5 Technology Trends Construction
Contractors Can’t Afford To Ignore
Bill Walter, MCP, MCSE, PMP
Principal with Gross Mendelsohn’s
Technology Solutions Group
What We’ll Cover
1. How to use mobile technology to keep workers connected.
2. Document sharing and collaboration with workflows and picture
attachments.
3. Security measures to minimize threats like hacks, viruses, and data loss.
4. Why your business cannot afford to bypass social media.
5. The concept of a “virtual CIO” – what is it and do you need one?
Watch the full seminar by
following this link:
http://bit.ly/construction-tech-trends
Mobile Technology
4:3282%
Trend
#1
14% of Maryland
construction contractors are
concerned about field/mobile
access to email, project
management systems,
electronic files, timesheets,
etc.
-2017 Maryland Construction Industry Survey
Mobile (14%)
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
124 out of 159
answered yes
78%
Does your business take advantage of mobile
technology (electronic timesheets, email communication
between onsite jobs and office, etc.)?
-2017 Maryland Construction Industry Survey
35 out of 159
answered no
124 out of 159
answered yes
22% 78%
If we know mobile technology can make our construction businesses more efficient,
WHYSO RELUCTANT?
What’s Considered Mobile?
Phones
Tablets
Laptops
Wearables
BYOD:
Bring Your Own Device
• Allows access to the network even
when not in the office
• Doesn’t necessarily make you
vulnerable if you do it right
• People already own these devices –
cost benefit
What Can Mobile Do?
What Would You Do
With Mobile Devices?
What Can Mobile Do?
Get Real Time Data
for Reports
What Can Mobile Do?
Instantly Submit and
Analyze Timesheets
What Can Mobile Do?
Track and Send
Emails About
Current Projects
or Jobs
What Can Mobile Do?
Monitor, Manage and
Track Equipment
What Can Mobile Do?
What Else Do You
Think It Can Do?
Here’s How ElectriCon* Used Mobile to
Advance Their Business…
*Name has been changed to protect the identity of the organization.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
We set up a wi-fi
enabled printer
accessible from
a briefcase.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
Now, they can print
change orders from
their mobile project
manager station.
We set up a wi-fi
enabled printer
accessible from
a briefcase.
ElectriCon’s Mobile Setup
ElectriCon
needed a way to
print essential
documents on-
the-go.
INSIDE SECRET:
Even if a device is mobile,
it CAN be secure!
Document Sharing And
Collaboration
Trend #2
What are your most
time consuming workflows?
What documents do you wish
you could instantly share?
Proposals
Change Orders
3 Common Workflows That Can Be
More Efficient from Document Sharing
Review/Signoff
Required Documents
Punch Lists
Field Logs
Document Sharing and Collaboration
Access to real-time information
•More accurate and efficient
•Staff Accountability
Document Sharing and Collaboration
Access to real-time information
More accurate and efficient
•Staff Accountability
Document Sharing and Collaboration
Access to real-time information
More accurate and efficient
Staff Accountability
Your Document Sharing
Setup Should…
1. Have a user-friendly interface
for employees.
2. Be integrated into your other
systems so you can collect
essential data.
Your Document Sharing
Setup Should…
1. Have a user-friendly interface
for employees.
2. Be integrated into your other
systems so you can collect
essential data.
The #1 concern for Maryland construction
contractors is automated integrations between
software tools like estimating, bid log,
scheduling, accounting, service, etc. in 2017.
-2017 Maryland Construction Industry Survey
How Can Document Sharing Solutions
Integrate Into Construction Workflows?
Project pictures with geolocation
and time stamps
Create quick change orders with signatures
Mobile stations for printing
essential documents on-the-go
Cyber Security
Trend
#3
For many companies, it’s
not a matter of if they’ll
get hacked, but when.
I doubt my construction
company will ever get
hacked. It seems too
unlikely.
31 out of 159 Maryland construction contractors
were hacked in 2017…so far.
-2017 Maryland Construction Industry Survey
“This year, we record the highest average
total cost of data breach at $7.35 million.”
“In 2013, the average cost of a data breach was only $5.40
million.”
“Malicious or criminal attacks continue to be the
primary cause of data breach.”
“52% of incidents involved a malicious or criminal attack, 24% of
incidents were caused by negligent employees, and another 24%
were caused by system glitches, including both IT and business
process failures.”
Not only is it expensive to deal
with a security breach…
You risk losing your essential data
and client files to malicious
entities.
You risk losing your essential data
and client files to malicious entities.
In many cases, after paying ransomware fees to a hacker who
encrypted your files, you will still lose your data.
The only way to prevent a loss of essential data is to make sure
