9 Digital Transformation Statistics That Every Business Should Know

We’re living in the digital era. From smartphones to smartwatches, we are constantly glued to our devices. Today, there are an estimated 8.4 million “things” on the internet, with the IoT growing every year. With that said, it’s no surprise that businesses are realizing the tremendous impact digital transformation can have on their success. What […]

Ransomware: What it is, Who’s at Risk, and How to Stop an Attack

Last year was riddled with ransomware attacks with thousands of systems compromised as a result. With technology evolving at the current rate, hackers are finding more and more ways to attack. For example, ransomware is no longer limited to affecting desktops or laptops — it can also target mobile devices. A report by Kaspersky noted […]

understanding-tech-structure-AEC-header-05

Understanding The Technology Structure and Needs for AEC Firms

The needs of the modern AEC firm are ever-evolving. As technology continues to become more sophisticated, it increasingly lends itself well to the collaborative and often geographically dispersed teams of the AEC industry. I have the unique opportunity to work for a company that has over 75 clients ranging from just two employees to 1,000 […]

Revit Collaboration Strategies Presentation

Last year, in October of 2017, Chris France, Regional President of Advance2000, presented some useful Revit collaboration strategies to the Orange County Revit User Group. In his presentation, Chris discussed the four aspects of the Revit Collaboration Matrix (App Local, Data Local, App Remote, and Data Remote), and the pros and cons of each strategy. […]

cybersecurity-infographic

13 Eye-Opening Cybersecurity Facts

In light of recent global cyberattacks (read: WannaCry), it’s more important than ever to understand the risks of poor cybersecurity. According to Skyhigh, virtually every organization experiences at least one cloud-based threat per month. In fact, three out of four IT professionals cited their businesses were at risk for cybersecurity (and man-made) disasters. Many businesses […]

10 Reasons AEC Firms Are Moving to the Cloud

With the AEC industry’s emphasis on real-time work and collaboration, it’s no surprise that more and more firms are choosing to move their IT environments to high-performance private clouds. However, not all AEC firms have made the big move. Change is scary, we know – especially when dealing with the efficiency and longevity of your […]

HIPPA and Ransomware

HIPAA Compliance and Ransomware: What You Need to Know

If you work in the medical field or for a health care provider, chances are you’re very familiar with HIPAA guidelines and how they pertain to patient care. But are you familiar with how HIPAA affects your IT environment? When it comes to HIPPA and patient care, most people are already familiar with the HIPAA […]

How to Plan a Successful VDI Implementation

Implementing a New Technology Implementing VDI, whether hosted (Desktop as a Service) or on-premise is big undertaking involving a lot of change.  Managing that change is crucial to the success of the initiative. When implementing any new technology for the first time, there are several things to consider. Evaluate: First, evaluate your current processes, procedures, […]

Protect your business from ransomware cyberattack

How to Protect your Company from Cyberattacks

Let me begin with a hard truth: Your company is at risk from cyberattack. It’s true; every firm is at risk, and most will be attacked in some form, at some point in time. It’s nearly inevitable.  However, there are things you can do to protect your firm from a cyberattack, and ways you can […]

screen share for collaboration

Back to Basics: Screen Capture for Collaboration

One of the most simple and effective tools for sharing on-screen concepts and ideas in today’s technology-driven world is screen capture. In fact, it’s a tool I’ve come to use just about every day to communicate with my colleagues and clients. A picture is worth 1,000 words, as they say – and capturing an image from […]