According to a recent study

According to a recent study, by 2020, 100% of large enterprises will need to report on their cybersecurity measures to their board of directors.  What are you doing today to ensure you’re protected from an attack?

Making the shift to a ‘modern desktop’ removes the pain of you keeping your desktop environment secure with built-in protection and easy access to security updates.  A ‘modern desktop’ is Windows 10 and Office 365 kept up to date –and while that combination seems straightforward, adopting these solutions can be a challenge.

If you’re considering deploying new PCs or getting PCs up to standard and would like to learn more about how to plan, implement, and optimize your IT assets, contact us today to learn how.  At CSS, we have some of the best IT pros you will find, and together, we can integrate your modern desktop solutions quickly and securely, bringing your desktops up to par with the latest digital security solutions.

A Scary Halloween Tale

It was late last night and I was alone in the office.  I was busy and not paying attention to the warning signs around me.  If only I had listened more to the cautionary advice, I wouldn’t find myself in this scary situation now.

The phone rings ominously and startles me.  It’s my IT guy telling me the firm’s IT systems were hacked and the hackers planted a Ransomware virus that completely froze all the company’s computer systems.  The hackers are demanding an impossible payment in bitcoin or we will lose all our data.

Fortunately, this horror story is a fictional one I just made up.  Unfortunately, it’s a nightmare scenario that’s becoming increasingly more real for small and medium sized businesses, and in particular the construction industry.  There’s constant movement of money, frequent turnover of personnel, and critical knowledge and documentation of infrastructure and building system information that makes contractors a growing target.

Are you prepared, and do you know what to do in the event of a cyber-security breach?

If you have a cyber-insurance policy, IT safety measures in place, and have practiced “what if” fire drills, dealing with a breach can be slightly less scary.  If you’re one of the people who thought this could never happen to you, now is the best time to start planning for that frightening event.  Here are some simple steps to follow:

  • Purchase cyber insurance through a reputable broker
  • Install, update and use antivirus and anti-spyware software
  • Install a robust firewall
  • Backup, backup, backup (and test restore them!)
  • Have a strong password policy
  • Conduct a cyber-security readiness assessment

“You don’t know what you don’t know” is certainly a true claim when it comes to hackers and IT security.  Cyber-crime evolves daily and it’s hard to keep up.  It never was, and never will be, a “one and done” process.  Hire an expert to come out and do a cyber-security readiness audit.  They will tell you where your vulnerabilities lie and provide a road map of how to stay safe.  Most reputable companies will charge a small fee for the service, but it’s well worth it in the long run.

Here’s to a Halloween full of IT treats and no tricks!

Make The Shift To A More Modern Desktop

Microsoft remains the leader when it comes to office productivity programs like email (Outlook), word processing (Word) and spreadsheet applications (Excel). Take these same programs you are familiar with and move them to the cloud — along with new cloud features that let you work and collaborate with colleagues on a real-time basis – and you can understand why more and more businesses are moving to Office 365 and a modern desktop.

Why are businesses making the move to Office 365 and the cloud?

We are living in a time of rapid technical change. Digital transformation is one of the biggest revolutions any of us has seen in our lifetime. In 2018, two-thirds of the Global 2000 CEOs had digital transformation at the heart of their corporate strategy. Digital transformation is fundamentally changing the way your company uses technology to empower employees, optimize operations, transform products and engage customers.
Here are some of the primary factors driving this change:

