May 19, 2020

Is your business a target for identity thieves?

Technology
Cyber Security
identity protection
contributors
Dave Thomas
4 min
Is your business a target for identity thieves?

Businesses across the nation wake up each and every day to new challenges, one of which has been coming at them in droves in recent years.

While hackers have targeted companies since the early days of the Internet, it has become a much bigger and more noticeable issue in recent years, leading more American companies to fight back.

With that said, is the effort to thwart hackers winning or losing?

The answer to that question of course depends on the answers put forward by the men and women running U.S. businesses.

Some will note success, others will point out that there is still much more work to be done.

Preparing to Defend Your Brand

To prevent or greatly minimize the chances of a cyber-attack, are you doing the following?

1. Protection

To start matters off, do you have the right security system software in place? While many larger-sized companies automatically have such protections in place, it is not uncommon for a sizable number of smaller companies to not be up to speed on protection. When this happens, they are left exposed to cyber-criminals who can then infiltrate the company’s website. Once an identity theft thief is inside, they can do all kinds of things, none of which are good for a company’s financial standing and for that matter its public relations position with customers. Whether you opt for LifeLock or another such identity theft protection product, be sure that you have a program in place to thwart hackers at each and every turn;

2. Employees

Often looked at as your first defense against hackers, your workers need to be cognizant of the fact that identity theft thieves are regularly testing business websites to see which ones are strong and those that prove vulnerable. Your employees need to avoid sharing pertinent company and customer data in an unsupervised manner, along with not discussing it on social networking sites. Lastly, if an employee or employees suspect that someone within the organization is potentially stealing company or customer data for their own financial purposes, it is imperative that they are reported immediately. As events have shown over time, in-house identity theft is more common than many business owners may think. Make sure you are doing the right things to motivate your employees to do what is best for the business when all is said and done;

3. Passwords

Something that can easily get lost in the shuffle of running a business is having sound usernames and passwords for all your employees to log in and out of their computers. If you have an employee using something along the lines of John Smith as a username, with Password123 as the password to log on, how difficult do you think that is to break? User names and passwords should be carefully thought out before each new employee begins working for you. Also make it clear that usernames and passwords should not be shared around the office;

4. Locations

It is not all that uncommon for companies to have remote workers and employees traveling for business. With that being the case, it is important you have the right security measures in place. Along with secure log-in usernames and passwords, be sure that any of your employees working from home or doing work for you on the road (networking conferences, meeting with clients etc.) work from secure server sites. For example, if one of your employees is at a free Wi-Fi site (café, store, Laundromat etc.), can they be 100 percent sure hackers can’t access the info on their laptops? Employees working from home and/or traveling for business need to be careful that any company or customer information that should not be seen outside of a secure server in the office is just that, not viewed anywhere but in the office;

5. Reviews

Lastly, how often are you reviewing the security procedures you have in place for your company’s online activities? Hackers are always trying to outwit authorities and businesses for that matter, so you need to stay a step or two ahead of them. Do periodic reviews, meaning test your site to see how vulnerable it is to attacks. You can designate one or more employees to play the role of “hackers” and see if they can penetrate your system. While you may think this is wasted time, always remember that it just takes one successful attack to render you and your business useless to many customers.

Share article

Jun 18, 2021

Intelliwave SiteSense boosts APTIM material tracking

APTIM
Intelliwave
3 min
Intelliwave Technologies outlines how it provides data and visibility benefits for APTIM

“We’ve been engaged with the APTIM team since early 2019 providing SiteSense, our mobile construction SaaS solution, for their maintenance and construction projects, allowing them to track materials and equipment, and manage inventory.

We have been working with the APTIM team to standardize material tracking processes and procedures, ultimately with the goal of reducing the amount of time  spent looking for materials. Industry studies show that better management of materials can lead to a 16% increase in craft labour productivity.

Everyone knows construction is one of the oldest industries but it’s one of the least tech driven comparatively. About 95% of Engineering and Construction data captured goes unused, 13% of working hours are spent looking for data and around 30% of companies have applications that don’t integrate. 

With APTIM, we’re looking at early risk detection, through predictive analysis and forecasting of material constraints, integrating with the ecosystem of software platforms and reporting on real-time data with a ‘field-first’ focus – through initiatives like the Digital Foreman. The APTIM team has seen great wins in the field, utilising bar-code technology, to check in thousands of material items quickly compared to manual methods.

There are three key areas when it comes to successful Materials Management in the software sector – culture, technology, and vendor engagement.

Given the state of world affairs, access to data needs to be off site via the cloud to support remote working conditions, providing a ‘single source of truth’ accessed by many parties; the tech sector is always growing, so companies need faster and more reliable access to this cloud data; digital supply chain initiatives engage vendors a lot earlier in the process to drive collaboration and to engage with their clients, which gives more assurance as there is more emphasis on automating data capture. 

It’s been a challenging period with the pandemic, particularly for the supply chain. Look what happened in the Suez Canal – things can suddenly impact material costs and availability, and you really have to be more efficient to survive and succeed. Virtual system access can solve some issues and you need to look at data access in a wider net.

Solving problems comes down to better visibility, and proactively solving issues with vendors and enabling construction teams to execute their work. The biggest cause of delays is not being able to provide teams with what they need.

On average 2% of materials are lost or re-ordered, which only factors in the material cost, what is not captured is the duplicated effort of procurement, vendor and shipping costs, all of which have an environmental impact.

As things start to stabilise, APTIM continues to utilize SiteSense to boost efficiencies and solve productivity issues proactively. Integrating with 3D/4D modelling is just the precipice of what we can do. Access to data can help you firm up bids to win work, to make better cost estimates, and AI and ML are the next phase, providing an eco-system of tools.

A key focus for Intelliwave and APTIM is to increase the availability of data, whether it’s creating a data warehouse for visualisations or increasing integrations to provide additional value. We want to move to a more of an enterprise usage phase – up to now it’s been project based – so more people can access data in real time.

 

Share article