(630) 279-0577

Millennia Group Blog

Collaboration requires collaboration

Tuesday, August 14, 2018

Every business wants its staff to perform at its peak and to get one plus one to equal three through communication and collaboration.  Collaboration can be complicated, even with technology.  Maybe the best way to highlight how complicated collaboration can be, is to think about the creation of a report that summarizes a new project.

The report could span multiple departments or even include inputs from outside parties.  Therefore, security becomes an issue.  Some collaboration may be parallel such as when working on budget numbers simultaneously in an online spreadsheet.  Other collaboration may be sequential wherein the spreadsheet then provides input for the narrative part of the report – can’t start one without the other. The archival of the completed report needs to be managed as well.  These are all issues that make any single technology solution a difficult fit.

 text

Downsizing and De-cluttering

Monday, July 30, 2018

via FlickrIn essence, a good records management policy and effort helps companies continuously downsize and de-clutter.  That is not to say that the company moves to a smaller space or reduces headcount.  In this context it is the systematic process of eliminating information that is no longer legally required or relevant to the business.  This sounds fantastic for every company and every employee doesn’t it?

It sounds great to have less irrelevant information to sift through and maybe clearer lines of site to people in cubicles around you, unless you like to work in a bunker.  New office space configurations and the wave of digitization have reduced the chances of boxes piling up.  But even those pesky digital files need to be purged every once in a while.  So why is it so hard to do?

 text

Are you who you say you are?

Thursday, July 12, 2018

via Flickr -  David Martyn HuntIf you’re a fraudster you can easily obtain a fake driver’s license or passport.  You can create a fake social media profile complete with fake friends.  It’s difficult to confirm the actual identity of someone without a DNA profile or finger print on file with the FBI.  And that is for confirming someone in person much less remotely.

The widespread use of electronic signatures has taken longer than some people expected and that is partially due to the ability to verify the signers.  If we could feel as comfortable with the validity of the electronic signature as we do with a wet signature, electronically signed documents would become the norm.  But electronic signatures come in varying degrees of authenticity so which one do you use?

 text

Too many to choose from

Wednesday, June 27, 2018

Via Flickr - Chris WinterDo you ever marvel at the number of choices available in the bottled water aisle at any grocery store or online market? There are dozens of options to choose from.  How about barbeque sauces, bourbon, pizza or crackers?  There are far too many choices and it gets frustrating and time consuming to make any kind of decision.

This has some similarities to the frustration many people experience when they are searching for a file at work.  They may find a copy of the file duplicated in multiple places.  Determining which copy is the final version is both time consuming and frustrating.  The process of de-duplicating is not an easy task, but reducing our choices has obvious benefits and it can be done.

 text

Blockchain will heat up your document strategy

Thursday, June 14, 2018

via Flickr - sicilianoWe recently attended and exhibited at a technology trade show for the commercial real estate industry. The technologies that were in the spotlight were wide ranging from remotely monitored and controlled water values to AI solutions for recurring administrative tasks. Less “hot” technologies were also represented like accounting, lease management and of course workflow and document management systems.

Blockchain is poised to spice up the future of the document management world. There is quite a way to go before transactions are conducted and documented with blockchain documents. However, the concept is promising and it is sure to have an impact on how documents are stored, created, shared and even alter the definition of a document.

 text

Email is not dead, just mature

Tuesday, May 15, 2018

via Flickr - Quinn DobrowskiYour email solution used to be both your communication tool and document management solution.  Everyone was sending messages and documents to everyone else and then just creating a nice neat (sometimes) folder structure to save the emails for future reference.  For a while that was a tremendous improvement over phone calls, stacks of paper and filing cabinets.

Then came the demand for corporate wide information access and individual user email accounts were demoted and retention policies were implemented.  The next dagger was the lack of encryption on standard email such that corporate information was therefore at risk.  Possibly the final blow is that email became a spam fest.  But wait, email is not dead and there are good reasons why.

 text

Derby Day is coming, place your bets

Tuesday, May 01, 2018

via Flickr - Phil RoederIt’s completely acceptable and a lot of fun each year to take some risks and place some bets when the Kentucky Derby is run.  The riskiness of the horse you choose is usually based on a personal hunch, minimal research or discussions with a spouse, family or friends.  The amount of loss is known up front and may or may not have anything to do with the riskiness of the horse selected.

If only all risk assessment was so easy.  When you look at real life risk assessment as it relates to your company’s information assets, it’s a very complicated issue.  Here are some basic points that should be considered when trying to protect (aka mitigate risk to) your information assets like documents and data.  Avoiding a data breach is a bet that you really want to win.

 text

Friday the 13th can happen any day

Thursday, April 12, 2018

via Flickr - Stefano CobucciNormally we don’t do a blog post on a Friday, but since this is Friday the 13th it seems like a good time to remind everyone that document disasters can happen any day.  The cause of these disasters is usually us and we can screw up today or any day.  So be careful, be diligent and try to be organized.    

What are the typical disasters that can happen?  Accidental deletion of a document, a file dragged and dropped into the abyss, version nightmares ie. V1, V2, V998 and counting, files that are too large to email or upload or download, and on and on. 

 text

Has efficiency peaked with mobility?

Thursday, March 29, 2018

Via Flickr - Giorgio MontersinoIt seems simple to envision the tools required by a mobile worker.  The basics quickly jump to mind including a phone, a laptop, chargers of course and a Starbucks or Panera card.  Then you need a location, which could include a home office, an office suites membership or the aforementioned coffee shop.

The real tools of the trade are more software oriented.  It’s critical to have a fully cloud based infrastructure or a VPN that provides access to your CRM, accounting system/ERP, messaging app, email and of course documents.  The emergence of technology and the disappearance of ledger books, the Rolodex and filing cabinets resulted in amazing efficiency gains.  Now that these tools are also available to mobile users, has efficiency peaked?

 text

Security shaming is working

Thursday, March 15, 2018

Via FlickrOkay, maybe security shaming is not the proper way to describe security awareness training.  No matter how its labeled, it’s working.  We don’t receive emails with employee or patient lists attached.  We aren’t given access to a Box account where we can see all company information instead of only the one folder we should see.

More and more we recognize the need to share information in a secure manner.  Nobody wants to be the one who accidently released a million names and social security numbers.  Security awareness training, a standard ritual now at most companies, is effective at helping to prevent accidental releases, but ensuring that information is securely shared could be a lot easier.

 text