  • The business landscape and customer expectations evolve daily and there is a shift away from routine tasks and hierarchical decisions to operating in a way that requires every employee to be creative, think critically and collaborate with others to address the task at hand. Empowering employee ingenuity is becoming a critical part for businesses to stay successful and relevant. 
  • For the first time in human history, we have five generations in the workforce (with millennials projected to be 50% of workforce by 2020). As a result, the workforce has become increasingly diverse, mobile, and comfortable with technology, with individuals working across multiple locations and devices throughout the workday. 
  • Teamwork has become an essential way to get work done. Organizations are more networked, needing to enable the increased flow of information to all team members. 
  • People have new expectations for how and why they work – seeking physical and digital workspaces that feel inclusive and open where they can easily share and connect and work together. 
  • Modern technology allows people, teams and companies to find and connect with the best expertise available without geographic or physical boundaries. Subject matter experts can more easily gain valuable knowledge. 
  • Social networks promote increased transparency, helping people and businesses be more agile and respond quickly to new market trends. Of course, along with that comes the increased need to stay more focused on maintaining a safe and secure environment protecting against cyber threats.

As you can see, at its core digital transformation is all about people. People are making the technology transformation happen, not the other way around. That’s the real reason why so many businesses are moving to the cloud and a more modern desktop – to enable people do their best work.

How Common Sense Solutions can help

Common Sense Solutions has the cloud and Office 365 expertise you need to help you transition smoothly to this powerful productivity tool and the know-how to support your day-to-day work within the Office 365 environment.

Talk to us about how Office 365 can fit the exact requirements of your operation. Why struggle with something bigger than you need, or suffer from trying to make a system work that won’t meet the demands of your growing business? We will give you a straightforward estimate of the costs and time involved with migration, as well as the business impact and return on investment for moving to a more modern desktop environment.

Overview of Microsoft Office 365
Fri, Nov 1, 2019 11-11:30am CDT

Microsoft is Making It Harder to Use Windows 7

With Microsoft ending support for Windows 7 in January 2020, users are being pushed to upgrade.

With less than a year to go until Microsoft ends support for its ten-year-old operating system Windows 7, as many as 43% of enterprises are still running the outdated platform.

Recent research has found that nearly a fifth (17%) of IT departments don’t know when the end of support deadline is (It’s Jan 14, 2020), while 6% are aware of the end of support but have yet to start planning for their migration away from Windows 7.

End of support means that Microsoft will no longer issue security updates for the 10-year-old Windows 7 after Jan. 14, 2020.  This poses a serious security risk for organizations to continue running Windows 7 unpatched.

Microsoft has already started to push users to upgrade to Windows 10 if they are using a computer with a newer processor type and an OS older than Windows 10.

October is National Cybersecurity Awareness Month

Today’s security needs are more complex than ever before because cyber criminals are getting more sophisticated than ever before.  Is protecting your organization from cyber threats important, but low on your priority list? — one of those things you’ve been putting off for when you have more time?

Make it a priority in October (National Cybersecurity Awareness Month) to understand the latest security threats and make sure your business is prepared for “that thing that could never happen to me”.

Your protection plan should include multiple layers of security, including web, email, network, and employee training, management and monitoring by a team of security experts, best-in-class products and practices to fully utilize the latest technologies.  Get in touch with us for an audit of your current state of readiness.


Take A Closer Look at Software Specifically Built
for Electrical Contractors

If you’re an electrical contractor and your current software isn’t giving you the answers you need to run your business, this is one webinar you’ll definitely want to attend!

Focus in on a software package thousands of electrical professionals use to make their jobs easier — as well as improve the vision on their bottom line!

Join us for a sneak peak of ComputerEase construction software as seen through the lens of an electrical contractor.

Improve Cash Flow

· Streamline billing with automated AIA forms
· View cash flow by job (including retention)

Increase Efficiency Both in the Field and Office

· Accurately track committed costs for big ticket items
· Easily generate Certified Payroll and Union Reports
· Bring in job budgets from estimates

Utilize Integrated Technology

· Capture time and field logs from the field
· Obtain up-to-the-minute real-time field reports
· Experience identical functionality from cloud or local
computing

Enhance Customer Service

· Improve service management & remote work orders

 

Presenters


Terry O’Rourke

President
Common Sense Solutions

Amy Farrell

Product Manager
Common Sense Solutions

 

