SlideShare ist ein Scribd-Unternehmen logo
1 von 91
Downloaden Sie, um offline zu lesen
5 Technology Trends Construction
Contractors Can’t Afford To Ignore
Bill Walter, MCP, MCSE, PMP
Principal with Gross Mendelsohn’s
Technology Solutions Group
What We’ll Cover
1. How to use mobile technology to keep workers connected.
2. Document sharing and collaboration with workflows and picture
attachments.
3. Security measures to minimize threats like hacks, viruses, and data loss.
4. Why your business cannot afford to bypass social media.
5. The concept of a “virtual CIO” – what is it and do you need one?
Watch the full seminar by
following this link:
http://bit.ly/construction-tech-trends
Mobile Technology
4:3282%
Trend
#1
14% of Maryland
construction contractors are
concerned about field/mobile
access to email, project
management systems,
electronic files, timesheets,
etc.
-2017 Maryland Construction Industry Survey
Mobile (14%)
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
124 out of 159
answered yes
78%
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
35 out of 159
answered no
124 out of 159
answered yes
22% 78%
If we know mobile technology can make our construction businesses more efficient,
WHYSO RELUCTANT?
What’s Considered Mobile?
Phones
Tablets
Laptops
Wearables
BYOD:
Bring Your Own Device
• Allows access to the network even
when not in the office
• Doesn’t necessarily make you
vulnerable if you do it right
• People already own these devices –
cost benefit
What Can Mobile Do?
What Would You Do
With Mobile Devices?
What Can Mobile Do?
Get Real Time Data
for Reports
What Can Mobile Do?
Instantly Submit and
Analyze Timesheets
What Can Mobile Do?
Track and Send
Emails About
Current Projects
or Jobs
What Can Mobile Do?
Monitor, Manage and
Track Equipment
What Can Mobile Do?
What Else Do You
Think It Can Do?
Here’s How ElectriCon* Used Mobile to
Advance Their Business…
*Name has been changed to protect the identity of the organization.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
We set up a wi-fi
enabled printer
accessible from
a briefcase.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
Now, they can print
change orders from
their mobile project
manager station.
We set up a wi-fi
enabled printer
accessible from
a briefcase.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
INSIDE SECRET:
Even if a device is mobile,
it CAN be secure!
Document Sharing And
Collaboration
Trend #2
What are your most
time consuming workflows?
What documents do you wish
you could instantly share?
Proposals
Change Orders
3 Common Workflows That Can Be
More Efficient from Document Sharing
Review/Signoff
Required Documents
Punch Lists
Field Logs
Document Sharing and Collaboration
Access to real-time information
•More accurate and efficient
•Staff Accountability
Document Sharing and Collaboration
Access to real-time information
More accurate and efficient
•Staff Accountability
Document Sharing and Collaboration
Access to real-time information
More accurate and efficient
Staff Accountability
Your Document Sharing
Setup Should…
1. Have a user-friendly interface
for employees.
2. Be integrated into your other
systems so you can collect
essential data.
Your Document Sharing
Setup Should…
1. Have a user-friendly interface
for employees.
2. Be integrated into your other
systems so you can collect
essential data.
The #1 concern for Maryland construction
contractors is automated integrations between
software tools like estimating, bid log,
scheduling, accounting, service, etc. in 2017.
-2017 Maryland Construction Industry Survey
How Can Document Sharing Solutions
Integrate Into Construction Workflows?
Project pictures with geolocation
and time stamps
Create quick change orders with signatures
Mobile stations for printing
essential documents on-the-go
Cyber Security
Trend
#3
For many companies, it’s
not a matter of if they’ll
get hacked, but when.
I doubt my construction
company will ever get
hacked. It seems too
unlikely.
31 out of 159 Maryland construction contractors
were hacked in 2017…so far.
-2017 Maryland Construction Industry Survey
“This year, we record the highest average
total cost of data breach at $7.35 million.”
“In 2013, the average cost of a data breach was only $5.40
million.”
“Malicious or criminal attacks continue to be the
primary cause of data breach.”
“52% of incidents involved a malicious or criminal attack, 24% of
incidents were caused by negligent employees, and another 24%
were caused by system glitches, including both IT and business
process failures.”
Not only is it expensive to deal
with a security breach…
You risk losing your essential data
and client files to malicious
entities.
You risk losing your essential data
and client files to malicious entities.
In many cases, after paying ransomware fees to a hacker who
encrypted your files, you will still lose your data.
The only way to prevent a loss of essential data is to make sure
