SlideShare una empresa de Scribd logo
1 de 91
Descargar para leer sin conexión
5 Technology Trends Construction
Contractors Can’t Afford To Ignore
Bill Walter, MCP, MCSE, PMP
Principal with Gross Mendelsohn’s
Technology Solutions Group
What We’ll Cover
1. How to use mobile technology to keep workers connected.
2. Document sharing and collaboration with workflows and picture
attachments.
3. Security measures to minimize threats like hacks, viruses, and data loss.
4. Why your business cannot afford to bypass social media.
5. The concept of a “virtual CIO” – what is it and do you need one?
Watch the full seminar by
following this link:
http://bit.ly/construction-tech-trends
Mobile Technology
4:3282%
Trend
#1
14% of Maryland
construction contractors are
concerned about field/mobile
access to email, project
management systems,
electronic files, timesheets,
etc.
-2017 Maryland Construction Industry Survey
Mobile (14%)
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
124 out of 159
answered yes
78%
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
35 out of 159
answered no
124 out of 159
answered yes
22% 78%
If we know mobile technology can make our construction businesses more efficient,
WHYSO RELUCTANT?
What’s Considered Mobile?
Phones
Tablets
Laptops
Wearables
BYOD:
Bring Your Own Device
• Allows access to the network even
when not in the office
• Doesn’t necessarily make you
vulnerable if you do it right
• People already own these devices –
cost benefit
What Can Mobile Do?
What Would You Do
With Mobile Devices?
What Can Mobile Do?
Get Real Time Data
for Reports
What Can Mobile Do?
Instantly Submit and
Analyze Timesheets
What Can Mobile Do?
Track and Send
Emails About
Current Projects
or Jobs
What Can Mobile Do?
Monitor, Manage and
Track Equipment
What Can Mobile Do?
What Else Do You
Think It Can Do?
Here’s How ElectriCon* Used Mobile to
Advance Their Business…
*Name has been changed to protect the identity of the organization.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
We set up a wi-fi
enabled printer
accessible from
a briefcase.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
Now, they can print
change orders from
their mobile project
manager station.
We set up a wi-fi
enabled printer
accessible from
a briefcase.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
INSIDE SECRET:
Even if a device is mobile,
it CAN be secure!
Document Sharing And
Collaboration
Trend #2
What are your most
time consuming workflows?
What documents do you wish
you could instantly share?
Proposals
Change Orders
3 Common Workflows That Can Be
More Efficient from Document Sharing
Review/Signoff
Required Documents
Punch Lists
Field Logs
Document Sharing and Collaboration
Access to real-time information
•More accurate and efficient
•Staff Accountability
Document Sharing and Collaboration
Access to real-time information
More accurate and efficient
•Staff Accountability
Document Sharing and Collaboration
Access to real-time information
More accurate and efficient
Staff Accountability
Your Document Sharing
Setup Should…
1. Have a user-friendly interface
for employees.
2. Be integrated into your other
systems so you can collect
essential data.
Your Document Sharing
Setup Should…
1. Have a user-friendly interface
for employees.
2. Be integrated into your other
systems so you can collect
essential data.
The #1 concern for Maryland construction
contractors is automated integrations between
software tools like estimating, bid log,
scheduling, accounting, service, etc. in 2017.
-2017 Maryland Construction Industry Survey
How Can Document Sharing Solutions
Integrate Into Construction Workflows?
Project pictures with geolocation
and time stamps
Create quick change orders with signatures
Mobile stations for printing
essential documents on-the-go
Cyber Security
Trend
#3
For many companies, it’s
not a matter of if they’ll
get hacked, but when.
I doubt my construction
company will ever get
hacked. It seems too
unlikely.
31 out of 159 Maryland construction contractors
were hacked in 2017…so far.
-2017 Maryland Construction Industry Survey
“This year, we record the highest average
total cost of data breach at $7.35 million.”
“In 2013, the average cost of a data breach was only $5.40
million.”
“Malicious or criminal attacks continue to be the
primary cause of data breach.”
“52% of incidents involved a malicious or criminal attack, 24% of
incidents were caused by negligent employees, and another 24%
were caused by system glitches, including both IT and business
process failures.”
Not only is it expensive to deal
with a security breach…
You risk losing your essential data
and client files to malicious
entities.
You risk losing your essential data
and client files to malicious entities.
In many cases, after paying ransomware fees to a hacker who
encrypted your files, you will still lose your data.
The only way to prevent a loss of essential data is to make sure
