Enjoy an expanding catalogue of exclusive content that serves the needs of owners, asset managers, property managers and operations and maintenance professionals.
 
   What to Know about Ransomware   Ransomware is more than the occasional email, it can be a serious threat to building security and sensitive information for an organization. In this video, Fred Gordy, the director of cybersecurity with Intelligent Build [...]
   What to Know about Ransomware   Ransomware is more than the occasional email, it can be a serious threat to building security and sensitive information for an organization. In this video, Fred Gordy, the director of cybersecurity with Intelligent Build [...]    
   Mitigating Cybersecurity Threats   Protecting your system from cybersecurity threats is an ongoing process, but it doesn't have to be a difficult one. In this video, Fred Gordy with Intelligent Buildings, LLC describes the simple and effective ways an org [...]
   Mitigating Cybersecurity Threats   Protecting your system from cybersecurity threats is an ongoing process, but it doesn't have to be a difficult one. In this video, Fred Gordy with Intelligent Buildings, LLC describes the simple and effective ways an org [...]    
   Cybersecurity Threats for CRE  The best way to combat a potential cybersecurity threat is preparation and education. In this video, Director of Cybersecurity Fred Gordy with Intelligent Buildings, LLC walks through different types of cyberse [...]
   Cybersecurity Threats for CRE  The best way to combat a potential cybersecurity threat is preparation and education. In this video, Director of Cybersecurity Fred Gordy with Intelligent Buildings, LLC walks through different types of cyberse [...]    Five Cybersecurity Risks You and Your Property Management Team Should Avoid   At this point, the importance of adhering to good cybersecurity practices is well known. What often goes unknown however, are all the current practices carried out on a daily basis that one needs to stop doing n [...]
  Five Cybersecurity Risks You and Your Property Management Team Should Avoid   At this point, the importance of adhering to good cybersecurity practices is well known. What often goes unknown however, are all the current practices carried out on a daily basis that one needs to stop doing n [...]    Five Best Cybersecurity Practices for Properties and Companies   Research from Gartner Inc. predicts that global cybersecurity spending will hit $170 billion by 2022. As this market grows, it makes sense to reason that the dangers in not observing proper cybersecurity habits are growi [...]
  Five Best Cybersecurity Practices for Properties and Companies   Research from Gartner Inc. predicts that global cybersecurity spending will hit $170 billion by 2022. As this market grows, it makes sense to reason that the dangers in not observing proper cybersecurity habits are growi [...]    
   Five Cybersecurity Tips Every Professional Should Know   A data breach or cyberattack can happen at any moment on any person’s device. Depending on the technological set-up of the company, an infection that makes its way onto one person’s account can find its way to the wh [...]
   Five Cybersecurity Tips Every Professional Should Know   A data breach or cyberattack can happen at any moment on any person’s device. Depending on the technological set-up of the company, an infection that makes its way onto one person’s account can find its way to the wh [...]    5 Best Cybersecurity Practices for Individuals   In today’s world, with most work taking place using a computer, it has become increasingly important that good cybersecurity habits are practiced in order to best protect oneself on the web. Through lots of research an [...]
  5 Best Cybersecurity Practices for Individuals   In today’s world, with most work taking place using a computer, it has become increasingly important that good cybersecurity habits are practiced in order to best protect oneself on the web. Through lots of research an [...]    
   Types of Hackers and Implications for CRE   Remember when businesses kept lots of physical files? There were multiple file cabinets, sometimes basements full of important files. This became unnecessary with the emergence of the personal computer. We no longer need [...]
   Types of Hackers and Implications for CRE   Remember when businesses kept lots of physical files? There were multiple file cabinets, sometimes basements full of important files. This became unnecessary with the emergence of the personal computer. We no longer need [...]    
   Increasing Cybersecurity and Reducing Threats   Cybersecurity is, without a doubt, a major concern for building owners and operators today. The assets we manage leverage technology in ways vastly different from just a few years ago and the trend continues to grow. Cam [...]
   Increasing Cybersecurity and Reducing Threats   Cybersecurity is, without a doubt, a major concern for building owners and operators today. The assets we manage leverage technology in ways vastly different from just a few years ago and the trend continues to grow. Cam [...]    Cybersecurity in a Work-from-Home Environment   In the rush to set up home computers and offices away from offices, the concept of cybersecurity may not have had space to come up. Now that organizations are considering different re-entry plans and some individuals are [...]
  Cybersecurity in a Work-from-Home Environment   In the rush to set up home computers and offices away from offices, the concept of cybersecurity may not have had space to come up. Now that organizations are considering different re-entry plans and some individuals are [...]    5 Cybersecurity Tips Every CRE Professionals Should Know    A data breach or cyberattack can happen at any moment on any person’s device. Depending on the technological set-up of the company, an infection that makes its way onto one person’s account can find its way to  [...]
  5 Cybersecurity Tips Every CRE Professionals Should Know    A data breach or cyberattack can happen at any moment on any person’s device. Depending on the technological set-up of the company, an infection that makes its way onto one person’s account can find its way to  [...]