.

In Singapore, the construction sector is projected to see a total construction demand of between S$47 billion and S$53 billion in 2025 , fueled by digital technologies like Artificial Intelligence and automation. However, this digital transformation has a darker side, with a rise in cyber risks that can impact efficiency and project timelines.

Kaspersky's Q1 2025 data for SEA reveals a concerning trend: a higher percentage of ICS computers in the construction and manufacturing sectors are being targeted by malicious objects. Compared to global averages, the construction sector is 1.5 times more likely to have ICS computers blocked by malicious objects.

Manufacturing (1.3 times higher), building automation (1.2 times higher), electric power (1.2 times higher), and engineering/ICS integrators (1.2 times higher) also face elevated risks. Overall, Southeast Asia ranks second globally, with 29.1% of ICS computers experiencing blocked malicious objects.

Adrian Hia

"While digitalisation accelerates the construction supply chain and enhances monitoring," notes Adrian Hia, Managing Director for Asia Pacific at Kaspersky. "It also introduces a balance between risks and opportunities."

He emphasises the need for businesses to comprehensively mitigate threats by strengthening their layers of protection and resilience.

Expert recommendations:

  • Regular security assessments: Conduct thorough assessments of OT systems to identify and eliminate potential cybersecurity issues.
  • Continuous vulnerability assessment: Establish ongoing assessment and triage processes as a foundation for effective vulnerability management. Solutions like Kaspersky Industrial CyberSecurity can provide unique, actionable information.
  • Timely updates: Implement timely updates for key components of the OT network, applying security fixes and patches to prevent major incidents.
  • EDR solutions: Use endpoint detection and response (EDR) solutions like Kaspersky Next EDR Expert to detect sophisticated threats, investigate incidents, and remediate effectively.
  • Skills development: Improve incident response by building and strengthening teams' skills in prevention, detection, and response through dedicated OT security training.
Related:  Fraud-as-a-Service: The dark side of digital entrepreneurship

In an era where digital industrial devices are increasingly vulnerable due to outdated security measures and reliance on inexpensive network equipment, it is crucial to revise cybersecurity measures for legacy technologies.

Cybersecurity should be viewed as an investment in business continuity and trust, not just a cost, ensuring a safer and more sustainable digital future for the construction industry.

Tags: constructionIndustrial Control SystemsKaspersky
FutureCISO Editors

FutureCISO Editors

No Result
View All Result

Recent Posts

  • PodChats for FutureCISO: AI-driven identity governance in autonomous environments
  • Keeper adds full-screen terminal interface for vault management
  • AI revolutionising cyber attacks against Asia's supply chains
  • Organisations must go deeper as AI, cybercriminals increase collaboration
  • Report reveals 265% ROI through phishing-resistant authentication solutions

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • Incident Response
  • Network Security
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl