Blog

  • November 03, 2017

    Cyber Insurance – a loophole you need to know about

    Hacking has hit the headlines in the last years and insurance policies to protect businesses against damage and lawsuits have become a very lucrative business indeed. Your company may already have cyber insurance, and that’s a good thing. But that doesn’t mean you don’t have a job to do or that the insurance will cover […]

    Full Article.....
  • October 25, 2017

    Field Integrated Time (F.I.T.), Mobile Devices, and Sage 100 Contractor

    In the May issue of Construction Today, there’s an article on ‘The New Age’ of mobile work coming to the construction industry. We’re already helping our clients collect field time from mobile devices, and we’re fully integrated (really!) with Sage 100 Contractor version 20. For many years, we’ve empathized with the office as they try […]

    Full Article.....
  • October 19, 2017

    Log On Credentials – Compromised! Now What?

    So you’ve heard about all the big companies that have been hacked – Yahoo, Equifax, Target, and on the list goes.  What does that have to do with your business?  I’d like to tell you, and this is important. We know that many of the people who work for you use the same password at […]

    Full Article.....
  • October 13, 2017

    Comcast and AT&T are NOT IT Companies

    Internet Service Providers (ISP’s) bring the internet and sometimes phone service to your business and home.  These are a critical services – their technicians are delivering a specific solution to you but they are NOT equipped to support your company network, and that starts with the firewall. The firewall is your first line of defense […]

    Full Article.....
  • September 29, 2017

    Get Off Your “But” by Sean Stephenson

    Earlier this year, I had the chance to hear and see Sean Stephenson. The first thing he does is address the elephant in the room—he’s confined to a wheel chair, has a rare brittle bone syndrome, needs assistance for everyday tasks, and has a fulfilling and blessed life! It’s really hard to listen to Sean […]

    Full Article.....
  • September 22, 2017

    Which Backup Solution You Choose DOES Matter!

    We started working with an out-of-state client and they said they’ve paid the ransom twice so far. Another recent client had a good backup, but it took 3 weeks to restore their data from the cloud. Add it up – if your office had to be down for just one full day, how many man-hours […]

    Full Article.....
  • September 21, 2017

    Technology Tips – CFMA and Syscon are Singing the Same Tune

    On a recent flight back from a client on-site training out of state, I had a chance to catch up on some of my reading. I’ve been a member of the CFMA (Construction Financial Managers Association) for a while, most recently with the Valley of the Sun (VoS) chapter after many years with the Chicago […]

    Full Article.....
  • September 15, 2017

    Bring Your Own Device (BYOD); a Culture Trend

    There’s a growing trend that has some great benefits for the employer and the employee – everyone uses their own personal device at work. This is less expensive for the company and cuts down on tracking equipment; employees get to pick equipment based on their own preferences and personal desires. Before you jump on board, […]

    Full Article.....
  • September 08, 2017

    The Dark Web

    This is the latest ‘buzz word’ in the IT industry – the Dark Web. It’s an underground world that is making a TON of money tricking you into giving up your passwords, holding your data for ransom, using your credit cards to buy things, and stealing money out of your bank accounts. This is not […]

    Full Article.....
  • September 01, 2017

    Security You Can Control: Firewalls, USB’s

    Did you know that business-class firewalls allow country blocking? We’ve seen a HUGE increase in hacking attempts from other countries, always a concern, but a very big increase of late. Blocking specific countries through a firewall is a great way to severely limit hacking attempts. Your firewall uses a lot of resources to ward off […]

    Full Article.....