your backup files are functioning correctly and are up-to-date.
A security breach can cost you
your credibility and reputation.
A security breach can cost you your
credibility and reputation.
Just ask Builders, Inc.* about
their security breach…
*Name has been changed to protect the identity of the organization.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
After going to the
link provided by
“Microsoft,” the
computer slowed
significantly.
The Hack At Builders, Inc.
Builders, Inc. gets
a call from
“Microsoft”
saying they need
to fix a computer
issue.
After going to the
link provided by
“Microsoft,” the
computer slowed
significantly.
They needed to act
fast! They unplugged
the computer while
we scanned their
network for malicious
activity.
INSIDE SECRET:
Your employees are a huge
threat to your security
Avoiding A Breach
• Your chance of being a victim of a
hack increases when you ignore
basic security practices.
• The #1 defense you have against a
hack is to educate yourself and your
employees on safe computer habits.
Social Media
Trend #4
Nearly two out of every ten contractors
say their business doesn’t use social
media and has no plans to start.
-2017 Maryland Construction Industry Survey
Here’s Why This Number Is Alarming…
Facebook (23%)
Twitter (12%)
LinkedIn (31%)
Instagram (3%)
YouTube (5%)
My company doesn't
use social media and
has no plans to start
My company doesn't
use social media, but
would like to start
Maryland contractors reported
using the following social media platforms:
My company doesn't
use social media and
has no plans to start
(9%)
My company doesn't
use social media, but
would like to start (17%)
4 Reasons Why Companies
Ignore Social Media
It takes time to manage
a social account
It seems risky to put
yourself out there publicly
It’s always possible
to get a bad review
It could be worthless if social
media goes “out of style”
4 Ways Companies Can Seriously
Benefit From Social Media
You can supplement your
one-on-one networking with
online word of mouth
A positive online presence builds
your company’s reputation
Building a solid reputation online can
attract better quality employees
Showcasing your community
involvement makes your
company even more likeable
Check out how these construction
companies promote their business online…
Some are posting pictures or videos to
showcase the jobs they’ve completed.
Others are
managing
online reviews
43% of Maryland contactors say they don’t think online reviews
impact whether a customer will do business with that company.
-2017 Maryland Construction Industry Survey
We
disagree.
INSIDE SECRET:
A bad review doesn’t have to
destroy your reputation.
Here’s what you need to know about reviews
#1: There is a way to handle a bad review
without compromising your reputation
#1: There is a way
to handle a bad
review without
compromising your
reputation
#2: Reviews can build a strong
reputation and establish trust
#2: Reviews can
build a strong
reputation and
establish trust
Best Practices For Building
A Social Media Presence
1. Identify your target demographic
Select the platform that reaches the
target demographic
Before setting up an account, find the right
social media account for your company
2.
2.8 billion people use social media
Use these demographics to find your first platform
Facebook
• Slightly more women
than men
• Best for reaching ages
18-49
LinkedIn
• Slightly more men
than women
• 45% of people who earn
$75k+ are using LinkedIn
Twitter
• Mostly oversaturated
• Predominantly male
• Mostly 18-20 year olds
Instagram
• Fastest growing
• Mostly female
• 90% of users are under 35
YouTube
• Video based
• Reaches more 35-49 year
olds than any cable network
in the U.S.
Choosing A Platform
1. Pick one platform to get started and
do it well
Explore Angie’s List and Yelp to start
building your online reviews
2.
1. Assign a person to manage the account
Monitor and engage. Be active by posting
at least weekly
Acknowledge and respond to both good
and bad reviews
Managing Your Social Account(s)
2.
3.
What is Virtual CIO?
Trend
#5
Virtual CIO
• Definition
• What do you get
• Benefits
• Rent construction equipment vs. virtual CIO
Signing up for Virtual CIO is essentially hiring an outside IT agent who
assesses your needs and figures out the right networking set up for you
111111111111
Why Use A
Virtual CIO?
111111111111
#1 goal of a Virtual
CIO is to
understand your
business’ needs.
111111111111
They’re experienced
in creating long-
term technology
goals.
111111111111
They’re ready to offer advice
on essential decisions, such
as whether you’re ready to
purchase or sign a monthly
subscription for technology
equipment and software.
111111111111
They help you from
the planning and
strategy stages to
the implementation
and maintenance
stages.
Do You Need Virtual CIO?
Contact Our Team
Bill Walter, MCP, MCSE, PMP
wwalter@gma-cpa.com
443.610.7413
Claim your free
2017 Maryland
Construction
Industry Survey
results here:
http://bit.ly/
2017-results