TIME
Tuesday, October 1st
11-11:30am CDT



888-523-2568
info@cssworks.com

Chicago/St. Louis

 

Top Terrible Mistakes—Number 8

I started writing this summer about the common threads for those contractors who are highly successful, as opposed to those who are just barely making it, or in some instances, are no longer around, and have put them into a top (or bottom, depending how you look at it) 10 list.  Number 10 was Poor Project start (https://cssworks.com/terriblemistakes10).  We moved on to No 9 – Documented Processes, a.k.a. semi-organized chaos (https://cssworks.com/terriblemistake9). So, now we move on to…

Terrible Mistake #8 : Poor Project Communication
The impact of poor project communication is inaccurate or missing information, lack of timely information for decision making, and wasted resources from duplicated efforts. Invariably, there will end up being two sets of data – one used in the field, the other in the office. Inevitably, this means more time while each party tries to figure out which set of data is correct.

How to Prevent Making This Mistake
The technology does not exist to make sure that everyone communicates correctly and promptly in all cases. But if we can speed up and simplify some of the basics, it will leave more time available to deal with the exceptions. Some communication areas that can be automated and simplified include:

  • Scheduling – both job and service work orders
  • Time entry
  • Work completed – often in the form of a daily log or daily report that documents not only work completed but other key events like change orders, customer or inspection feedback, safety events, etc.
  • Documents and more importantly, document changes

There are many tools available to improve these functions. None of them is going to be the perfect solution for your unique situation, but there are some areas to consider while doing your search:

  • Ease of use – number of clicks, ease of navigation
  • Integration – does the data flow back to your office, or require re-entry?
  • Platform – laptop, tablet, smart phone. Other devices required?
  • Cost – one time purchase, monthly subscriptions, user count

We’re believers in looking at Total Cost of Ownership (TCO). Sometimes the up-front cost can be misleading, or the cost is only stated in per user/per month terms, or there are extra features that can drive up the final ultimate cost. Be on the look-out for hidden costs — we can help you with those calculations.

One of the biggest impediments to improving communication is getting the right communication tools. More and more companies are progressing to use smart phones and tablets in the field, especially as internet connectivity is almost always available. Make sure whatever tool you’re using to improve your project communication works seamlessly on them.

I often hear from the office team that the field team can’t or won’t use technology, yet I guarantee that most of them have a smart phone and find time to login to Facebook or any number of other apps. The real issue is resistance to change. As with any new initiative, management support is imperative.

3 Features That Only a CRM Can Provide

by: Ousaf_Jillani

If your business has never used a CRM, or has explored project management tools in place of a CRM, we are certain there have been plenty of missed opportunities and lack of organization along the way.  After all, construction businesses are intricate in nature, with plenty of client relationships to manage, and it is more important than ever to have a reliable system in place.

So, what can a CRM provide that other project management tools can’t?

Client History and Centralization

Have you ever been in a situation where you needed to reference client communication or history from four years ago, but you just can’t seem to find the email in your inbox?  A CRM fixes all of that.  Such systems keep all client conversations in one place and makes it easy for you to reference on the go.  A CRM ensures you are never confused about key communication with your most important clients, storing client history and keeping it centralized along the way.

Tracking Events and Tasks

As great as a pen and paper can be to keep track of your tasks, it just isn’t the same as what a CRM can provide.  Such a system will not only help you keep track of every event and task you have on your lengthy to-do list, it will also provide complete visibility into tasks associated with your colleagues.  For example, if you are managing a project for Client X and Salesperson Y is also working on the project, a CRM will allow you to work together and relate those tasks and events to the appropriate lead, contact or company.  Doing so allows you to form a unified, cohesive and integrated business unit.

Never Lose your Data

This is the big one (and our personal favorite).  If you are tracking your data through calendars, the aforementioned pen and paper or on your computer hard drive, there is a chance that your data and important information could be lost or stolen.  A CRM effectively protects your data.  Backing-up your data and protecting your infrastructure ensures your important emails and client notes will never be lost.