your backup files are functioning correctly and are up-to-date.
A security breach can cost you
your credibility and reputation.
A security breach can cost you your
credibility and reputation.
Just ask Builders, Inc.* about
their security breach…
*Name has been changed to protect the identity of the organization.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
After going to the
link provided by
“Microsoft,” the
computer slowed
significantly.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
After going to the
link provided by
“Microsoft,” the
computer slowed
significantly.
They needed to act
fast! They unplugged
the computer while
we scanned their
network for malicious
activity.
INSIDE SECRET:
Your employees are a huge
threat to your security
Avoiding A Breach
• Your chance of being a victim of a
hack increases when you ignore
basic security practices.
• The #1 defense you have against a
hack is to educate yourself and your
employees on safe computer habits.
Social Media
Trend #4
Nearly two out of every ten contractors
say their business doesn’t use social
media and has no plans to start.
-2017 Maryland Construction Industry Survey
Here’s Why This Number Is Alarming…
Facebook (23%)
Twitter (12%)
LinkedIn (31%)
Instagram (3%)
YouTube (5%)
My company doesn't
use social media and
has no plans to start
My company doesn't
use social media, but
would like to start
Maryland contractors reported
using the following social media platforms:
My company doesn't
use social media and
has no plans to start
(9%)
My company doesn't
use social media, but
would like to start (17%)
4 Reasons Why Companies
Ignore Social Media
It takes time to manage
a social account
It seems risky to put
yourself out there publicly
It’s always possible
to get a bad review
It could be worthless if social
media goes “out of style”
4 Ways Companies Can Seriously
Benefit From Social Media
You can supplement your
one-on-one networking with
online word of mouth
A positive online presence builds
your company’s reputation
Building a solid reputation online can
attract better quality employees
Showcasing your community
involvement makes your
company even more likeable
Check out how these construction
companies promote their business online…
Some are posting pictures or videos to
showcase the jobs they’ve completed.
Others are
managing
online reviews
43% of Maryland contactors say they don’t think online reviews
impact whether a customer will do business with that company.
-2017 Maryland Construction Industry Survey
We
disagree.
INSIDE SECRET:
A bad review doesn’t have to
destroy your reputation.
Here’s what you need to know about reviews
#1: There is a way to handle a bad review
without compromising your reputation
#1: There is a way
to handle a bad
review without
compromising your
reputation
#2: Reviews can build a strong
reputation and establish trust
#2: Reviews can
build a strong
reputation and
establish trust
Best Practices For Building
A Social Media Presence
1. Identify your target demographic
Select the platform that reaches the
target demographic
Before setting up an account, find the right
social media account for your company
2.
2.8 billion people use social media
Use these demographics to find your first platform
Facebook
• Slightly more women
than men
• Best for reaching ages
18-49
LinkedIn
• Slightly more men
than women
• 45% of people who earn
$75k+ are using LinkedIn
Twitter
• Mostly oversaturated
• Predominantly male
• Mostly 18-20 year olds
Instagram
• Fastest growing
• Mostly female
• 90% of users are under 35
YouTube
• Video based
• Reaches more 35-49 year
olds than any cable network
in the U.S.
Choosing A Platform
1. Pick one platform to get started and
do it well
Explore Angie’s List and Yelp to start
building your online reviews
2.
1. Assign a person to manage the account
Monitor and engage. Be active by posting
at least weekly
Acknowledge and respond to both good
and bad reviews
Managing Your Social Account(s)
2.
3.
What is Virtual CIO?
Trend
#5
Virtual CIO
• Definition
• What do you get
• Benefits
• Rent construction equipment vs. virtual CIO
Signing up for Virtual CIO is essentially hiring an outside IT agent who
assesses your needs and figures out the right networking set up for you
111111111111
Why Use A
Virtual CIO?
111111111111
#1 goal of a Virtual
CIO is to
understand your
business’ needs.
111111111111
They’re experienced
in creating long-
term technology
goals.
111111111111
They’re ready to offer advice
on essential decisions, such
as whether you’re ready to
purchase or sign a monthly
subscription for technology
equipment and software.
111111111111
They help you from
the planning and
strategy stages to
the implementation
and maintenance
stages.
Do You Need Virtual CIO?
Contact Our Team
Bill Walter, MCP, MCSE, PMP
wwalter@gma-cpa.com
443.610.7413
Claim your free
2017 Maryland
Construction
Industry Survey
results here:
http://bit.ly/
2017-results