More Related Content

PDF
Reasons to be secure
PDF
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
PDF
Risky Business
PDF
The Newest Element of Risk Metrics: Social Media
PDF
Security In A Connected Society
PDF
B istr main-report_v18_2012_21291018.en-us
PDF
Social engineering
PDF
InformationSecurity_11141
Reasons to be secure
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Risky Business
The Newest Element of Risk Metrics: Social Media
Security In A Connected Society
B istr main-report_v18_2012_21291018.en-us
Social engineering
InformationSecurity_11141

What's hot (19)

PDF
Dealing with Data Breaches Amidst Changes In Technology
PDF
Comvigo IM Lock WhitePaper
PDF
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
PDF
Forcepoint Whitepaper 2016 Security Predictions
PDF
Raytheon-NCSA_Millennial_Survey_report_2014
PPTX
Intelligent information: New Rules for Managing the Customer Experience
PDF
2010 6 Things u need 2 know in 2010 Whitepaper Final
PDF
The CISO’s Guide to Being Human
PDF
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
PDF
BLACKOPS_USCS CyberSecurity Literacy
PDF
Corporate Cybersecurity: A Serious Game
PPTX
SucessfulInsiderThreat
PDF
Top 3 security concerns for enterprises
PDF
Treat a Breach Like a Customer, Not a Compliance Issue
PPTX
Cybersecurity for Emergency Managers
PDF
IMC 618 - Public Relations Campaign
PDF
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
PDF
Cyber Security Threats | IIA Boise Chapter
PDF
Security and Privacy: What Nonprofits Need to Know
Dealing with Data Breaches Amidst Changes In Technology
Comvigo IM Lock WhitePaper
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Forcepoint Whitepaper 2016 Security Predictions
Raytheon-NCSA_Millennial_Survey_report_2014
Intelligent information: New Rules for Managing the Customer Experience
2010 6 Things u need 2 know in 2010 Whitepaper Final
The CISO’s Guide to Being Human
Symantec & WSJ PRESENTS "MALWARE on Main Street" ...
BLACKOPS_USCS CyberSecurity Literacy
Corporate Cybersecurity: A Serious Game
SucessfulInsiderThreat
Top 3 security concerns for enterprises
Treat a Breach Like a Customer, Not a Compliance Issue
Cybersecurity for Emergency Managers
IMC 618 - Public Relations Campaign
USER AWARENESS MEASUREMENT THROUGH SOCIAL ENGINEERING
Cyber Security Threats | IIA Boise Chapter
Security and Privacy: What Nonprofits Need to Know
Ad

Similar to 5 Technology Trends Construction Contractors Can't Afford To Ignore (20)

PDF
GITA March 2015 Newsletter
PDF
5 Questions Executives Should Be Asking Their Security Teams
PDF
Internal or insider threats are far more dangerous than the external - bala g...
PPTX
Best Security Practices for a Web Application
PPTX
Info Session on Cybersecurity & Cybersecurity Study Jams
PPTX
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
PPTX
Top 12 Threats to Enterprise
PPTX
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
DOCX
12Cyber Research ProposalCyb
DOCX
12Cyber Research ProposalCyb
PDF
A data-centric program
PPTX
Continuing Education Conferance
PPTX
Data breach
PDF
11 Reasons Why Your Company Could Be In Danger
PDF
Why is cyber security a disruption in the digital economy
PPTX
cybersecurity awarness presentation overview.pptx
PPTX
cybersecurity awarness presentation overview.pptx
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPT
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
PPTX
Microsoft DATA Protection To Put secure.
GITA March 2015 Newsletter
5 Questions Executives Should Be Asking Their Security Teams
Internal or insider threats are far more dangerous than the external - bala g...
Best Security Practices for a Web Application
Info Session on Cybersecurity & Cybersecurity Study Jams
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Top 12 Threats to Enterprise
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
A data-centric program
Continuing Education Conferance
Data breach
11 Reasons Why Your Company Could Be In Danger
Why is cyber security a disruption in the digital economy
cybersecurity awarness presentation overview.pptx
cybersecurity awarness presentation overview.pptx
11 19-2015 - iasaca membership conference - the state of security
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
Microsoft DATA Protection To Put secure.
Ad