your backup files are functioning correctly and are up-to-date.
A security breach can cost you
your credibility and reputation.
A security breach can cost you your
credibility and reputation.
Just ask Builders, Inc.* about
their security breach…
*Name has been changed to protect the identity of the organization.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
After going to the
link provided by
“Microsoft,” the
computer slowed
significantly.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
After going to the
link provided by
“Microsoft,” the
computer slowed
significantly.
They needed to act
fast! They unplugged
the computer while
we scanned their
network for malicious
activity.
INSIDE SECRET:
Your employees are a huge
threat to your security
Avoiding A Breach
• Your chance of being a victim of a
hack increases when you ignore
basic security practices.
• The #1 defense you have against a
hack is to educate yourself and your
employees on safe computer habits.
Social Media
Trend #4
Nearly two out of every ten contractors
say their business doesn’t use social
media and has no plans to start.
-2017 Maryland Construction Industry Survey
Here’s Why This Number Is Alarming…
Facebook (23%)
Twitter (12%)
LinkedIn (31%)
Instagram (3%)
YouTube (5%)
My company doesn't
use social media and
has no plans to start
My company doesn't
use social media, but
would like to start
Maryland contractors reported
using the following social media platforms:
My company doesn't
use social media and
has no plans to start
(9%)
My company doesn't
use social media, but
would like to start (17%)
4 Reasons Why Companies
Ignore Social Media
It takes time to manage
a social account
It seems risky to put
yourself out there publicly
It’s always possible
to get a bad review
It could be worthless if social
media goes “out of style”
4 Ways Companies Can Seriously
Benefit From Social Media
You can supplement your
one-on-one networking with
online word of mouth
A positive online presence builds
your company’s reputation
Building a solid reputation online can
attract better quality employees
Showcasing your community
involvement makes your
company even more likeable
Check out how these construction
companies promote their business online…
Some are posting pictures or videos to
showcase the jobs they’ve completed.
Others are
managing
online reviews
43% of Maryland contactors say they don’t think online reviews
impact whether a customer will do business with that company.
-2017 Maryland Construction Industry Survey
We
disagree.
INSIDE SECRET:
A bad review doesn’t have to
destroy your reputation.
Here’s what you need to know about reviews
#1: There is a way to handle a bad review
without compromising your reputation
#1: There is a way
to handle a bad
review without
compromising your
reputation
#2: Reviews can build a strong
reputation and establish trust
#2: Reviews can
build a strong
reputation and
establish trust
Best Practices For Building
A Social Media Presence
1. Identify your target demographic
Select the platform that reaches the
target demographic
Before setting up an account, find the right
social media account for your company
2.
2.8 billion people use social media
Use these demographics to find your first platform
Facebook
• Slightly more women
than men
• Best for reaching ages
18-49
LinkedIn
• Slightly more men
than women
• 45% of people who earn
$75k+ are using LinkedIn
Twitter
• Mostly oversaturated
• Predominantly male
• Mostly 18-20 year olds
Instagram
• Fastest growing
• Mostly female
• 90% of users are under 35
YouTube
• Video based
• Reaches more 35-49 year
olds than any cable network
in the U.S.
Choosing A Platform
1. Pick one platform to get started and
do it well
Explore Angie’s List and Yelp to start
building your online reviews
2.
1. Assign a person to manage the account
Monitor and engage. Be active by posting
at least weekly
Acknowledge and respond to both good
and bad reviews
Managing Your Social Account(s)
2.
3.
What is Virtual CIO?
Trend
#5
Virtual CIO
• Definition
• What do you get
• Benefits
• Rent construction equipment vs. virtual CIO
Signing up for Virtual CIO is essentially hiring an outside IT agent who
assesses your needs and figures out the right networking set up for you
111111111111
Why Use A
Virtual CIO?
111111111111
#1 goal of a Virtual
CIO is to
understand your
business’ needs.
111111111111
They’re experienced
in creating long-
term technology
goals.
111111111111
They’re ready to offer advice
on essential decisions, such
as whether you’re ready to
purchase or sign a monthly
subscription for technology
equipment and software.
111111111111
They help you from
the planning and
strategy stages to
the implementation
and maintenance
stages.
Do You Need Virtual CIO?
Contact Our Team
Bill Walter, MCP, MCSE, PMP
wwalter@gma-cpa.com
443.610.7413
Claim your free
2017 Maryland
Construction
Industry Survey
results here:
http://bit.ly/
2017-results