Weitere ähnliche Inhalte

Was ist angesagt?

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperJames Tanner
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsKim Jensen
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Blair Gately
 
Intelligent information: New Rules for Managing the Customer Experience
Intelligent information:  New Rules for Managing the Customer ExperienceIntelligent information:  New Rules for Managing the Customer Experience
Intelligent information: New Rules for Managing the Customer ExperienceJohn Mancini
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper FinalLarry Taylor Ph.D.
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being HumanClearswift
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...MZERMA Amine
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreatHammerNJ
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueResilient Systems
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersSarah K Miller
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING ijmvsc
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowTechSoup
 

Was ist angesagt? (19)

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Intelligent information: New Rules for Managing the Customer Experience
Intelligent information:  New Rules for Managing the Customer ExperienceIntelligent information:  New Rules for Managing the Customer Experience
Intelligent information: New Rules for Managing the Customer Experience
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 

Ähnlich wie 5 Technology Trends Construction Contractors Can't Afford To Ignore

Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application TriState Technology
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkRichard Common
 

Ähnlich wie 5 Technology Trends Construction Contractors Can't Afford To Ignore (20)

GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Data breach
Data breachData breach
Data breach
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 

Mehr von Gross, Mendelsohn & Associates

Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill WalterVirtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill WalterGross, Mendelsohn & Associates
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Gross, Mendelsohn & Associates
 
How To Leverage Sage Software To Become A Data-Driven Organization
How To Leverage Sage Software To Become A Data-Driven OrganizationHow To Leverage Sage Software To Become A Data-Driven Organization
How To Leverage Sage Software To Become A Data-Driven OrganizationGross, Mendelsohn & Associates
 
5 Essential Steps to Building a Better Board for Your Nonprofit
5 Essential Steps to Building a Better Board for Your Nonprofit5 Essential Steps to Building a Better Board for Your Nonprofit
5 Essential Steps to Building a Better Board for Your NonprofitGross, Mendelsohn & Associates
 
What Government Contractors Need to Do to Comply with New Employment Policies...
What Government Contractors Need to Do to Comply with New Employment Policies...What Government Contractors Need to Do to Comply with New Employment Policies...
What Government Contractors Need to Do to Comply with New Employment Policies...Gross, Mendelsohn & Associates
 
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Gross, Mendelsohn & Associates
 
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...Gross, Mendelsohn & Associates
 
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...Gross, Mendelsohn & Associates
 
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and FraudstersFraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and FraudstersGross, Mendelsohn & Associates
 

Mehr von Gross, Mendelsohn & Associates (20)

Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill WalterVirtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
 
Fall 2018 Microsoft Dynamics GP User Group
Fall 2018 Microsoft Dynamics GP User GroupFall 2018 Microsoft Dynamics GP User Group
Fall 2018 Microsoft Dynamics GP User Group
 
