What is Remote Work?

There’s a steady rise in remote work positions. Why do people and businesses choose to work remotely, and how do they do it?

Remote employees work either from home or outside of the traditional working environment, such as at an office or on a specific job site. It increases morale and encourages successful completion of tasks and goals in a much more efficient, timely, and cost-effective manner.

All remote work can be summed up into two distinct categories:  

  • A fully remote job allows an employee, whether they be part-time, full-time, or on a freelance basis, to work 100% from home without needing to commute to an office location.
  • A partial remote job offers employees some remote work capabilities but does not allow the employee to engage in their work without visiting the office or job site at least some of the time.

So how does a company decide whether they should go the fully or just the partial remote job route? This largely depends on the type of job, but the tree deciding factors usually are:

  • Travel is a necessary part of the job.
  • Staff meetings and face time is required.
  • Certain aspects of a particular job can not be done from home or outside of the office.

Whether full-time or part-time, one thing is for sure, remote work is no longer considered a trend but is now a fully viable option, as is confirmed by numerous studies and statistics, which we will address right now. Read more

Migrate On-Premise Files Shares to Azure Cloud File Storage

cloud file storageLooking to migrate Windows File Shares to cloud file storage? You’re not alone!

Businesses of all sizes have been searching for the right mix of technologies that will allow them to migrate their on-premise file shares to cloud file storage.

For small businesses and startups, services like Dropbox, Box, Egnyte and SharePoint are a good alternative. 

For larger businesses, governments, higher education and compliance restricted firms, migrating away from private cloud file storage under their own control requires significant planning. 

Larger companies are concerned about the loss of file ownership, data sovereignty, compliance, ongoing costs and navigating costly and complex migrations.

These businesses are considering migrating their file shares to cloud file storage so that they can outsource the management of servers and infrastructure while still desiring to maintain control of their company files and sidestepping the software vendor lock-in associated with EFSS.

Until now they could meet some of these requirements with costly Enterprise File Sync and Share (EFSS) systems on-premise however they were still stuck managing complex migrations, having new databases to manage and license and re-inventing long term backup and data retention plans.

These businesses have been searching for a simple alternative cloud file storage sharing option that provides the same benefits of traditional mapped drives, fast local speeds and secure file remote access. 

The technologies to enable cloud-based file server file shares are now converging with all the components needed to make this dream a reality! Read more

MyWorkDrive Version 5.3 Preview Now Live

We are pleased to announce the preview release of version 5.3 of MyWorkDrive server, Mobile and Mapped Drive Clients.

New Features

Version 5.3 includes many new features requested by our customers including:

Server

  • Support for multiple mapped drive letters
  • Admin panel updates to support shared public user
  • New licensing process to ease support for upgrades and migrations
  • Security updates to cookies and headers
  • Added preconfigured shibboleth SAML integration
  • Customized password expired and lockout messages

Numerous other enhancements and fixes.  Server release notes here.

Mobile Apps

  • Open files in local app
  • Download multiple files
  • Upload multiple photos
  • New file display by date/name
  • Display company custom logo

Web Browser Client

Windows Mapped Drive

Numerous other enhancements and fixes – Release notes are here.

Mac Mappped Drive 5.2.1

  • Display company branded logo
  • Improved Office file locking support
  • Remind user to install Fuse during setup and launch
  • Bug fixes and enhancements – Release notes are here.

 

Version 5.3 also includes support for additional SAML providers including a built in integration for Shibeloth.  During the webinar we provided an in-depth demonstration of our multiple mapped drive letters and shared public user features.

In addition to 5.3 preview we have updated Version 5.2 production with important updates to file locking to support extended refresh of file locks in Office Online and our mapped drive and numerous other fixes.    We recommend all customers upgrade to our latest 5.2 production server build 5.2.18 and mapped drive client 5.2.2.   See our server release notes here. 

Webinar Recording Link

Questions? Need a trial extension? Email us at sales@myworkdrive.com or Phone: 877-705-4997

 

MyWorkDrive Version 5.3 Preview Webinar Recording Now Live

We are pleased to announce version 5.3 of MyWorkDrive server, Mobile and Mapped Drive Clients has been previewed during our Webinar held on May 9th, 2019.

Features

Version 5.3 includes many new features requested by our customers including:

  • Multiple Mapped Drive Letters for each Share
  • Shared Public User Access
  • File Filtering and Alerts
  • Open/Save Multiple Files in Mobile Client
  • Zip and Share files from the Web Client
  • Server Admin Panel Enhancements

Version 5.3 also includes support for additional SAML providers including a built in integration for Shibeloth.  During the webinar we will an in depth demonstration of our mobile app that now includes support for iOS files provider, Image previews and new offline capabilities.   With iOS file provider enhancements user’s can access, upload, download and edit files stored on MWD shares from any app.  See our updated mobile user guide here.