More from Gross, Mendelsohn & Associates (20)

PDF
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
PDF
Business Intelligence and Data Security for Long-Term Care Financial Professi...
PDF
Fall 2018 Microsoft Dynamics GP User Group
PDF
How To Leverage Sage Software To Become A Data-Driven Organization
PDF
Maryland's Construction Industry Outlook (2017)
PDF
Spring 2017 Sage 300 (Accpac) Users Group
PDF
Defending Against Modern Malware
PDF
Secrets of Successful Nonprofit Fundraising
PDF
Success with Multiple Award Schedule (MAS) Contracts
PDF
Stock Options and Deferred Compensation in Divorce
PDF
5 Essential Steps to Building a Better Board for Your Nonprofit
PDF
What Government Contractors Need to Do to Comply with New Employment Policies...
PDF
Sage 300 (Accpac) Users Group Meeting
PDF
Microsoft Dynamics GP User Group
PDF
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
PDF
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
PDF
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
PDF
Maryland’s 2016 Construction Industry Outlook
PDF
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
PDF
Budgeting Basics for Nonprofits
Virtual Sage 300 Users Group with Beth McNally, Sharon Paul, and Bill Walter
Business Intelligence and Data Security for Long-Term Care Financial Professi...
Fall 2018 Microsoft Dynamics GP User Group
How To Leverage Sage Software To Become A Data-Driven Organization
Maryland's Construction Industry Outlook (2017)
Spring 2017 Sage 300 (Accpac) Users Group
Defending Against Modern Malware
Secrets of Successful Nonprofit Fundraising
Success with Multiple Award Schedule (MAS) Contracts
Stock Options and Deferred Compensation in Divorce
5 Essential Steps to Building a Better Board for Your Nonprofit
What Government Contractors Need to Do to Comply with New Employment Policies...
Sage 300 (Accpac) Users Group Meeting
Microsoft Dynamics GP User Group
Red Flags You’re Missing: How Manufacturers Can Detect and Prevent Employee F...
Securing Your Organization’s Future: Best Practices in Nonprofit Endowment Ma...
Pushing Your Nonprofit to the Next Level: How to Supercharge Your Organizatio...
Maryland’s 2016 Construction Industry Outlook
Fraud Prevention for Nonprofits: Avoiding Fraud Schemes and Fraudsters
Budgeting Basics for Nonprofits

Recently uploaded (20)

PDF
Altius execution marketplace concept.pdf
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
Build Real-Time ML Apps with Python, Feast & NoSQL
PDF
substrate PowerPoint Presentation basic one
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
PDF
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
A symptom-driven medical diagnosis support model based on machine learning te...
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
CEH Module 2 Footprinting CEH V13, concepts
PDF
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf
Altius execution marketplace concept.pdf
Module 1 Introduction to Web Programming .pptx
Build Real-Time ML Apps with Python, Feast & NoSQL
substrate PowerPoint Presentation basic one
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
LMS bot: enhanced learning management systems for improved student learning e...
Connector Corner: Transform Unstructured Documents with Agentic Automation
Early detection and classification of bone marrow changes in lumbar vertebrae...
EIS-Webinar-Regulated-Industries-2025-08.pdf
A hybrid framework for wild animal classification using fine-tuned DenseNet12...
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Introduction to MCP and A2A Protocols: Enabling Agent Communication
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Auditboard EB SOX Playbook 2023 edition.
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
A symptom-driven medical diagnosis support model based on machine learning te...
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
CEH Module 2 Footprinting CEH V13, concepts
Planning-an-Audit-A-How-To-Guide-Checklist-WP.pdf