How To Leverage Sage Software To Become A Data-Driven Organization
How To Leverage Sage Software To Become A Data-Driven OrganizationHow To Leverage Sage Software To Become A Data-Driven Organization
How To Leverage Sage Software To Become A Data-Driven Organization
 
Maryland's Construction Industry Outlook (2017)
Maryland's Construction Industry Outlook (2017)Maryland's Construction Industry Outlook (2017)
Maryland's Construction Industry Outlook (2017)
 
Spring 2017 Sage 300 (Accpac) Users Group
Spring 2017 Sage 300 (Accpac) Users GroupSpring 2017 Sage 300 (Accpac) Users Group
Spring 2017 Sage 300 (Accpac) Users Group
 
Defending Against Modern Malware
Defending Against Modern MalwareDefending Against Modern Malware
Defending Against Modern Malware
 
Secrets of Successful Nonprofit Fundraising
Secrets of Successful Nonprofit FundraisingSecrets of Successful Nonprofit Fundraising
Secrets of Successful Nonprofit Fundraising
 
Success with Multiple Award Schedule (MAS) Contracts
Success with Multiple Award Schedule (MAS) ContractsSuccess with Multiple Award Schedule (MAS) Contracts
Success with Multiple Award Schedule (MAS) Contracts
 
Stock Options and Deferred Compensation in Divorce
Stock Options and Deferred Compensation in DivorceStock Options and Deferred Compensation in Divorce
Stock Options and Deferred Compensation in Divorce
 
5 Essential Steps to Building a Better Board for Your Nonprofit
5 Essential Steps to Building a Better Board for Your Nonprofit5 Essential Steps to Building a Better Board for Your Nonprofit
5 Essential Steps to Building a Better Board for Your Nonprofit
 
What Government Contractors Need to Do to Comply with New Employment Policies...
What Government Contractors Need to Do to Comply with New Employment Policies...What Government Contractors Need to Do to Comply with New Employment Policies...
What Government Contractors Need to Do to Comply with New Employment Policies...
 
Sage 300 (Accpac) Users Group Meeting
Sage 300 (Accpac) Users Group Meeting Sage 300 (Accpac) Users Group Meeting
Sage 300 (Accpac) Users Group Meeting
 
Microsoft Dynamics GP User Group
Microsoft Dynamics GP User GroupMicrosoft Dynamics GP User Group
Microsoft Dynamics GP User Group
 
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
 
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
 
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
 
Maryland’s 2016 Construction Industry Outlook
Maryland’s 2016 Construction Industry OutlookMaryland’s 2016 Construction Industry Outlook
Maryland’s 2016 Construction Industry Outlook
 
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and FraudstersFraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
 
Budgeting Basics for Nonprofits
Budgeting Basics for NonprofitsBudgeting Basics for Nonprofits
Budgeting Basics for Nonprofits
 

Kürzlich hochgeladen

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Kürzlich hochgeladen (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