MyWorkDrive CEO Dan Gordon says, “We are very excited to these major enhancements for secure file remote access from any device or authentication provider.   With these speed and functionality improvements, now more then ever, our customers can eliminate file share VPN security risks while enabling their users to work from anywhere without VPN or remote desktop login headaches.”

Webinar Recording Link

Questions? Need a trial extension? Email us at sales@myworkdrive.com or Phone: 877-705-4997

 

MyWorkDrive Version 5.2 Released to Production

We are pleased to announce version 5.2 of MyWorkDrive server, Mobile and Windows client is now available for full production download.  This release includes a major update that now supports logging in using ADFS/SAML from any device when connecting to server version 5.2.  With this update secure remote access using Windows and Mobile Apps from any SAML provider with two factor authentication is now possible.   An example would be Azure AD integration with MFA enabled – When enabled in MyWorkDrive and ADFS/SAML is set to required, users can access MyWorkDrive shares with our  Mapped Drive and Mobile clients using SSO and MFA Two Factor as part of Azure AD.

Version 5.2 also includes a major overhaul to our mobile app that includes support for iOS files provider, Image previews (5.2 server required) and new offline capabilities.   With iOS file provider enhancements user’s can access, upload, download and edit files stored on MWD shares from any app.  See our updated mobile user guide here.

MyWorkDrive CEO Dan Gordon says, “We are very excited to these major enhancements for secure access from any device or authentication provider.   With these speed and functionality improvements, now more then ever, our customers can eliminate file share VPN costs and security concerns while enabling their users to work from anywhere without VPN or remote desktop login headaches.”

 

New Version 5.2 features

Mobile Apps

  • Login using ADFS/SAML provider
  • Prevent password saving policy support
  • iOS files provider support for accessing files in any app

Web Browser Client

  • User favorites to folder locations
  • Alternative viewer for large text files
  • Improved support for ADFS and SAML SSO providers

Windows Mapped Drive

  • Login using ADFS/SAML provider
  • New command line options for unattended setup
  • Improved login/logout performance
  • Improved handing of custom branding
  • Numerous other enhancements and fixes – Release notes are here.

Mac Mapped Drive

  • Speed and performance improvements
  • Login using ADFS/SAML provider
  • Support for server password policies
  • Bug fixes and enhancements – Release notes are here.

Server

  • Administrative Alerts for file downloads, delete or modify
  • Simplified SAML setup for Okta and OneLogin
  • Export/Import of settings for easy backup/restore
  • Azure AD single logout support
  • Numerous other enhancements and fixes – Release notes are here.

*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at sales@myworkdrive.com or Phone: 877-705-4997

Cloud storage: Is it for you?

Cloud storage is a model of computer data storage where files are stored in logical pools.  With Cloud Storage, the actual physical storage typically spans multiple servers (which can also be in located in multiple physical locations).   While the storage is typically owned and managed by a hosting company many organization have their own private cloud storage.   Cloud storage can fit the demand for convenience, mobility and cost-efficiency for data storage. With all of the advantages cloud storage provides, do not forget security.

The sophistication of the security options available for cloud storage are growing but there is no single set of solutions yet available. Just as there are layers of security required for on premise storage, even more are required for securely transporting, storing and accessing data in the cloud. Your data will be in the hands of a third-party. Security measures must be examined prior to selecting a vendor. Do not let cost be the determining factor in your vendor selection.

Cloud Storage Security

The cloud provider chooses authentication, authorization, and access control mechanisms that meet their needs to host multiple tenants in their cloud. Choosing the cloud provider that best meets your business and security needs are the primary selection criteria for choosing a cloud vendor. The vendor is responsible for securing your data on their servers. They will select the firewalls and chose the security polices they will enforce. Make sure those polices meet your needs. Insuring your data is safe and accessible to only you, this is what you are paying for. Limit security risks by encrypting the files before transferring them to the cloud storage location. Use a vendor that allows you to maintain your own encryption keys, instead of the cloud storage provider retaining them.

The portions of security the end users are responsible for need to be easy to use, flexible to manage and secure. The more complex the security the more effort the user will expend to get around them or ignore them. For a security solution to be effective, it must be used as designed and deployed. Citrix remote desktop is not only very expensive it is difficult to use and support. VPN’s are often not used because of the complexity of this technology. Your access solutions needs to be easy to use and not require a lot of training for the end user or the support staff.

With so many mobile devices accessing your data from different locations around the world, the tools you use to access your data must have excellent security. Security that not only prevents remote devices from being used by the wrong person (DUO, SSO), uses encryption in transit to and from the server behind the firewall. Insure no data is left behind on the remote device after the transaction has been completed.

