Protect project information
Site records, tenders, quotations, contracts, photographs and handover evidence are treated as controlled business information.
A practical Veraxus policy for protecting systems, accounts, tender records, site evidence, supplier details and payment communications from cyber risk.
This page summarises the signed policy in plain language. The controlled PDF remains the formal document for tenders, client assurance and governance evidence.
Site records, tenders, quotations, contracts, photographs and handover evidence are treated as controlled business information.
Unexpected links, invoice changes and urgent payment messages are checked before being trusted or acted on.
Passwords, MFA where available, updates, device security and approved systems support safer day-to-day working.
Backups, reporting, incident records and lessons learned help maintain continuity and strengthen future controls.
The policy is not just a document for a website. It supports controlled communication and safer handling of the records that move through construction and refurbishment work.
Drawings, quotations, RAMS-related records, photographs, snagging notes and handover documents are managed as business records, not casual files.
Construction work often relies on quick instructions, quotations and payment communication. The policy makes verification part of responsible delivery.
Backups, controlled accounts and reporting routes help reduce downtime from accidental deletion, device loss, malware or ransomware.
Veraxus handles cyber security through practical decisions at each stage of work: what is collected, who receives it, where it is stored, how it is verified and how concerns are reported.
Client details, site information, prices, assumptions and supporting evidence are kept controlled and shared only for the relevant purpose.
Supplier contacts, subcontractor information, RAMS records and access details are handled through approved communication routes.
Site photographs, messages, instructions, snagging records and quality evidence are retained carefully and not treated as informal public material.
Invoice changes, bank details, urgent payment requests and unexpected instructions are verified to reduce business email compromise risk.
Records are backed up, retained where required, disposed of when appropriate and used to improve future controls.
These commitments reflect the approved policy and are framed carefully: proportionate controls, recognised good practice alignment, and improvement as the business grows.
Company records and systems should only be accessed by people with a legitimate role or business reason.
Strong, unique passwords and multi-factor authentication are used where available, especially for email, cloud and finance-related systems.
Updates, screen locks, anti-malware controls and careful physical handling help reduce avoidable risk.
Unexpected links, attachments and payment changes should be verified before action.
Important records should be recoverable and not dependent on one device or uncontrolled account.
Lost devices, suspected phishing, malware warnings, misdirected emails and data concerns are raised promptly so they can be contained and recorded.
Suppliers, subcontractors, consultants and advisers should use relevant information responsibly and only for proper project or business purposes.
The official signed PDF is the formal Veraxus reference for client assurance, tender uploads, governance evidence and adviser review.
For Veraxus, cyber security is part of the same professional discipline expected in safe site work, quality records and client communication. It supports careful handling of information, respectful treatment of people’s data and continuous improvement as systems, clients and project requirements develop.
This website page is a plain-language presentation summary. For tenders, client review, portals or formal governance evidence, use the signed official PDF.