5 Technology Trends Construction Contractors Can't Afford To Ignore

  • 1. 5 Technology Trends Construction Contractors Can’t Afford To Ignore
  • 2. Bill Walter, MCP, MCSE, PMP Principal with Gross Mendelsohn’s Technology Solutions Group
  • 3. What We’ll Cover 1. How to use mobile technology to keep workers connected. 2. Document sharing and collaboration with workflows and picture attachments. 3. Security measures to minimize threats like hacks, viruses, and data loss. 4. Why your business cannot afford to bypass social media. 5. The concept of a “virtual CIO” – what is it and do you need one?
  • 4. Watch the full seminar by following this link: http://bit.ly/construction-tech-trends
  • 6. 14% of Maryland construction contractors are concerned about field/mobile access to email, project management systems, electronic files, timesheets, etc. -2017 Maryland Construction Industry Survey Mobile (14%)
  • 7. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey
  • 8. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey 124 out of 159 answered yes 78%
  • 9. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey 35 out of 159 answered no 124 out of 159 answered yes 22% 78%
  • 10. If we know mobile technology can make our construction businesses more efficient, WHYSO RELUCTANT?
  • 12. BYOD: Bring Your Own Device • Allows access to the network even when not in the office • Doesn’t necessarily make you vulnerable if you do it right • People already own these devices – cost benefit
  • 13. What Can Mobile Do? What Would You Do With Mobile Devices?
  • 14. What Can Mobile Do? Get Real Time Data for Reports
  • 15. What Can Mobile Do? Instantly Submit and Analyze Timesheets
  • 16. What Can Mobile Do? Track and Send Emails About Current Projects or Jobs
  • 17. What Can Mobile Do? Monitor, Manage and Track Equipment
  • 18. What Can Mobile Do? What Else Do You Think It Can Do?
  • 19. Here’s How ElectriCon* Used Mobile to Advance Their Business… *Name has been changed to protect the identity of the organization.
  • 20. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 21. We set up a wi-fi enabled printer accessible from a briefcase. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 22. Now, they can print change orders from their mobile project manager station. We set up a wi-fi enabled printer accessible from a briefcase. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 23. INSIDE SECRET: Even if a device is mobile, it CAN be secure!
  • 25. What are your most time consuming workflows? What documents do you wish you could instantly share?
  • 26. Proposals Change Orders 3 Common Workflows That Can Be More Efficient from Document Sharing Review/Signoff Required Documents Punch Lists Field Logs
  • 27. Document Sharing and Collaboration Access to real-time information •More accurate and efficient •Staff Accountability
  • 28. Document Sharing and Collaboration Access to real-time information More accurate and efficient •Staff Accountability
  • 29. Document Sharing and Collaboration Access to real-time information More accurate and efficient Staff Accountability
  • 30. Your Document Sharing Setup Should… 1. Have a user-friendly interface for employees. 2. Be integrated into your other systems so you can collect essential data.
  • 31. Your Document Sharing Setup Should… 1. Have a user-friendly interface for employees. 2. Be integrated into your other systems so you can collect essential data.
  • 32. The #1 concern for Maryland construction contractors is automated integrations between software tools like estimating, bid log, scheduling, accounting, service, etc. in 2017. -2017 Maryland Construction Industry Survey
  • 33. How Can Document Sharing Solutions Integrate Into Construction Workflows?
  • 34. Project pictures with geolocation and time stamps
  • 35. Create quick change orders with signatures
  • 36. Mobile stations for printing essential documents on-the-go
  • 38. For many companies, it’s not a matter of if they’ll get hacked, but when. I doubt my construction company will ever get hacked. It seems too unlikely.
  • 39. 31 out of 159 Maryland construction contractors were hacked in 2017…so far. -2017 Maryland Construction Industry Survey
  • 40. “This year, we record the highest average total cost of data breach at $7.35 million.” “In 2013, the average cost of a data breach was only $5.40 million.”
  • 41. “Malicious or criminal attacks continue to be the primary cause of data breach.” “52% of incidents involved a malicious or criminal attack, 24% of incidents were caused by negligent employees, and another 24% were caused by system glitches, including both IT and business process failures.”
  • 42. Not only is it expensive to deal with a security breach…
  • 43. You risk losing your essential data and client files to malicious entities.
  • 44. You risk losing your essential data and client files to malicious entities. In many cases, after paying ransomware fees to a hacker who encrypted your files, you will still lose your data. The only way to prevent a loss of essential data is to make sure your backup files are functioning correctly and are up-to-date.