Ease of Use

Usability is one of the biggest changes that cloud storage brings. Most solutions address both Mac and PCs. They use the ‘drag and drop’ option, moving any file easily to your cloud storage device. Backup and Disaster Recovery systems are a lot more user-friendly. Once set up, backups can be done quickly and automatically. Simpler interfaces are easier to use and manage; reducing the burden of extensive training.

Accessing Files in the Cloud

As long as you have an Internet connection, you have access to your files in the cloud. The cloud storage server is device agnostic, you can access your files with any Smartphone, notebook, tablet, laptop, desktop or thin client workstation using iOS, Windows, Unix or Android OS’s.

With the massive growth in remote work. With employees increasingly working from home for at least two days a week, and the growing use of the gig economy labor model, remote access to shared files is essential for worker efficiency and productivity.

Risk Factors

Cloud storage needs to be backed up just like your on-premise file shares. Control your backups; it is your data and your future. If the vendor says they do a full back up of the data, ask how often, where the backup is physically, if they test the backup and if you can restore and run your business quickly from that backup. Good backups are the best defense against disaster.

Data format and migration is another consideration since files migrated to proprietary hosted cloud storage will be converted away from NTFS native file storage with built-in security permissions to the vendors format making portability and future migration away from the vendor difficult. If possible choose a cloud storage vendor that natively integrates with Active Directory NTFS permissions and groups to maintain future portability.

Most cloud service providers are reliable; however, they are only as reliable as your Internet connection. Having a poor Internet connection can keep your businesses from being able to access your data. Determine your bandwidth needs prior to selecting an ISP or cloud storage vendor.

Ask if you will share a common namespace with other clients of the cloud provider, if you use a single-sign-on authentication option it can make it easier to access your data and increase your risks.

Find out if when you upload your company data to a public cloud provider, if you still own it. Read the fine print in the contract of the cloud providers; find out if that cloud provider, not you, owns the data you save in their cloud service. Read the fine print, details are critical in the cloud vendor contracts.

In many cases issues around compliance or data sovereignty may eliminate some vendors or require the use of files stored in a private cloud.

Rising costs can also be a risk if you do not plan efficiently. Extensive research must be done prior to selecting a vendor to ensure scalability and that costs will remain reasonable over time.

Customization

One of the best benefits in cloud services is the ability to customize the services you need for your business. Even the least expensive cloud service providers can provide levels of customization greater than traditional on premise storage and networking systems. Because these systems are software driven they require very little investment in hardware (if any), so you may be able to afford new and additional services.

Although entry-level systems offer customization, if you have specific needs, care is needed in selecting a provider that best addresses your business needs. Do not sacrifice performance for price.

Conclusion

Cloud storage can be an excellent way to save on capital expense (CAPX) and reduce the internal IT support workload. But buyer beware, thoroughly research the vendor you choose and ensure that they are the best fit to help your company succeed and maintain control of your data in the future if you need an exit plan. MyWorkDrive provides the ability to maintain control of files using your own private cloud storage or interfacing with Azure File Share Sync or Netapp OnTap storage providers.

Data Loss Prevention Strategies

Data is the lifeblood of your business. How do you protect it?

Data Loss Prevention

What is Data Loss Prevention (DLP)?

With information security theft on the rise, enterprises must find effective ways to protect their data, and many such enterprises are turning to data loss prevention (DLP) implementations to secure their networks. Data loss is a serious issue for any business of any size. Losing files means losing time and money to restore or recover information that is essential to your business. Data loss occurs when data is accidentally deleted, stolen, or corrupted. Viruses, physical damage to memory devices or formatting errors can render data unreadable by either humans or software. Losing files and documents often have a lasting impact on your company’s financial health.

Some data is recoverable, but this process can require the assistance of IT professionals and will cost time and resources the business could apply elsewhere. In some instances, lost files and information cannot be recovered, making data loss prevention even more essential. You can minimize your business’s potential for data loss by understanding what leads to data loss.

DLP is also a policy issue.

Identify where the existing data resides and how this data is classified. Examine controls and data stores currently in place. Focus on first protecting the most sensitive category of data. In a large enterprise, it is advisable to start with a small segment of the network, rather than tackle the network as a whole. Only when the most sensitive category of data has been protected throughout the enterprise is it safe to move to the next tier.

The focus of DLP is to prevent confidential information from leaving the organization and from being accessed by unapproved recipients. At the very least, DLP should be able to detect when such an event occurs. This is assuming that the organization has boundaries; with the implementation of a document classification matrix and with strong policies in effect, confidential data is likely to be segmented into secure data stores (rather than being copied to the cloud), thereby implementing boundaries.

Effects of Data Loss on Businesses

Data loss is a major inconvenience that disrupts the day-to-day function of any business. When important files and documents are lost, your business must spend time and resources recreating or recovering these files to fill the gaps left by loss. While you may be able to locate hard copies of information, these may not be as up-to-date as the digital copies that were lost. Data loss caused by corruption or viruses poses particular problems as the extent of data loss caused can sometimes be difficult to determine. It can be costly for your business to weed out and repair damaged files.

