Enjoy an expanding catalogue of exclusive content that serves the needs of owners, asset managers, property managers and operations and maintenance professionals.
- Cybersecurity, Technology Mitigating Cybersecurity Threats September 22, 2021 | By: Fred Gordy Protecting your system from cybersecurity threats is an ongoing process, but it doesn't have to be a difficult one. In this video, Fred Gordy with Intelligent Buildings, LLC describes the simple and effective ways an org [...]
- Cybersecurity, Technology Cybersecurity Threats for CRE September 8, 2021 | By: Fred Gordy The best way to combat a potential cybersecurity threat is preparation and education. In this video, Director of Cybersecurity Fred Gordy with Intelligent Buildings, LLC walks through different types of cyberse [...]
- Cybersecurity, Risk Management, Technology Five Cybersecurity Risks You and Your Property Management Team Should Avoid August 17, 2021 | By: Alec Burchett At this point, the importance of adhering to good cybersecurity practices is well known. What often goes unknown however, are all the current practices carried out on a daily basis that one needs to stop doing n [...]
- Cybersecurity, Risk Management, Technology Five Best Cybersecurity Practices for Properties and Companies August 9, 2021 | By: Alec Burchett Research from Gartner Inc. predicts that global cybersecurity spending will hit $170 billion by 2022. As this market grows, it makes sense to reason that the dangers in not observing proper cybersecurity habits are growi [...]
-
member Content
Become a 365 member today. CRE Insight 365, Cybersecurity, Risk Management, Technology Five Cybersecurity Tips Every Professional Should Know August 5, 2021 | By: Molly Looman A data breach or cyberattack can happen at any moment on any person’s device. Depending on the technological set-up of the company, an infection that makes its way onto one person’s account can find its way to the wh [...] - Cybersecurity, Risk Management, Technology 5 Best Cybersecurity Practices for Individuals August 2, 2021 | By: Alec Burchett In today’s world, with most work taking place using a computer, it has become increasingly important that good cybersecurity habits are practiced in order to best protect oneself on the web. Through lots of research an [...]
-
member Content
Become a 365 member today. Cybersecurity, Operations & Maintenance, Technology, Webinars Cybersecurity in Building Operations June 10, 2021 | By: Klint Walker, Fred Gordy and Joshua Peresta Sponsored by Full Circle Restoration & Construction, A Cotton Company. You can’t be too careful. In an increasingly digital world where remote access and the internet of things (IOT) exposes properties and business [...] -
member Content
Become a 365 member today. CRE Insight 365, Cybersecurity, Risk Management, Technology Types of Hackers and Implications for CRE April 6, 2021 | By: Mischka Pottinger-Brinson Remember when businesses kept lots of physical files? There were multiple file cabinets, sometimes basements full of important files. This became unnecessary with the emergence of the personal computer. We no longer need [...] -
member Content
Become a 365 member today. CRE Insight 365, Cybersecurity, Risk Management, Technology Increasing Cybersecurity and Reducing Threats March 22, 2021 | By: Craig Scullin Cybersecurity is, without a doubt, a major concern for building owners and operators today. The assets we manage leverage technology in ways vastly different from just a few years ago and the trend continues to grow. Cam [...] - Cybersecurity, Technology Cybersecurity in a Work-from-Home Environment March 9, 2021 | By: Molly Looman In the rush to set up home computers and offices away from offices, the concept of cybersecurity may not have had space to come up. Now that organizations are considering different re-entry plans and some individuals are [...]
- Cybersecurity, Preparedness, Risk Management, Safety & Security, Technology 5 Cybersecurity Tips Every CRE Professionals Should Know July 31, 2019 | By: Molly Looman A data breach or cyberattack can happen at any moment on any person’s device. Depending on the technological set-up of the company, an infection that makes its way onto one person’s account can find its way to [...]