Basic Security by Jason Mahlin

    We live in a world where security is a concern for us all. Among other things 9/11 changed security forever. Not that long ago people would leave their front doors unlocked and the keys to their unlocked car in the visor. But today, we run the risk of our identity being compromised, or our ideas being copied even without us knowing about it. Security is like wearing sunscreen, once you get into the habit it becomes second nature.

    Five months ago, I thought locking your door and keeping your wallet in your pocket was enough, but after taking a Security+ class the security onion if you will began to peel back. Not everyone needs an armed guard following them around or use 256 bit encryption, but by knowing a bit more about security and choosing to implement specific steps we can keep ourselves much safer than most other people.

    I will discuss Security Level 1 - Green Level, the most basic security steps to learn and to implement. All security can be broken down into physical and virtual security. Its helpful to discuss the two types of security, although some security falls into both sides.

    Physical Security - Level 1 - Green.

    1. Level 1 - Green - Basic Security
      1. Physical Security - This consists of doors & windows, file cabinets, all the tangible things you have control over by just keeping things put away or locked. Also covered is anything that is thrown away (like credit card statements or any other PII - personally identifiable information). Here are some basic steps:
        1. File Cabinet - keep them locked. Keep the key in a secure location (not in a unlocked drawer).
        2. Financial information - 
          1. Lock up your credit cards that are not used on a daily basis
          2. Credit Report
            1. Run a free credit report every year.
            2. Review the report to insure the information is factual and accurate.
          3. Encrypt and scan all usb, phone, and external hard drives.
        3. PII (personally identifiable information) -
          1. All paperwork should be put in a locked drawer when you are not using it. Preferably in a locked room as well.
          2. Don’t keep any financial information where it can be taken or even seen by someone that doesn’t need it.
          3. Recycling or trash should be shredded. Using a cross shredder so the pieces cannot easily be put back together is best.
        4. Electronics that can be secured with a password - How much information do you have stored on your phone or laptop? If I were to use that information and publish it on the front page of the NYTimes would that be something you would be comfortable with? Having a password on your devices takes less than 5 minutes.
          1. Secured all devices/electronics with a password.
          2. Set up your computer, phone, or tablet to lock after 2 minutes so when you want back in you must enter a password.
      2. Virtual Security - With the world going almost entirely virtual password security has never been more important. Something as simple as going on to wifi at your local Starbucks in less than 4 minutes someone with the right equipment can log in and steal things from your computer or phone. so this is a list of basic security items and I'll help you get more secure than just the average person.
        1. Unique Passwords - Creating a password of at least 10 characters at the minimum. Do not use words in the dictionary such as “password” or even “P@$$w0rD” because most attackers have programs that can guess that password in no time. Instead use foreign words or paraphrases like, “grandeperro” or “Gr@nd3p3Rr0” or S!tVbwN2bHt” (Security is the very best way not to be hacked today) which is significantly more difficult to crack.
        2. Changing your passwords ever 90 days.
        3. Antivirus and AntiMalware - Install an Antivirus program and an AntiMalware program on all your devices (phone, tablet, and computer). Insure that it updates automatically because new programs are created daily by hackers.
        4. Firewall - Insure that your firewall is turned on. This is the easiest way to keep someone from getting into your device and doing something maliciously. 
      3. Evacuation Plan - One of the most overlooked parts of security is the evacuation plan. In an emergency either natural or personal knowing where all your keys are, what to take if you have only 5 minutes (baby pictures, social security card, banking information), or who to call and tell that you have to evacuate. Another piece of security is making sure when something happens you have a plan in place to recover your information or personal items.
Security in 20th Century

Security in 20th Century

Case Study: Dyson Call Center Relocation by Jason Mahlin

CASE STUDY: DYSON CALL CENTER RELOCATION

  • Company
    • Dyson, Inc.
  • Project 
    • Call Center Relocation Project
  • Challenge
    • Dyson moved into their River North office in 2007 and ever since staff continued to expand to support their new product lines.  After multiple attempts at a short term solutions proved to be inadequate in a building with a 3% vacancy rate, it was clear a more holistic solution had to be found. 
Read More

FAQ by Jason Mahlin

  • How Konstruckt was formed?

    • Konstruckt was created as a solution for a company (Dyson) I had already worked for asking for a business to business relationship.

 

  • Why the name Konstruckt?

    • When I was small I was influenced by people who could make things around me. I have always been handy but don’t have a significant amount of technical skill with tools. So the short answer is, I have always wanted to make or construct things. Spelling Konstruckt was an opportunity to be creative, again influenced by things around me, specifically the industrial music movement in the 90’s. 

 

  • What is Konstruckt?

    • Konstruckt is a boutique consulting & project management company. We help small to mid-sized businesses build new facilities or improve & expand their existing facilities. Depending on your industry there are many titles for the work we do; Owner’s Representative, Tenant Representative, Property Manager, Project Manager, or Developer. Instead of  telling you the title we fall into we would prefer to tell you what solutions we have solved for others and ask if we can solve problems for you as well.

 

  • What problems we can solve for you? 

    • At Konstruckt we have a list of service that we have performed for clients but this is by no means a comprehensive list. With over 25 years of work experience in different industries we can offer a variety of solutions to your business problems.

 

  • We have experience with:

    • Tenant Improvement, Move Management, Information Technology Project Management, Developing Request for Pricing (RFP), Furniture Planning (including inventory, budget creation, bid, purchase, scheduling, and placement), Bidding and Negotiations for Vendor Services (anything from Architect and General Contractor to vending machines for your cafe), Budget Management, Move Coordination and Management, Construction Management and Coordination, and acting as the Tenant Representative also called the Owner’s Representative, Evaluating and Selecting Architect, General Contractor, Moving, Furniture, and Telecommunications or Audio Visual Firms.

 

  • Who is our focus as a client?

    • Konstruckt focuses on the client and understands that there is not a one size fits all approach. We do what we can to best resolve your problems and offer advice. A consultation is always free and a great way to talk about your challenges. 

 

  • How do we charge for our services?

    • We offer a range of service and can provide you details for your specific needs after our initial consultation. Konstruckt can either charge by the hour or a flat rate based on you're managing your project.

 

  • Here are some services that most of our clients need:

    • Move management — use existing inventory of furniture, filing, desking, and tables to produce a layout and move plan for company.

    • Schedule & weekly meetings — develop and manage the full schedule

    • Schedule - develop

    • Vendor acquisition

    • Furniture

 

  • Where do we do business?

    • Our office are based out of Los Angeles, California. Konstruckt has a network of providers across the country for project located elsewhere. We also have experience managing multi-million dollar project remotely and can utilize a variety of technology to stay connected email, phone/conference, Skype or any method your business wants to use.

Tenant Improvement by Jason Mahlin

Konstruckt specializes in Tenant Improvements. We have experience with clients such as Dyson and HairUWear on Tenant Improvements and with Expedia with Information Technology improvements to increase the bandwidth to meet the changing technology needs.

Tenant improvements also known as leasehold improvements are changes to an existing structure/building to be a better fit for the new tenants. An example would be tenant improvements of adding additional bathrooms or a cafe for a company that has a call center (which has a higher density of staff compared to a bank).

Typically a business will negotiate a tenant improvement allowance or leasehold improvements with their lease. The owner of the building will give an allowance to make improvements. This will come as a discount on the rent or paid directly from the building owner. Also note that these leasehold improvements may be depreciable over 15 years if they are to real property (ceilings, walls, floors, basically anything permanently attached to the building).