Data Loss Prevention Strategies

With information security theft on the rise, enterprises must find effective ways to protect their data, and many such enterprises are turning to DLP implementations to secure their networks. Data Loss Prevention strategies have been evolving for several years. Successful implementation of DLP requires that it be approached as part of an overall program, rather than as a technology solution. DLP protection is limited to documents within the perimeter of the enterprise, or those documents stored on enterprise-managed hardware.

Since data is everywhere in the Enterprise there is no one tool by itself that can fully protect your data. To implement an effective Data Loss Prevention solution multiple layers of policy, procedures, and toolsets are required. Many of these seem like common sense, and most are basic to normal operations of a functioning Enterprise. The trick is to make sure that they all overlap with no holes for data to leak thru. Since data can only be fully protected and controlled by maintaining the location of your data; behind your firewall with all of the multiple layers of data protection that you can provide.

Operational Integrity

  • Monthly Computer Hygiene: Defrag HD, Delete duplicate/unnecessary files, run anti-virus/anti-malware
  • Patch Management
  • Software Upgrades
  • Endpoint protection: Anti-Virus/Anti-Malware-keep them updated
  • Monthly Server Maintenance
  • Server/workstation Backup: 3 backups-2 different mediums-1 offsite (all encrypted) monthly back-up testing

Layered Cybersecurity

Antivirus Software

Cybersecurity technology starts with antivirus software. Antivirus is designed to detect, block, and remove viruses and malware. Use products that are also designed to detect other threats, such as malicious URLs, phishing attacks, social engineering techniques, identity theft, and distributed denial of service (DDoS) attacks.

Firewalls

Firewalls are designed to monitor incoming and outgoing network traffic based on a set of configurable rules—separating your secure internal network from the Internet. Minimizing the number of open ports Firewalls are deployed as an appliance on the network and may offer additional functionality, of virtual private network (VPN) for remote workers.

Patch Management

Criminals design their attacks around vulnerabilities in software products such as Microsoft Office or Adobe Flash Player. As vulnerabilities are exploited, software vendors issue updates to address them. Using outdated versions of software products will expose your business to security risks.

Password Management

Weak passwords are at the heart of the rise in cyber theft, causing 76% of data breaches. Adopt strong passwords, 8 + alphanumeric characters.

Data Protection Technologies

These data loss prevention measures protect against a wide array of cyber-attacks. However, because threats like ransomware are always evolving, security solutions are just one part of an effective defense strategy. You also need solutions in place that enable you to return to operations quickly if you do suffer a cyber-attack. Data protection technologies are an essential second layer of defense against cybercrime.

Controlled Access to Data

Ensure that only the authorized user has access to data on your Network. Use Multi-factor Authentication (MFA) and Single-Sign On (SSO) tools in conjunction with Data Leak Prevention to limit external access, add watermarks and prevent printing or clipboard access.

When accessing corporate data remotely ensure data is encrypted when in motion and at rest. There are multiple technologies that will achieve these results, the key is to choose the one that is the securest, easiest to implement and maintain, and the most economical for your needs.

Occam’s razor essentially states that simpler solutions are more likely to be correct than complex ones. Applying this theory to Cybersecurity, it would state, “The easiest technology to use will be the one most used and thus the most effective”.

VPNs are complex and expensive to maintain and are frequently ignored when the user is stressed and pressed for time (ever been in an airport?). The next level in expense and complexity for remote file access is the virtual desktop technology.  Deploying virtual desktops is a costly and difficult solution requiring extensive hardware and software investment. Supporting this technology requires dedicated engineering support and significant training for your end-users and support staff.   Research, research, research; measure twice buy once.   To avoid complex VPN’s and remote desktop support companies are employing web based file management software to enable secure file access with DLP features built-in avoiding the complexity and expense of VPN software.

Sources: Exabeam, Digital Guardian, NSS Labs

MyWorkDrive Version 5.2 Released to Preview

We are pleased to announce version 5.2 of MyWorkDrive server, Mobile and Windows client is now available for preview download.  This release includes a major update that now supports logging in using ADFS/SAML from any device when connecting to server version 5.2.  With this update secure remote access using Windows and Mobile Apps from any SAML provider with two factor authentication is now possible.   An example would be Azure AD integration with MFA enabled – When enabled in MyWorkDrive and ADFS/SAML is set to required, users can access MyWorkDrive shares with Windows Mapped Drive and Mobile clients using MFA Two Factor as part of Azure AD.