5 Technology Trends Construction Contractors Can't Afford To Ignore

  • 1. 5 Technology Trends Construction Contractors Can’t Afford To Ignore
  • 2. Bill Walter, MCP, MCSE, PMP Principal with Gross Mendelsohn’s Technology Solutions Group
  • 3. What We’ll Cover 1. How to use mobile technology to keep workers connected. 2. Document sharing and collaboration with workflows and picture attachments. 3. Security measures to minimize threats like hacks, viruses, and data loss. 4. Why your business cannot afford to bypass social media. 5. The concept of a “virtual CIO” – what is it and do you need one?
  • 4. Watch the full seminar by following this link: http://bit.ly/construction-tech-trends
  • 6. 14% of Maryland construction contractors are concerned about field/mobile access to email, project management systems, electronic files, timesheets, etc. -2017 Maryland Construction Industry Survey Mobile (14%)
  • 7. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey
  • 8. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey 124 out of 159 answered yes 78%
  • 9. Does your business take advantage of mobile technology (electronic timesheets, email communication between onsite jobs and office, etc.)? -2017 Maryland Construction Industry Survey 35 out of 159 answered no 124 out of 159 answered yes 22% 78%
  • 10. If we know mobile technology can make our construction businesses more efficient, WHYSO RELUCTANT?
  • 12. BYOD: Bring Your Own Device • Allows access to the network even when not in the office • Doesn’t necessarily make you vulnerable if you do it right • People already own these devices – cost benefit
  • 13. What Can Mobile Do? What Would You Do With Mobile Devices?
  • 14. What Can Mobile Do? Get Real Time Data for Reports
  • 15. What Can Mobile Do? Instantly Submit and Analyze Timesheets
  • 16. What Can Mobile Do? Track and Send Emails About Current Projects or Jobs
  • 17. What Can Mobile Do? Monitor, Manage and Track Equipment
  • 18. What Can Mobile Do? What Else Do You Think It Can Do?
  • 19. Here’s How ElectriCon* Used Mobile to Advance Their Business… *Name has been changed to protect the identity of the organization.
  • 20. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 21. We set up a wi-fi enabled printer accessible from a briefcase. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 22. Now, they can print change orders from their mobile project manager station. We set up a wi-fi enabled printer accessible from a briefcase. ElectriCon’s Mobile Setup ElectriCon needed a way to print essential documents on- the-go.
  • 23. INSIDE SECRET: Even if a device is mobile, it CAN be secure!
  • 25. What are your most time consuming workflows? What documents do you wish you could instantly share?
  • 26. Proposals Change Orders 3 Common Workflows That Can Be More Efficient from Document Sharing Review/Signoff Required Documents Punch Lists Field Logs
  • 27. Document Sharing and Collaboration Access to real-time information •More accurate and efficient •Staff Accountability
  • 28. Document Sharing and Collaboration Access to real-time information More accurate and efficient •Staff Accountability
  • 29. Document Sharing and Collaboration Access to real-time information More accurate and efficient Staff Accountability
  • 30. Your Document Sharing Setup Should… 1. Have a user-friendly interface for employees. 2. Be integrated into your other systems so you can collect essential data.
  • 31. Your Document Sharing Setup Should… 1. Have a user-friendly interface for employees. 2. Be integrated into your other systems so you can collect essential data.
  • 32. The #1 concern for Maryland construction contractors is automated integrations between software tools like estimating, bid log, scheduling, accounting, service, etc. in 2017. -2017 Maryland Construction Industry Survey
  • 33. How Can Document Sharing Solutions Integrate Into Construction Workflows?
  • 34. Project pictures with geolocation and time stamps
  • 35. Create quick change orders with signatures
  • 36. Mobile stations for printing essential documents on-the-go
  • 38. For many companies, it’s not a matter of if they’ll get hacked, but when. I doubt my construction company will ever get hacked. It seems too unlikely.
  • 39. 31 out of 159 Maryland construction contractors were hacked in 2017…so far. -2017 Maryland Construction Industry Survey
  • 40. “This year, we record the highest average total cost of data breach at $7.35 million.” “In 2013, the average cost of a data breach was only $5.40 million.”
  • 41. “Malicious or criminal attacks continue to be the primary cause of data breach.” “52% of incidents involved a malicious or criminal attack, 24% of incidents were caused by negligent employees, and another 24% were caused by system glitches, including both IT and business process failures.”
  • 42. Not only is it expensive to deal with a security breach…
  • 43. You risk losing your essential data and client files to malicious entities.
  • 44. You risk losing your essential data and client files to malicious entities. In many cases, after paying ransomware fees to a hacker who encrypted your files, you will still lose your data. The only way to prevent a loss of essential data is to make sure your backup files are functioning correctly and are up-to-date.
