MSO Consolidation Goes Full Speed – Bigger deals, rising prices, and uncertainty for the future all spurring sales in 2014

2024-01-22T10:56:59+00:00August 2, 2014|Articles, Automotive Aftermarket, Newsletter|

Spurred by dramatic growth of large consolidators, as well as many regional and local MSOs, consolidation continues to evolve and impact the collision repair industry. Let's take a look at the numbers on acquisitions, valuations and markets.

Pedal to the Metal: Consolidation in 2014

2024-01-22T10:56:57+00:00July 30, 2014|Articles, Automotive Aftermarket|

Sixteen years ago, after David Roberts and his partner, Matthew Ohrnstein, founded Caliber Collision, he wrote a series of industry articles that were presciently accurate. His subject then? “Shop Consolidation: Is It Inevitable?” His answer was an emphatic “Yes.” Over a period of 8 years as Caliber’s Chairman, Roberts helped lead the initial capital raises and the acquisition of its first 37 shops. Now a leading investment banker in the Automotive Services industry with FOCUS Investment Banking, Roberts has a unique 20-year perspective on the industry. With the dramatic growth of the large consolidators as well as many regional and local MSOs, we asked Roberts to update our audience on consolidation developments, their impact on the industry and how consolidation continues to evolve.

How to Manage Bring Your Own Device (BYOD) in a GRC World

2024-01-22T10:57:01+00:00June 15, 2014|Articles, Newsletter, Technology Services|

Bring Your Own Device (BYOD) has been a catalyst for a new IT revolution. CNET TechRepublic’s BYOD Business Strategy Survey reveals that 62 percent of companies either allow Bring Your Own Device, or plan to by the end of 2013. However, the prospect of employees using their personal mobile devices to access corporate resources might seem contrary to existing Governance, Risk, and Compliance (GRC) regulations.

Use Data Masking as a GRC Solution

2024-01-22T10:57:03+00:00March 5, 2014|Articles, Blogs, Government and Defense, Newsletter, Technology Services|

Data masking, sometimes called de-identification, obfuscation, or redaction, is data security technology that is an ideal fit into an overall Governance, Risk Management, and Compliance (GRC) strategy. It’s an economical method for creating an inauthentic but structurally similar version of business data for use in user training or software testing, thus reducing risk. The data masked version of the data is a completely functional substitute for corporate data and protects live production data.

Cyber Security for the Rest of Us*

2024-02-12T23:10:33+00:00March 5, 2014|Articles, Newsletter, Security, Technology Services|

There Are No Firewalls. There Is No Inside Or Outside. We Are All Swimming In The Same Cyber Sea—With Sharks Circling. We Have No Protective Cage. Bottom Line: In The Realm Of Cyber, Nothing Is Secure. Cyber security experts have cried wolf before—and the sky is still standing. But we have finally reached the tipping point. It’s time to get the word out about how vulnerable we all really are—and why we need to take an entirely new approach to networked security.

Alzheimer’s Disease and the Growing Dementia Epidemic

2024-02-12T22:57:11+00:00December 10, 2013|Articles, Biotech, Healthcare, Newsletter, Technology Services|

Most of us know someone—relative, friend, or colleague—suffering from dementia, a medical term that describes symptoms of impaired cognition (memory and thinking), behavior, social abilities, and daily functioning. Dementia isn’t a specific disease and can range in severity from mild to severe. It has many different non-reversible and reversible causes.

Go to Top