Above view of large group of business people working in the office.

Categorized: Information Management

Categorized: Information Management

arek-adeoye-213476-unsplash

Why Your Employees Should Take a Hike

May 22, 2019


The modern office is not favorable for leading a healthy lifestyle. This is due largely in part to most employees remaining deskbound while completing most of their tasks. Too much sitting, according to the Mayo Clinic, increases the risk of …

Categorized: Information Management

SET YOUR PRIORITIES CONCEPT

Utilizing The Pareto Principle for Time Management

May 15, 2019


The Pareto Principle is also known as the 80-20 Rule. It is a principle based on cause and effect. In other words, the Pareto Principle states that for many events, roughly 80 percent of the effect comes from 20 percent …

Categorized: Information Management

SCAM CONCEPT

The Top Cyber Scams of 2019

March 13, 2019


We’ve written about cyber scams before, but criminals are always trying out new approaches in their tireless effort to trick their way into our computer systems and bank accounts. While consumers have become savvier about cyber scams, people are also …

Categorized: Information Management

woman looks transparent monitor panel that indicates technological graphics, futuristic GUI(Graphical User Interface), IoT(Internet of Things), technological abstract

Augmented reality set to take BIM into the real world

June 21, 2017


Maintaining your electrical, plumbing, and mechanical systems can be a real challenge, especially when many of these systems’ components are hidden inside walls, ceilings, floors or underground. Facility Managers often have to make do with 2D blueprints, which are difficult …

Categorized: Information Management

Cyber security concept: Rear view of businessman standing on wooden floor with circuit board and padlock sketched (chalk drawing) on the wall.

Categorized: Information Management

Woman puts her finger on an icon of a house shown on the touch screen of a digital tablet. The tablet runs a smart home app. Concept of controlling wireless devices at home, also know as internet of things.

Security, Part 6: The Vulnerability of the Internet of Things

February 8, 2017


In early 2014, more than 100,000 Internet of Things (IoT) devices, including home appliances, were manipulated into sending 750,000 phishing emails over the course of about two weeks, waking the world up to a new threat. The IoT offers promise …

Categorized: Information Management

Index finger touching a locked cloud icon that does link to three office worker symbols in blue. Four unlinked knowledge worker buttons remain gray. Business and technology metaphor. Cutout on white.

Facility Security, Part Four: Network Access Control

December 7, 2016


Mobile phones are everywhere, and the number and types of devices used by employees, customers, healthcare providers, patients, and visitors are growing at a rapid pace. While these devices can be crucial to the functioning of your facility, they are …

Categorized: Information Management

Laptop computer attacked by ransomware

Facility Security, Part Three: Ransomware

November 9, 2016


  Last month we looked at how to avoid falling victim to phishing scams. This month we take a look at ransomware. Ransomware attacks have been on the rise, especially in the healthcare sector. One study shows there are now …

Categorized: Information Management