Version 5.2 also includes a major overhaul to our mobile app that includes support for iOS files provider, Image previews (5.2 server required) and new offline capabilities.   With iOS file provider enhancements user’s can access, upload, download and edit files stored on MWD shares from any app.  See our updated mobile user guide here.

MyWorkDrive CEO Dan Gordon says, “We are very excited to these major enhancements for secure access from any device or authentication provider.   With these speed and functionality improvements, now more then ever, our customers can eliminate file share VPN costs and security concerns while enabling their users to work from anywhere without VPN or remote desktop login headaches.”

 

Register for the 5.2 Launch Webinar on Feb 28th

Webinar Registration Link

New Version 5.2 features

Mobile Apps

  • Login using ADFS/SAML provider
  • Prevent password saving policy support
  • iOS files provider support for accessing files in any app

Web Browser Client

  • User favorites to folder locations
  • Alternative viewer for large text files
  • Improved support for ADFS and SAML SSO providers

Windows Mapped Drive

  • Login using ADFS/SAML provider
  • New command line options for unattended setup
  • Improved login/logout performance
  • Improved handing of custom branding
  • Numerous other enhancements and fixes – Release notes are here.

Server

  • Administrative Alerts for file downloads, delete or modify
  • Simplified SAML setup for Okta and OneLogin
  • Export/Import of settings for easy backup/restore
  • Azure AD single logout support
  • Numerous other enhancements and fixes – Release notes are here.

Register for the 5.2 Launch Webinar on Feb 28th
Webinar Registration Link

 

*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at sales@myworkdrive.com or Phone: 877-705-4997

 

California Consumer Privacy Act of 2018 (CACPA), Who, What, When, Where and Why?

CaCPA

Who Does the CaCPA Protect? Who must comply?

Any consumer, defined as a “natural person who is a California resident.” This is further defined as:

  • Any individual is in the state for any purpose that is not transitory or temporary
  • Any individual who lives in the state but currently or occasionally is outside the state for a temporary or transitory purpose

Meaning consumers traveling to or with partial residence in other states would be protected, as long as their home is California.  This also means that the law applies to “business-to-consumer” (B2C) companies and to “business-to-business” (B2B).

A covered “business” is defined as a for-profit entity that meets 1 of the 3 following conditions.

  1. Earns $25 million or more in annual revenue.
  2. Holds the personal data of at least 50,000 people, households, or devices.
  3. Obtains at least half of its revenue selling personal data. Selling, is not just trading data for cash. Merely disclosing data to a third party if it results in financial gain, is subject to the law.

CaCPA states that that they must also meet the following 4 conditions.

  1. Be a legal business entity that is organized and operated for profit.
  2. Collects consumers’ personal information, or has someone collect it on its behalf.
  3. Determines the purposes and means of the processing of consumers’ personal information.
  4. Does business in California

Any “for profit business” passing this test will be subject to the law, regardless of its geographic location. According to iapp it is estimated the law will apply to more than 500,000 U.S. companies, most of which are small- to medium-sized. It will also impact businesses outside the U.S., as long as they do any of their business in California.

What Is the Penalty for Noncompliance?

For intentional violations not addressed within 30 days, the fine is from $2,500 to $7,500 per violation (e.g., per record in the database). Unintentional violations not addressed within 30 days, Consumers are able to recover damages in an amount not less than one hundred dollars ($100) and not greater than seven hundred and fifty ($750) per consumer per incident or actual damages, whichever is greater.

Twenty percent of the penalties collected by the State will be allocated to a new “Consumer Privacy Fund”. Any funds in excess of Court and collection costs may be placed in the CA State General Fund.

Where Did This Law Come From?

The CaCPA was rushed through Legislation in just 7 days’ time and was signed just hours before the closing of the 2017-18 California legislative session. Speedy for a Law with such widespread ramifications.

This rush was in response to a much stricter ballot initiative proposed by San Francisco real estate developer Alistair Mactaggart.  Mactaggart spent $3.5 million of his own money to fund initiative measure No. 17-0039 which received more than 629,000 signatures, more than enough needed to put the issue on the November 2018 ballot.

How Does the CaCPA Define “Personal Information?”

CaCPA’s definition of personal information is much more extensive than the definition of PII, it does align more closely with the broader list in the GDPR. It’s defined as “information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.” In addition to the information typically included under PII, it also includes:

  • Geolocation data
  • Education information
  • Audio, electronic, visual, thermal, or similar information
  • Professional and employment information
  • IP addresses
  • Internet activity (i.e., browsing and search history, web tracking data)
  • Aliases
  • Characteristics of protected classifications under California or federal law
  • Commercial information (i.e., personal property records, purchasing history)
  • Inferences drawn from any of the information contained in the definition

Why CaCPA

Just days before Mactaggart could certify the signatures, California Democrats agreed to push a compromise bill in exchange for dropping the initiative. The tech industry lobbyists believe that they will have a much better chance of controlling the narrative and the ultimate impact of the CaCPA. Industry Lobbyists agreed not to oppose the bill since the much less favorable ballot initiative had a good shot of passing later in the year.