Más contenido relacionado

La actualidad más candente

Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
Blair Gately
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
Larry Taylor Ph.D.
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
Casey Fleming
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
HammerNJ
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Patricia M Watson
 

La actualidad más candente (19)

Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Forcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security PredictionsForcepoint Whitepaper 2016 Security Predictions
Forcepoint Whitepaper 2016 Security Predictions
 
Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014Raytheon-NCSA_Millennial_Survey_report_2014
Raytheon-NCSA_Millennial_Survey_report_2014
 
Intelligent information: New Rules for Managing the Customer Experience
Intelligent information:  New Rules for Managing the Customer ExperienceIntelligent information:  New Rules for Managing the Customer Experience
Intelligent information: New Rules for Managing the Customer Experience
 
2010 6 Things u need 2 know in 2010 Whitepaper Final
2010  6 Things u need 2 know in 2010 Whitepaper Final2010  6 Things u need 2 know in 2010 Whitepaper Final
2010 6 Things u need 2 know in 2010 Whitepaper Final
 
The CISO’s Guide to Being Human
The CISO’s Guide to Being HumanThe CISO’s Guide to Being Human
The CISO’s Guide to Being Human
 
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
 
BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
Cybersecurity for Emergency Managers
Cybersecurity for Emergency ManagersCybersecurity for Emergency Managers
Cybersecurity for Emergency Managers
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Security and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to KnowSecurity and Privacy: What Nonprofits Need to Know
Security and Privacy: What Nonprofits Need to Know
 

Similar a 5 Technology Trends Construction Contractors Can't Afford To Ignore

12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 

Similar a 5 Technology Trends Construction Contractors Can't Afford To Ignore (20)

GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams 5 Questions Executives Should Be Asking Their Security Teams
5 Questions Executives Should Be Asking Their Security Teams
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSCybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
 
Top 12 Threats to Enterprise
Top 12 Threats to EnterpriseTop 12 Threats to Enterprise
Top 12 Threats to Enterprise
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Data breach
Data breachData breach
Data breach
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Insiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest LinkInsiders Guide to Social Engineering - End-Users are the Weakest Link
Insiders Guide to Social Engineering - End-Users are the Weakest Link
 

Más de Gross, Mendelsohn & Associates

Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Gross, Mendelsohn & Associates
 

Más de Gross, Mendelsohn & Associates (20)

Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill WalterVirtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
 
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...Business Intelligence and Data Security for Long-Term Care Financial Professi...
Business Intelligence and Data Security for Long-Term Care Financial Professi...
 
