News
21/9/2020Winners of the prize game at the ADMA gathering
As part of the ADMA gathering, on 18 September 2020 we concluded the prize draw at the Mikrocop booth.
News
15/9/2020This year's first live event at the ADMA gathering
Our first live appearance at this year's events will be this year as part of the ADMA gathering, which takes place in the Portorož Auditorium from 17 to 19 September.
Blog

Business process optimization as a precondition for digital business
Companies which simply digitized their processes and procedures as they were cannot be satisfied with their digital transformation since it has brought nothing but extra costs and trouble.
Blog

Starting points for the implementation of internal rules
When electronic documents have been uploaded to a server, this does not mean we have done enough to preserve their integrity, authenticity, availability, usability and permanence throughout the life cycle.
Blog

Harness the information chaos with a digital office
The coronavirus crisis has exposed all the weaknesses of paper-based business. Effective document management and on-time execution of tasks today requires a digital office.
News

Mikrocop sponsor of the ZAUH 2020 conference
The focus of the ZAUH 2020 conference is on the use, capture, management and storage of digital materials in modern business environments.
Blog

Digital maturity as a competitive advantage
Digitally mature companies exploit the digitization of their operations as a tool for growth and revenue increase, while others risk being overcome by their competitors and left behind.
Blog

E-storage as an integral component of digital reality
We should never underestimate the challenges of providing accessibility and usability of business documents while preserving their integrity, authenticity and permanence.
Blog

Data security depends on how much we care
Data breach – intentional or unintentional – is very often a result of our own (un)doing. To minimize the risk, we need to carry out regular data security training for our staff, showing them on concrete cases how they should respond to data theft attempts.