Category: IT & Cybersecurity

Cybersecurity Maturity Model Certification (CMMC) Overview

The United States Department of Defense has created the new Cybersecurity Maturity Model Certification (CMMC) standard that will soon be required for corporations and entities that want to bid as a contractor, or act as a subcontractor, for DoD projects.

This whitepaper is designed to give electrical and mechanical contractor corporate leadership and their IT Directors an overview of the CMMC standard. This paper will also answer some of the most frequently asked questions about the CMMC and cut through much of the confusion and technical jargon that has surrounded the CMMC since its launch in January 2020.

Department of Labor Cybersecurity Best Practices for ERISA-Covered Plans

ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks. The Employee Benefits Security Administration has prepared the following best practices for use by recordkeepers and other service providers responsible for plan-related IT systems and data, and for plan fiduciaries making prudent decisions on the service providers they should hire.

The Business Value of BIM for Mechanical and HVAC Construction SmartMarket Report

The use of BIM and related technologies and processes that leverage data from models is delivering meaningful impact to mechanical and HVAC contractors on a wide variety of measures, including cost and schedule improvements, enhanced productivity, better collaboration between stakeholders and better worker safety. This research report quantifies other benefits to users and the challenges related to leveraging BIM to increase industry understanding of which factors will most effectively drive growth and expand future use.

Prefabrication and Modular Construction 2020 SmartMarket Report

Improved productivity and quality are among the benefits driving interest in, and use of, prefabrication and modular construction today. This research report quantifies other benefits to users and the challenges related to each to increase industry understanding of which factors will most effectively drive growth and expand future use.

Exposed: Keeping Your Data to Yourself After an IT Breach

Keep your data private after an IT breach. Three types of cyber threats have been on the rise in business; each requires your leadership skills to help your company avoid them or emerge unscathed. Find out what you can do as an executive to protect your company if your website is hacked and defaced, if your files are held for ransom or if your Data Center goes offline with no estimate for restoration.