PwC’s 2016 Annual Corporate Directors Survey

board-replacement-influencePwC´s survey presents the findings excellently boiled down to 10 major topics. When you read  finding 1-5 and think of any team at any hierarchy level of an organisation or a startup team you might conclude: ever same situation. So one conclusion is probably fair. They are only human. All of them.

Then again, in reality, boards are under direct influence of their shareholders and investors respectively, unlike teams at different other levels. Teamwork here becomes essential. It’s about leadership and ability to cooperate with the fellow board members. Board members often times were not selected for their proven track record in teamwork, though. Instead, extraordinary results in the discipline they are hunted for are key criteria. Teamwork therefore is the greatest challenge for these teams. They are composed of individual experts that bring along a load of ego but know the rules.

Conflicts in the team will lead to the elimination of the “Trouble Maker”. So in order to not risk the job people form a team that actually often times – and the PwC study results say to an extend of 35% – should be composed of different people. According to the team members. But they will not say so loud because it is risky for their own job.  This pattern is similar to startups and it requires experienced business angels to truely coach their teams to overcome this build in trap.

Read the survey findings at PwC USA website

qonnect Cockpit Push Mitteilungen

nl_desktop_notifications_00-940x425 Push Mitteilungen haben auch in das qonnect Cockpit Einzug erhalten. Sie erhalten so kurze Updates über die Aktivitäten Ihrer Kunden auf der qonnect Plattform. Das tolle dran ist: diese Nachrichten sind „ephemerisch“, d.h., sie sind nur kurzzeitig verfügbar (in der Mitteilungs-Sidebar am Desktop). Dort sehen auf einem mit Blick das Wichtigste, wie z.B. Anzahl der qonnections, Anzahl der Likes oder wie oft Ihre Kunden auf den Call to Action geklickt haben.

Wie funktioniert das nun? Ganz einfach: wenn Sie das Cockpit öffnen, werden Sie gefragt, ob Sie Push Mitteilungen empfangen möchten.


Bejahen Sie dies, erhalten Sie ab sofort Push Mitteilungen. Selbstverständlich haben Sie die Kontrolle über die Push Mitteilungen: Sie können das jederzeit in den Einstellungen aktivieren und/oder deaktivieren. Sie benötigen dazu einen Apple Rechner mit dem Safari Browser. Andere Browser (z.B. Firefox, Chrome) werden derzeit noch nicht unterstützt.

Mehr zu qonnect

Neues Nanopage Design

np-940x425Nano kommt aus dem Griechischen und bedeutet eigentlich „Zwerg“. Dass Zwerge dennoch zu großen Dingen fähig sind, wissen wir nicht zuletzt durch Game of Thrones oder Lord of the Rings, wo kleinwüchsige Menschen zentrale Rollen spielen.
Ähnlich verhält es sich mit der qonnect Nanopage, die für Ihr Unternehmen automatisch angelegt wird. Sie ist Ihre mobile Visitenkarte im Internet und dient als Einstieg zu Ihrem Unternehmen auf qonnect. Immer mehr Unternehmen setzen auf die qonnect Plattform für den einfachen Aufbau und die Umsetzung ihrer ganz spezifischen Customer Engagement Strategie.

Das qonnect Team hat nun die Nanopage komplett überarbeitet und einem Facelift unterzogen. Sie ist moderner, frischer und wir haben viel Freude damit. Besondere Dank gebührt an dieser Stelle Paulo und Rohit welche die Nanopage redesignt und programmiert haben – 👏👏👏. Das Team von qonnect hofft, dass Sie ebenso viel Freude mit dem neuen Design der Nanopages haben und würde sich über Feedback von Ihnen sehr freuen.

Mehr zu qonnect

Danger at your doorstep

csm_5_tamper-proof_history__fotolia__50177d29e8Five tips for protecting your company against insider threats

Many companies think of hacker attacks – such as those involving ransomware, Trojans or malware – as the biggest risk to security. However, network vulnerabilities are not always exploited by outsiders. The company’s own staff may have wide-ranging access permissions and use these to misuse corporate data. Few organisations are as well-equipped with tools and measures to block insider attacks as they are against threats from outside. The following five tips help companies ensure that they’re effectively protected against data loss and theft by insiders.

1.    Implement a range of different access permissions

To protect sensitive data, it’s important to ensure that staff from different departments have the access permissions they need for their job. That helps firms enforce a “need-to-know” principle. In other words, employees can’t access certain documents or data unless they need them for a specific task or project. Using varying permission levels, companies can set up “Chinese walls” within the company that prevent information being shared between departments. This measure helps to limit the impact of any loss of data.

2.    Use highly secure two-factor authentication

It’s a good idea to implement two-factor authentication as a further measure to minimise risk. To access the system, users enter their password first, but also need to enter a pin number that is texted to their mobile device and is only valid for a single session. As a result, insider attackers can’t access sensitive information or data – even if they have stolen other users’ passwords.

3.    Shield your information

Operator shielding provides an extra layer of security for data – because IT providers and operators should not have access to your files and documents under any circumstances. And administrators’ access rights should be strictly limited to the information they need for their job.

4.    Implement information rights management

You can use information rights management technologies to monitor your sensitive documents and prevent them from being downloaded by unauthorised users. IRM is an effective way to ensure you keep control over your documents, even when users have the necessary permissions to access them. In addition, watermarks can be embedded in them dynamically, helping to prevent users from making screenshots. These measures help to ensure that data stays within a protected environment and doesn’t fall into the hands of third parties or anyone not involved in working on it.

5.    Record activities in a tamper-proof history

Logging every activity in a tamper-proof history helps you hinder data theft by insiders and – if an incident does arise – to find out exactly what happened after the event. That gives you transparency and traceability throughout the information flow.

Mark Edge, Regional VP of Brainloop, comments on the growing threat of insider attacks: “Over the last few years, we’ve observed how data loss incidents can increasingly be traced back to insiders. Companies often make it very easy for their staff to access and distribute sensitive data due to insufficient security standards and precautions. Yet the company’s image isn’t the only thing to suffer in cases of data theft. The financial and legal consequences can be considerable and even threaten the firm’s survival. This is why Brainloop recommends that companies implement and comply with the standards described above to minimise their exposure to risk.”

More on brainloop

Get in touch with us!