With the intricacies of a construction business, it is important to focus on the work and the projects instead of worrying about client history, tracking events and losing data.

Windy City Women in HVAC


Common Sense Solutions is proud to support Windy City Women in HVAC in their 8th annual charity event.  WCW HVAC is a philanthropic women’s organization dedicated to investing in the careers, education and networking of the elite women in the HVAC industry.

 

This year’s event proceeds will go to the American Foundation for Suicide Prevention.  AFSP raises awareness, funds scientific research and provides resources and aid to those affected by suicide.

 

Common Sense Solutions will be at the event on September 19 – Joe’s Bar, 940 W Weed Street, Chicago.  Join us or make a donation at www.wcw-hvac.com

 

How to Avoid Being Spied on by Google

By Brani Rogic of Common Sense Solutions

Launched in 1998, Google is the most used web-based search engine in the world.  How often have you used or heard the term “Google it” to answer a question?  There are definitely benefits of this powerful worldwide instrument for sharing and receiving knowledge between users that would otherwise be unavailable.  In fact, Google’s mission is “To organize the world’s information and make it universally accessible and useful”.

We’re talking about massive amounts of information here!  While researching the writing of this article, I came across all the products and services that Google owns, and the list is mindboggling.  There’s a catalog here if you’re interested.  I was surprised by some of them, I bet you will be too!

With so many opportunities to be touched by Google, we should always be aware (and in control) of what Google does with these touches, and what we can do to protect our privacy.

The first and most obvious answer would be, don’t use Google.  But if you went to look at the list stated above, you would see how nearly impossible that could be.  There are other browsers – like Firefox – that have enhanced tracking protection to better protect your online presence.

If Google is your continued browser of choice, then you may as well understand what they collect and know about you.  Here is Google’s disclosure about the information they collect as you use their services, https://safety.google/privacy/data and just a sampling of what they know about you:

When you do a search on Google, get directions on Maps, or watch a video on YouTube, they collect:

  • Things you search for
  • Videos you watch
  • Ads you view or click
  • Your location
  • Websites you visit
  • Apps, browsers, and devices you use to access Google services

When you sign up for a Google Account, you provide them with personal information.  This information can include:

  • Your name, birthday, and gender
  • Your password and phone number
  • Emails you write and receive on Gmail
  • Photos and videos you save
  • Docs, Sheets, and Slides you create on Drive
  • Comments you make on YouTube
  • Contacts you add
  • Calendar events

I’m afraid of the time when one night I dream about something, and see a Google ad for it the next day!

Here are some things you can do to protect your privacy and avoid being spied on by Google:

  1. Know Your Privacy Settings. Manage these settings at https://myaccount.google.com/.  Here you can choose what data is saved to your account, set data to automatically delete from your account, or review and delete data from your account
  2. Do A Privacy Checkup. Review and adjust what data Google uses to personalize your experience, and update what information you share with friends or make public.  https://myaccount.google.com/privacycheckup
  3. Stop Your Devices From Listening.  Manage the Activity Controls in your device, and turn off ‘Voice & Audio Activity’.  This records your voice and audio on Google services to improve speech recognition, like when you say “Hey Google” to speak to your Assistant.
  4. Use Incognito Mode. Turn on Incognito Mode in Chrome, Search, YouTube and Maps.  When you turn on Incognito mode, your activity (like places you search for or the videos you watch) won’t be saved to your Google account or saved on your apps and devices.  Read more about Incognito Mode here:  https://www.computerworld.com/article/3186941/you-are-not-very-incognito-in-incognito-mode.html
  5. Use A tool To Block Tracking. Here are a few tools available:

 

In closing, be aware that the world of data collection and information tracking will only continue to grow as the Internet of Things increases.  Know what info is out there about you, and know what apps and devices track your information.  They can’t violate your privacy if they can’t collect your data.