Fall 2018 Microsoft Dynamics GP User Group
Fall 2018 Microsoft Dynamics GP User GroupFall 2018 Microsoft Dynamics GP User Group
Fall 2018 Microsoft Dynamics GP User Group
 
How To Leverage Sage Software To Become A Data-Driven Organization
How To Leverage Sage Software To Become A Data-Driven OrganizationHow To Leverage Sage Software To Become A Data-Driven Organization
How To Leverage Sage Software To Become A Data-Driven Organization
 
Maryland's Construction Industry Outlook (2017)
Maryland's Construction Industry Outlook (2017)Maryland's Construction Industry Outlook (2017)
Maryland's Construction Industry Outlook (2017)
 
Spring 2017 Sage 300 (Accpac) Users Group
Spring 2017 Sage 300 (Accpac) Users GroupSpring 2017 Sage 300 (Accpac) Users Group
Spring 2017 Sage 300 (Accpac) Users Group
 
Defending Against Modern Malware
Defending Against Modern MalwareDefending Against Modern Malware
Defending Against Modern Malware
 
Secrets of Successful Nonprofit Fundraising
Secrets of Successful Nonprofit FundraisingSecrets of Successful Nonprofit Fundraising
Secrets of Successful Nonprofit Fundraising
 
Success with Multiple Award Schedule (MAS) Contracts
Success with Multiple Award Schedule (MAS) ContractsSuccess with Multiple Award Schedule (MAS) Contracts
Success with Multiple Award Schedule (MAS) Contracts
 
Stock Options and Deferred Compensation in Divorce
Stock Options and Deferred Compensation in DivorceStock Options and Deferred Compensation in Divorce
Stock Options and Deferred Compensation in Divorce
 
5 Essential Steps to Building a Better Board for Your Nonprofit
5 Essential Steps to Building a Better Board for Your Nonprofit5 Essential Steps to Building a Better Board for Your Nonprofit
5 Essential Steps to Building a Better Board for Your Nonprofit
 
What Government Contractors Need to Do to Comply with New Employment Policies...
What Government Contractors Need to Do to Comply with New Employment Policies...What Government Contractors Need to Do to Comply with New Employment Policies...
What Government Contractors Need to Do to Comply with New Employment Policies...
 
Sage 300 (Accpac) Users Group Meeting
Sage 300 (Accpac) Users Group Meeting Sage 300 (Accpac) Users Group Meeting
Sage 300 (Accpac) Users Group Meeting
 
Microsoft Dynamics GP User Group
Microsoft Dynamics GP User GroupMicrosoft Dynamics GP User Group
Microsoft Dynamics GP User Group
 
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
 
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
 
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
 
Maryland’s 2016 Construction Industry Outlook
Maryland’s 2016 Construction Industry OutlookMaryland’s 2016 Construction Industry Outlook
Maryland’s 2016 Construction Industry Outlook
 
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and FraudstersFraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
 
Budgeting Basics for Nonprofits
Budgeting Basics for NonprofitsBudgeting Basics for Nonprofits
Budgeting Basics for Nonprofits
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

