Skip to main content

How to Protect Your Construction Data in Uncertain Times: Part 1 of 2

July 9, 2020 - 2:45pm

Article written by Kati Viscaino on the Viewpoint blog.

As our world around us becomes more and more digitized, the potential threats to the security of our digital data continues to grow. We rely heavily on technology in our everyday lives, and while we become more comfortable with these advancements, we begin to let our guard down which in turn allows for unwanted interactions.

Complimentary Online How-To Videos for Oracle Primavera P6, ViewpointOne Spectrum and Kahua

March 26, 2020 - 4:27pm

Current events have caused many companies to cancel all non-essential travel and implement work-at-home plans for non-essential employees. Many of our clients are including online training as a component of work-at-home plans to ensure that employees continue to enhance their skills (or learn new ones) and maintain productive, trackable time while working at home.

We have posted many P6, ViewpointOne Spectrum and Kahua how-to videos, including:

Under Attack: Hackers Find Construction Data Attractive Target

January 6, 2020 - 4:06pm

Article written by Steven H. Miller and appears on Constructor Magazine.com.

There is an old adage concerning timely action about the uselessness of locking the stable after the horse is gone. It is, unfortunately, the story of many construction companies confronting the issue of cybersecurity. They never considered themselves a target until it was too late.

Many are surprised by how fast the future has arrived, but it is here now. From payroll and tool-tracking to 3D building models and as-built laser scans, a construction company’s network is the conduit for increasing portions of its activities and is hosting an increasing number of outsiders and their devices. That is an attractive target for thieves, especially since the number of vulnerabilities in the network is growing. If the ‘stable’ in the old adage is your computer network with 250 doors instead of one and strangers going in and out, locking it up is not a simple task. To avoid becoming a victim, cybersecurity must be considered a top issue.

Subscribe to Best Practices