What did they get for their compliance?

  • 18 months’ time to lobby on how to rewrite the details of the bill.
  • CA legislature can modify the CaCPA with a simple majority instead of a 70% super majority required by the CA Consumer Privacy Act of 2018.
  • CaCPA makes it more difficult for consumers to sue noncompliant businesses, giving most of the enforcement control to the CA state Attorney General.
  • CaCPA affects more companies, as it lowered the threshold by half to businesses with only $25 million annual revenue.

 

“Data regulation policy are complex and impacts every sector of the economy, including the internet industry,” the Internet Association lobbying group said. “That makes the lack of public discussion and process surrounding this far-reaching bill even more concerning. It is critical going forward that policymakers work to correct the inevitable, negative policy and compliance ramifications this last-minute deal will create for California’s consumers and businesses alike.”

The winners and losers of this bit of legislation (10,660 words), have yet to be determined, due to the massive rewriting of the details going on right now. It is very likely that the new and improved CaCPA will apply mainly to the Small to Medium Business, the ones that can’t afford the high priced Lobbyists and their massive expenses. This bill hastily written and barely reviewed by anyone other than its writers with its many typo’s and poorly written text was approved by Governor Brown on June 28th 2018. On Aug. 24th just 57 days later the first 45 amendments came. These amendments were primarily to adjust technical errors. Get prepared.

Sources: Assembly Bill No. 375, iapp The Privacy Advisor, New York Times, FairWarning

 

NextCloud Alternative

GDPR Fines: Blood in the water. Who’s first?

GDPR Fines Against Google

The (CNIL), France’s data protection authority (DPA), has levied a €50 million ($57 million) fine against Google for violating the GDPR’s transparency, information, and consent requirements in deploying targeted advertisements. The largest fine by GDPR to date and the first involving a U.S. technology company was issued on January 21, 2019.GDPR Compliance

The CNIL’s investigation was triggered by complaints from two advocacy groups, None of Your Business and La Quadrature du Net, filed immediately on the GDPR’s May 25, 2018 effective date. The complaints alleged “forced consent,” by which users of Android-powered mobile devices, had to agree to Google’s entire privacy policy and terms of service before using the Android device. Google lacks a legal basis to process users’ personal data as it relates to ad personalization.

Why a €50 Million Fine?

The CNIL relied on four factors in issuing its €50 million fine.

  1. Nature of the infringements relating to lawfulness (Art. 6) and transparency (Arts. 12 and 13), both of which are core principles of the GDPR and listed as triggering the highest fining threshold (of 4% of International Revenue) in the GDPR (Art. 83.5).
  2. Because the infringements were continuous and ongoing after the GDPR’s effective date.
  3. The processing purposes, their scope, and the number of individuals concerned.
    • CNIL’s investigation focused on users who created a Google account while setting up their Android device and noted that this is a very large number of individuals.
    • They contend that due to Android’s dominant market share in the French smartphone market and the number of smartphone users in France, the processing is vast.
    • Also given the number of Google services involved (more than twenty).
      •  The variety and type of data involved
      •  The multiple technological processes that enable Google to combine and analyze data from various services, applications, or external sources.
      • These processes undeniably have a “multiplying effect” on the knowledge the company has about its users.
      • The company has the means for potentially unlimited combinations enabling a massive and intrusive use of consumer’s data.
  4. When viewing the infringements from the perspective of Google’s economic model,
    • The processing of user data for advertising purposes via Android.
    • Advantages Google obtains from that processing,
    • CNIL found that Google must be extra cautious about its responsibilities under the GDPR.

CNIL does not say how it got to the amount of €50 million, but indicates these infringements would be subject to the GDPR’s 4% maximum fine. Fine was based on Google’s 2017 global revenue of €96 billion. It’s clear that the CNIL did not impose the maximum fine. However, other than saying the fine of €50 million was “justified”. CNIL provides no reasoning for this starting amount or how the factors referred to above influenced the amount.

2018 Decisions & Fines

This case against Google represents the CNIL’s first published enforcement action, explicitly under the GDPR and the largest fine it has ever imposed. It also highlights the CNIL’s scrutiny of notice and consent in online advertising, which had been building up in the past months, as evidenced by other recent CNIL decisions.

This fine comes 1 month after Italy’s DPA fined Facebook €10m for misleading its own users over data practices. The watchdog said Facebook wrongly emphasized the free nature of the service without informing users of the fact that their data would be used to generate a profit for the company.

Google was not the first GDPR fine just the largest to date.