5 Technology Trends Construction Contractors Can't Afford To Ignore

  • 1. 5 Technology Trends Construction Contractors Can’t Afford To Ignore
  • 2. Bill Walter, MCP, MCSE, PMP Principal with Gross Mendelsohn’s Technology Solutions Group
  • 3. What We’ll Cover 1. How to use mobile technology to keep workers connected. 2. Document sharing and collaboration with workflows and picture attachments. 3. Security measures to minimize threats like hacks, viruses, and data loss. 4. Why your business cannot afford to bypass social media. 5. The concept of a “virtual CIO” – what is it and do you need one?
  • 4. Watch the full seminar by following this link: http://bit.ly/construction-tech-trends
  • 6. 14% of Maryland construction contractors are concerned about field/mobile access to email, project management systems, electronic files, timesheets, etc. -2017 Maryland Construction Industry Survey Mobile (14%)
  • 7. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey
  • 8. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey 124 out of 159 answered yes 78%
  • 9. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey 35 out of 159 answered no 124 out of 159 answered yes 22% 78%
  • 10. If we know mobile technology can make our construction businesses more efficient, WHYSO RELUCTANT?
  • 12. BYOD: Bring Your Own Device • Allows access to the network even when not in the office • Doesn’t necessarily make you vulnerable if you do it right • People already own these devices – cost benefit
  • 13. What Can Mobile Do? What Would You Do With Mobile Devices?
  • 14. What Can Mobile Do? Get Real Time Data for Reports
  • 15. What Can Mobile Do? Instantly Submit and Analyze Timesheets
  • 16. What Can Mobile Do? Track and Send Emails About Current Projects or Jobs
  • 17. What Can Mobile Do? Monitor, Manage and Track Equipment
  • 18. What Can Mobile Do? What Else Do You Think It Can Do?
  • 19. Here’s How ElectriCon* Used Mobile to Advance Their Business… *Name has been changed to protect the identity of the organization.
  • 20. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 21. We set up a wi-fi enabled printer accessible from a briefcase. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 22. Now, they can print change orders from their mobile project manager station. We set up a wi-fi enabled printer accessible from a briefcase. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 23. INSIDE SECRET: Even if a device is mobile, it CAN be secure!
  • 25. What are your most time consuming workflows? What documents do you wish you could instantly share?
  • 26. Proposals Change Orders 3 Common Workflows That Can Be More Efficient from Document Sharing Review/Signoff Required Documents Punch Lists Field Logs
  • 27. Document Sharing and Collaboration Access to real-time information •More accurate and efficient •Staff Accountability
  • 28. Document Sharing and Collaboration Access to real-time information More accurate and efficient •Staff Accountability
  • 29. Document Sharing and Collaboration Access to real-time information More accurate and efficient Staff Accountability
  • 30. Your Document Sharing Setup Should… 1. Have a user-friendly interface for employees. 2. Be integrated into your other systems so you can collect essential data.
  • 31. Your Document Sharing Setup Should… 1. Have a user-friendly interface for employees. 2. Be integrated into your other systems so you can collect essential data.
  • 32. The #1 concern for Maryland construction contractors is automated integrations between software tools like estimating, bid log, scheduling, accounting, service, etc. in 2017. -2017 Maryland Construction Industry Survey
  • 33. How Can Document Sharing Solutions Integrate Into Construction Workflows?
  • 34. Project pictures with geolocation and time stamps
  • 35. Create quick change orders with signatures
  • 36. Mobile stations for printing essential documents on-the-go
  • 38. For many companies, it’s not a matter of if they’ll get hacked, but when. I doubt my construction company will ever get hacked. It seems too unlikely.
  • 39. 31 out of 159 Maryland construction contractors were hacked in 2017…so far. -2017 Maryland Construction Industry Survey
  • 40. “This year, we record the highest average total cost of data breach at $7.35 million.” “In 2013, the average cost of a data breach was only $5.40 million.”
  • 41. “Malicious or criminal attacks continue to be the primary cause of data breach.” “52% of incidents involved a malicious or criminal attack, 24% of incidents were caused by negligent employees, and another 24% were caused by system glitches, including both IT and business process failures.”
  • 42. Not only is it expensive to deal with a security breach…
  • 43. You risk losing your essential data and client files to malicious entities.
  • 44. You risk losing your essential data and client files to malicious entities. In many cases, after paying ransomware fees to a hacker who encrypted your files, you will still lose your data. The only way to prevent a loss of essential data is to make sure your backup files are functioning correctly and are up-to-date.