  • 45. A security breach can cost you your credibility and reputation.
  • 46. A security breach can cost you your credibility and reputation.
  • 47. Just ask Builders, Inc.* about their security breach… *Name has been changed to protect the identity of the organization.
  • 48. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue.
  • 49. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue. After going to the link provided by “Microsoft,” the computer slowed significantly.
  • 50. The Hack At Builders, Inc. Builders, Inc. gets a call from “Microsoft” saying they need to fix a computer issue. After going to the link provided by “Microsoft,” the computer slowed significantly. They needed to act fast! They unplugged the computer while we scanned their network for malicious activity.
  • 51. INSIDE SECRET: Your employees are a huge threat to your security
  • 52. Avoiding A Breach • Your chance of being a victim of a hack increases when you ignore basic security practices. • The #1 defense you have against a hack is to educate yourself and your employees on safe computer habits.
  • 54. Nearly two out of every ten contractors say their business doesn’t use social media and has no plans to start. -2017 Maryland Construction Industry Survey
  • 55. Here’s Why This Number Is Alarming…
  • 56. Facebook (23%) Twitter (12%) LinkedIn (31%) Instagram (3%) YouTube (5%) My company doesn't use social media and has no plans to start My company doesn't use social media, but would like to start Maryland contractors reported using the following social media platforms: My company doesn't use social media and has no plans to start (9%) My company doesn't use social media, but would like to start (17%)
  • 57. 4 Reasons Why Companies Ignore Social Media
  • 58. It takes time to manage a social account
  • 59. It seems risky to put yourself out there publicly
  • 60. It’s always possible to get a bad review
  • 61. It could be worthless if social media goes “out of style”
  • 62. 4 Ways Companies Can Seriously Benefit From Social Media
  • 63. You can supplement your one-on-one networking with online word of mouth
  • 64. A positive online presence builds your company’s reputation
  • 65. Building a solid reputation online can attract better quality employees
  • 66. Showcasing your community involvement makes your company even more likeable
  • 67. Check out how these construction companies promote their business online…
  • 68. Some are posting pictures or videos to showcase the jobs they’ve completed.
  • 70. 43% of Maryland contactors say they don’t think online reviews impact whether a customer will do business with that company. -2017 Maryland Construction Industry Survey We disagree.
  • 71. INSIDE SECRET: A bad review doesn’t have to destroy your reputation.
  • 72. Here’s what you need to know about reviews
  • 73. #1: There is a way to handle a bad review without compromising your reputation
  • 74. #1: There is a way to handle a bad review without compromising your reputation
  • 75. #2: Reviews can build a strong reputation and establish trust
  • 76. #2: Reviews can build a strong reputation and establish trust
  • 77. Best Practices For Building A Social Media Presence
  • 78. 1. Identify your target demographic Select the platform that reaches the target demographic Before setting up an account, find the right social media account for your company 2.
  • 79. 2.8 billion people use social media
  • 80. Use these demographics to find your first platform Facebook • Slightly more women than men • Best for reaching ages 18-49 LinkedIn • Slightly more men than women • 45% of people who earn $75k+ are using LinkedIn Twitter • Mostly oversaturated • Predominantly male • Mostly 18-20 year olds Instagram • Fastest growing • Mostly female • 90% of users are under 35 YouTube • Video based • Reaches more 35-49 year olds than any cable network in the U.S.
  • 81. Choosing A Platform 1. Pick one platform to get started and do it well Explore Angie’s List and Yelp to start building your online reviews 2.
  • 82. 1. Assign a person to manage the account Monitor and engage. Be active by posting at least weekly Acknowledge and respond to both good and bad reviews Managing Your Social Account(s) 2. 3.
  • 83. What is Virtual CIO? Trend #5
  • 84. Virtual CIO • Definition • What do you get • Benefits • Rent construction equipment vs. virtual CIO Signing up for Virtual CIO is essentially hiring an outside IT agent who assesses your needs and figures out the right networking set up for you
  • 86. 111111111111 #1 goal of a Virtual CIO is to understand your business’ needs.
  • 87. 111111111111 They’re experienced in creating long- term technology goals.
  • 88. 111111111111 They’re ready to offer advice on essential decisions, such as whether you’re ready to purchase or sign a monthly subscription for technology equipment and software.
  • 89. 111111111111 They help you from the planning and strategy stages to the implementation and maintenance stages.
  • 90. Do You Need Virtual CIO?
  • 91. Contact Our Team Bill Walter, MCP, MCSE, PMP [email protected] 443.610.7413 Claim your free 2017 Maryland Construction Industry Survey results here: http://bit.ly/ 2017-results