The first fine was issued in Austria in October 2018, although it is not strictly related to personal data processing. A betting shop received a €4,800 fine for a security camera that was recording part of the pavement outside since large scale monitoring of public spaces is not permitted under the GDPR.

At the end of October, the Comissão Nacional de Protecção de Dados (National Data Protection Commission) in Portugal imposed three fines on the Hospital do Barreiro: These are the first fines related to the processing and storage of personal data.  Two €150,000 sanctions and another of €100,000. For a total cost of €400,000 for the hospital. The first two fines of €150,000 were for violation of the principle of data integrity and confidentiality, and violation of the principle of data minimization, which in theory prevents indiscriminate access to data. 985 physicians had active accounts on the system giving them access to clinical files, while the hospital had only 296 active doctors on the date of the inspection.  

The third fine was related to the inability of the Hospital as data controller to ensure the confidentiality and integrity of the data of its clients and patients.

In the middle of November, a social network in Germany, Knuddels.de, received a €20,000 fine after a hack that caused 808,000 email addresses to be leaked, along with over 1.8 million usernames and passwords. This information was then published online with no encryption. The social network reacted by saying that once the leak had been discovered, it immediately improved its security measures.

After the incident, it was discovered that the website had no kind of protection on its sensitive information. According to LfDI Baden-Württemberg, the German data protection agency handling this case, one of the reasons that the website received a “relatively low” fine was that it acted with transparency, and quickly implemented security improvements.

Higher Fines Expected in 2019

The economic sanctions so far are clearly conservative compared to the maximum possible penalties allowed, but with the recent spate of high profile data leaks from Marriott, British Airways, and Quora it won’t be long before larger, harsher fines start to appear.

How Can You Avoid GDPR Fines?

What can you do to avoid a fine of millions of Euros or Dollars? The most important thing to bear in mind is that prevention is better than a cure. By having appropriate data leak protection in place for the personal data your company manages, you can avoid sanctions and fines.

  • Start by determining if online storage or on prim is the right solution for your needs
  • Controlling who has access to it
  • Realize that if you use Sync and Share instead of a private cloud file sharing solution, you have just doubled the amount of data you have, and you have also doubled the # of locations that you need to defend. Plus one of these locations you have no control over.
  • Complexity reduces security. The more complex a solution is the less it will be used.

MyWorkDrive to launch Version 5.2 at RSA Security Conference

Major Data Security & Compliance Update for Enterprise, Education, Government, and Financial Institutions

 

San Francisco, CA – January 24th, 2019 – MyWorkDrive, a leader in private cloud secure remote file access, will debut new enhanced security features at the RSA Conference March 4 to 8 in San Francisco.

 

MyWorkDrive is a software-only solution for secure remote access to file servers from anywhere for any device. Users gain access to a secure web based file remote access portal that displays their Windows file shares.  IT Administrators can deploy MyWorkDrive in minutes without Sync, VPN, RDP or migrating data. IT leaders looking for a cloud-like file sharing solution can rely on MyWorkDrive’s ransomware protection and data leak protection (DLP), data governance compliance (FIPS, HIPAA, FINRA, GDPR), enhanced Office 365 real-time online collaboration, with a lower total cost of ownership in comparison to other solutions.

 

“Our growth is an excellent indicator of the need for secure private cloud file access,” said Dan Gordon, CEO, MyWorkDrive. “Customer demand is behind the new file share remote access security features being rolled out in Version 5.2. We strive to provide the rigorous security features our enterprise customers have demanded to keep up with the latest cybersecurity threats, and are excited to debut them in the most important cyber security conference of 2019.”

 

MyWorkDrive connects to Windows Active Directory based File Shares and enables instant file share remote access, online collaboration and editing with Office 365 with the customer’s choice of any SAML or Two Factor authentication provider. The release of Version 5.2 includes important updates and new security features including:

 

  • SAML Login from MyWorkDrive Web, Desktop or Mobile Apps
  • Simplified directory integrations with Azure AD, Okta and Onelogin directories
  • Administrative alerts for excessive file downloads and changes
  • Data Leak Prevention (DLP) enhancements
  • File access without the ability to download, print or copy to a clipboard
  • File extensions can be blocked or approved increasing ransomware protection
  • Prevention of password saving in all applications

 

Data security and regulation compliance requirements are more critical than ever and MyWorkDrive will be exhibiting at booth 6587 where we will demonstrate how enterprises can instantly eliminate VPN Security and support issues, reduce cybersecurity threats and prevent data theft.

 

Join MyWorkDrive with a Free RSA Conference Guest Pass: XEU9MYWRKDRV  Register

 

When: March 4th – 8th

Where: Booth Number 6587, Moscone Convention Center, San Francisco

 

About RSA Conference

The RSA Conference is a series of IT security conferences. Approximately 45,000 people attend the San Francisco conference each year. It was founded in 1991 as a small cryptography conference. RSA conferences take place in the United States, Europe, Asia, and the United Arab Emirates each year.