  • 45. A security breach can cost you your credibility and reputation.
  • 46. A security breach can cost you your credibility and reputation.
  • 47. Just ask Builders, Inc.* about their security breach… *Name has been changed to protect the identity of the organization.
  • 48. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue.
  • 49. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue. After going to the link provided by “Microsoft,” the computer slowed significantly.
  • 50. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue. After going to the link provided by “Microsoft,” the computer slowed significantly. They needed to act fast! They unplugged the computer while we scanned their network for malicious activity.
  • 51. INSIDE SECRET: Your employees are a huge threat to your security
  • 52. Avoiding A Breach • Your chance of being a victim of a hack increases when you ignore basic security practices. • The #1 defense you have against a hack is to educate yourself and your employees on safe computer habits.
  • 54. Nearly two out of every ten contractors say their business doesn’t use social media and has no plans to start. -2017 Maryland Construction Industry Survey
  • 55. Here’s Why This Number Is Alarming…
  • 56. Facebook (23%) Twitter (12%) LinkedIn (31%) Instagram (3%) YouTube (5%) My company doesn't use social media and has no plans to start My company doesn't use social media, but would like to start Maryland contractors reported using the following social media platforms: My company doesn't use social media and has no plans to start (9%) My company doesn't use social media, but would like to start (17%)
  • 57. 4 Reasons Why Companies Ignore Social Media
  • 58. It takes time to manage a social account
  • 59. It seems risky to put yourself out there publicly
  • 60. It’s always possible to get a bad review
  • 61. It could be worthless if social media goes “out of style”
  • 62. 4 Ways Companies Can Seriously Benefit From Social Media
  • 63. You can supplement your one-on-one networking with online word of mouth
  • 64. A positive online presence builds your company’s reputation
  • 65. Building a solid reputation online can attract better quality employees
  • 66. Showcasing your community involvement makes your company even more likeable
  • 67. Check out how these construction companies promote their business online…
  • 68. Some are posting pictures or videos to showcase the jobs they’ve completed.
  • 70. 43% of Maryland contactors say they don’t think online reviews impact whether a customer will do business with that company. -2017 Maryland Construction Industry Survey We disagree.
  • 71. INSIDE SECRET: A bad review doesn’t have to destroy your reputation.
  • 72. Here’s what you need to know about reviews
  • 73. #1: There is a way to handle a bad review without compromising your reputation
  • 74. #1: There is a way to handle a bad review without compromising your reputation
  • 75. #2: Reviews can build a strong reputation and establish trust
  • 76. #2: Reviews can build a strong reputation and establish trust
  • 77. Best Practices For Building A Social Media Presence
  • 78. 1. Identify your target demographic Select the platform that reaches the target demographic Before setting up an account, find the right social media account for your company 2.
  • 79. 2.8 billion people use social media
  • 80. Use these demographics to find your first platform Facebook • Slightly more women than men • Best for reaching ages 18-49 LinkedIn • Slightly more men than women • 45% of people who earn $75k+ are using LinkedIn Twitter • Mostly oversaturated • Predominantly male • Mostly 18-20 year olds Instagram • Fastest growing • Mostly female • 90% of users are under 35 YouTube • Video based • Reaches more 35-49 year olds than any cable network in the U.S.
  • 81. Choosing A Platform 1. Pick one platform to get started and do it well Explore Angie’s List and Yelp to start building your online reviews 2.
  • 82. 1. Assign a person to manage the account Monitor and engage. Be active by posting at least weekly Acknowledge and respond to both good and bad reviews Managing Your Social Account(s) 2. 3.
  • 83. What is Virtual CIO? Trend #5
  • 84. Virtual CIO • Definition • What do you get • Benefits • Rent construction equipment vs. virtual CIO Signing up for Virtual CIO is essentially hiring an outside IT agent who assesses your needs and figures out the right networking set up for you
  • 86. 111111111111 #1 goal of a Virtual CIO is to understand your business’ needs.
  • 87. 111111111111 They’re experienced in creating long- term technology goals.
  • 88. 111111111111 They’re ready to offer advice on essential decisions, such as whether you’re ready to purchase or sign a monthly subscription for technology equipment and software.
  • 89. 111111111111 They help you from the planning and strategy stages to the implementation and maintenance stages.
  • 90. Do You Need Virtual CIO?
  • 91. Contact Our Team Bill Walter, MCP, MCSE, PMP wwalter@gma-cpa.com 443.610.7413 Claim your free 2017 Maryland Construction Industry Survey results here: http://bit.ly/ 2017-results