Germany +49 6196 64040 - 0 | UK +44 20 32909224

 

Germany +49 6196 64040 - 0 | UK +44 20 32909224

BCC Blog

Stephanie Heit

Stephanie joined BCC in 2013 as Director of BCC Ltd. Stephanie is responsible for international operations. She has over 18 years experience in the collaboration space.

Recent Posts

A Day in the Life of a Domino Administrator

Anyone who works in the technology industry can attest to the fact that any given day in the life of an administrator is unlikely to be mundane. Administrators often have set agendas for their schedule but they don't often get the luxury of attacking their main objectives without interruption.

IBM Domino, Domino Admins

Streamlining People Management With AdminTool

AdminTool offers an automated way to manage people and users. If your company uses Notes or Domino, the standard way of doing things was to have an Administrator add, delete, and otherwise manage users and groups. It would be up to an individual person to accomplish tasks, like giving users access, changing user names, and removing members so that they can no longer gain access once they've stopped working with the project or company.

security, Automation

Top 7 Tips to Help Staff Adopt New Technology

Your staff is your greatest asset and they can also be your biggest weakness. We know that staff mistakes account for a high percentage of data breaches. It's imperative that training is in place to prevent the simple mistakes when you adopt new technology or even in using standard programs. New software, programs, databases, and platforms quickly fill up our daily routines. With all of the coming technological advances, it's important that your staff is well trained to handle any new systems to help mitigate error. But training itself becomes an issue that many companies don't want to contend with because it promises a drop in productivity.

tips and tricks

Top 5 Cyber Security Issues for Corporations

If it seems like cyber security issues have been the most talked about IT issue for the past ten years, it's because they have been, and for good reason. The Internet of Things has made it possible for hackers to access information that was once only possible to find through carefully carried out real world attacks. The good news is that we keep making advances to thwart new techniques to garner information and compromise corporate security. The bad news is, the hackers are exceptionally inventive and they continue to find ways to take advantage of weak points in security where they can find them. For IT security experts, the focus is in staying ahead of the coming attacks and meeting challenges in real time to diminish impact.

security

The Importance of Employee Training

When you think of employee training, you're probably considering the cost in onboarding a newly hired employee. You might be considering the expense in training existing employees to learn new software or technologies. And you likely know that training is an essential expenditure in reaping the best rewards from your staff. What you might not know is that training plays an integral role in staff retention. In fact, 70% of workers say that training and development have a direct impact on their loyalty to the company. Employees who aren't being challenge or don't feel that they're being trained and developed in an advantageous way will be less satisfied with their position and more inclined to look for other employment opportunities. 

security

Administrator Authority and Security Considerations

Your company is most likely aware that data breaches, or the theft of internal information, often comes from the inside. Recent numbers suggest that as much as 50% of all data theft comes from internal employees, not the nameless, faceless hackers people often worry about. Most companies spend some time with training issues that can help in the realm of employee negligence, which does cause a percentage of the problem in diminished security. However, many large companies haven't addressed something far more insidious - possibilities of data theft from administrators.

Domino Admins, security

Priorities for IT Professionals in Insurance

For IT professionals in insurance, it's imperative to keep on top of the latest advances. While this is true for every industry, Insurance has some specific complexities that make security and accuracy even more essential. Across every business, there's a great push to make sure that client satisfaction is realized in real time. This means that consumers expect fully functioning web portals and instant information on their current policies, as well as recommendations for their future needs. For the IT professional, the responsibilities include maintaining the essential accessibility of client portals, as well as programming, security, and data analytics to maintain the best possible efficiency for staff members and agents.

Support, security

The Imperatives of Data Security Compliance

Technology offers us access to worlds of information. With access to personal records, your company has a responsibility to stay current and compliant with regulations in data security. There are many governing bodies and specific laws to consider. For companies that operate on a global scale, there's a need for compliance with local, national, and international regulations. There may also be a cross section of applicable regulations depending on the industry. For instance, any entity dealing with medical records will need to be compliant with HIPAA but may also need to maintain compliance with the Payment Card Industry Data Security Standard (PCI DSS) if they're collecting credit card information for payment.

security

What an IBM Domino Admin Really Needs from a Configuration Tool

When an IBM Domino Administrator opens their computer there are distinct aspects of the tools they use that can make life easier for them to do their job or make it unnecessarily difficult. What an administrator really needs from a configuration tool is the ability to delegate tasks while streamlining processes with a simple rather than complex tool. As with all admin tools, there is a definitive need for it to work smoothly and be configured to work with currently used processes.

IBM Domino, ClientGenie, Admin Tool

What is the "Yellow Bubble" and How Did it Come About?

Origin of the Yellow Bubble

Over the years, Lotus Notes and Domino has attracted a fierce community of users, fans, and admirers who refer to themselves as the Yellow Bleeders. So it isn't surprising that since the inception of Notes and Domino, a massive, dedicated, and tech-savvy community of fans and users has grown around it.

IBM Domino