  • 45. A security breach can cost you your credibility and reputation.
  • 46. A security breach can cost you your credibility and reputation.
  • 47. Just ask Builders, Inc.* about their security breach… *Name has been changed to protect the identity of the organization.
  • 48. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue.
  • 49. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue. After going to the link provided by “Microsoft,” the computer slowed significantly.
  • 50. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue. After going to the link provided by “Microsoft,” the computer slowed significantly. They needed to act fast! They unplugged the computer while we scanned their network for malicious activity.
  • 51. INSIDE SECRET: Your employees are a huge threat to your security
  • 52. Avoiding A Breach • Your chance of being a victim of a hack increases when you ignore basic security practices. • The #1 defense you have against a hack is to educate yourself and your employees on safe computer habits.
  • 54. Nearly two out of every ten contractors say their business doesn’t use social media and has no plans to start. -2017 Maryland Construction Industry Survey
  • 55. Here’s Why This Number Is Alarming…
  • 56. Facebook (23%) Twitter (12%) LinkedIn (31%) Instagram (3%) YouTube (5%) My company doesn't use social media and has no plans to start My company doesn't use social media, but would like to start Maryland contractors reported using the following social media platforms: My company doesn't use social media and has no plans to start (9%) My company doesn't use social media, but would like to start (17%)
  • 57. 4 Reasons Why Companies Ignore Social Media
  • 58. It takes time to manage a social account
  • 59. It seems risky to put yourself out there publicly
  • 60. It’s always possible to get a bad review
  • 61. It could be worthless if social media goes “out of style”
  • 62. 4 Ways Companies Can Seriously Benefit From Social Media
  • 63. You can supplement your one-on-one networking with online word of mouth
  • 64. A positive online presence builds your company’s reputation
  • 65. Building a solid reputation online can attract better quality employees
  • 66. Showcasing your community involvement makes your company even more likeable
  • 67. Check out how these construction companies promote their business online…
  • 68. Some are posting pictures or videos to showcase the jobs they’ve completed.
  • 70. 43% of Maryland contactors say they don’t think online reviews impact whether a customer will do business with that company. -2017 Maryland Construction Industry Survey We disagree.
  • 71. INSIDE SECRET: A bad review doesn’t have to destroy your reputation.
  • 72. Here’s what you need to know about reviews
  • 73. #1: There is a way to handle a bad review without compromising your reputation
  • 74. #1: There is a way to handle a bad review without compromising your reputation
  • 75. #2: Reviews can build a strong reputation and establish trust
  • 76. #2: Reviews can build a strong reputation and establish trust
  • 77. Best Practices For Building A Social Media Presence
  • 78. 1. Identify your target demographic Select the platform that reaches the target demographic Before setting up an account, find the right social media account for your company 2.
  • 79. 2.8 billion people use social media
  • 80. Use these demographics to find your first platform Facebook • Slightly more women than men • Best for reaching ages 18-49 LinkedIn • Slightly more men than women • 45% of people who earn $75k+ are using LinkedIn Twitter • Mostly oversaturated • Predominantly male • Mostly 18-20 year olds Instagram • Fastest growing • Mostly female • 90% of users are under 35 YouTube • Video based • Reaches more 35-49 year olds than any cable network in the U.S.
  • 81. Choosing A Platform 1. Pick one platform to get started and do it well Explore Angie’s List and Yelp to start building your online reviews 2.
  • 82. 1. Assign a person to manage the account Monitor and engage. Be active by posting at least weekly Acknowledge and respond to both good and bad reviews Managing Your Social Account(s) 2. 3.
  • 83. What is Virtual CIO? Trend #5
  • 84. Virtual CIO • Definition • What do you get • Benefits • Rent construction equipment vs. virtual CIO Signing up for Virtual CIO is essentially hiring an outside IT agent who assesses your needs and figures out the right networking set up for you
  • 86. 111111111111 #1 goal of a Virtual CIO is to understand your business’ needs.
  • 87. 111111111111 They’re experienced in creating long- term technology goals.
  • 88. 111111111111 They’re ready to offer advice on essential decisions, such as whether you’re ready to purchase or sign a monthly subscription for technology equipment and software.
  • 89. 111111111111 They help you from the planning and strategy stages to the implementation and maintenance stages.
  • 90. Do You Need Virtual CIO?
  • 91. Contact Our Team Bill Walter, MCP, MCSE, PMP wwalter@gma-cpa.com 443.610.7413 Claim your free 2017 Maryland Construction Industry Survey results here: http://bit.ly/ 2017-results