 

About MyWorkDrive

MyWorkDrive provides a software-only, on-premise data center solution for secure private cloud remote file sharing access from anywhere for any device. Users gain access in minutes without Sync, VPN, RDP or migrating data. MyWorkDrive is for IT leaders looking for a cloud-like file sharing solution that has ransomware protection & DLP, facilitates data governance compliance (FIPS, HIPAA, FINRA, GDPR), enhances Office 365 real-time online collaboration, with a lower total cost of ownership. MyWorkDrive’s rapidly-growing customer base includes Oxford University, Loyola University, Habitat for Humanity, the United Way and the Boston Celtics. MyWorkDrive is privately held, based in San Francisco, California and a product and dba of Wanpath LLC. Visit us at https://www.myworkdrive.com.

 

The Security Risks of Remote Work

The Security Risks of Remote WorkCloud Security Risks

According to industry analyst Strategy Analytics: The global mobile workforce is set to increase from 1.52 billion in 2017, accounting for 39.3% of the global workforce, to 1.88 billion in 2023, accounting for 43.3% of the global workforce. Globalization will continue to drive the growth of mobile office workers in all regions. The latest mobile devices and technologies are now able to meet most of the demands of mobile workers of all types. While the more significant growth opportunities ahead will depend on the mobile internet, as it contributes to developments in the wider digital ecosystem. Mobile internet users are the addressable market for e-commerce, Fintech (Financial technology) and a range of digitally delivered shared files, services and content.

At the same time, mobile security threats are on the rise: according to the McAfee Mobile Threat Report Q1 2018, 16 million users were hit with mobile malware in the third quarter of 2017. Q3 2018 had more than 62,000,000 new malware files reported, with over 820,000,000 total malware files listed. The biggest change was the increase in size of the ransom payment. Past versions required US $1,000, now costs are US $2,400 for the decryption key up 140%.

iPass Mobile Security Report 2018 surveyed 500 CIOs and senior IT decision makers from the U.S., U.K., Germany and France, to examine how organizations view today’s mobile security threats and how employees’ use free public Wi-Fi.

The use of free public Wi-Fi continues to pose the biggest mobile security threat for hotspots globally. With all the varying security credentials, how can enterprises ensure the connections that their mobile workers use are secure? At a time when data protection is paramount, enterprises need to strike a balance between keeping their data and systems secure, while not hampering the productivity of their mobile workforce.

Hacking Risks

The majority (57%) of CIOs suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months.

Wi-Fi Security

Overall, 81% of respondents said they had seen Wi-Fi related security incidents in the last 12 months, with cafés, airports and hotels being cited as the most vulnerable locations. 62% of Wi-Fi related security incidents occurred in cafés and coffee shops. This is perhaps not surprising, as all these locations see a high turnover of visitors each year and the level of security at each hotspot varies. There were also significant geographic differences when it came to Wi-Fi related security issues at airports: more than two thirds (68%) of U.S. respondents said they had seen incidents at airports, in contrast to only 39% in the U.K.

Personal Devices

CIOs believe mobile security risks have increased due to the rise of employees using their own devices (BYOD). Banning employee use of free Wi-Fi hotspots is still the preferred security measure for most organizations but their mobile workers are using them all the time.

BYOD: Bring Your Own Danger?

The concept of bring your own device (BYOD) is now commonplace: despite the large number of people working remotely, Gartner says fewer than (23%) have been supplied with a mobile device by their employer. This can leave companies open to security risks, if they do not have control over the security settings or capabilities of devices that are being used. Enterprises are in a Catch-22 situation when it comes BYOD. Many enterprises realize it can improve not only employee productivity, but also wider job satisfaction. However, there is a trade-off with potential security risks. Survey respondents recognize that the risk has been increased by BYOD, with 94% reporting that they think BYOD has increased mobile security risks.

 

Is Mobile VPN a solution?

Virtual Private Networks (VPNs) can be a way to secure remote connections to data and central systems, providing an alternative to a blanket ban on free Wi-Fi hotspots with an extra layer of security. This solution has to be deployed by the end user each time they wish to connect. VPN usage is increasing: in 2016, just 26% of enterprises were fully confident mobile workers were using a VPN every time they went online, but that figure has jumped to 46% in 2018. That does however leave more than half (54%) of respondents reporting that they still aren’t fully confident that their mobile workers use a VPN every time they go online. This figure leaps in the U.K. and France, where 62% and 59% of respondents, respectively, said they weren’t fully confident that their mobile workers are using a VPN when they go online. There are several barriers preventing mobile workers from connecting to VPNs, including the fact that mobile workers might not want personal data to run over the corporate network and that connecting to VPNs can take extra time. The challenge lies in training employee on the importance of using VPNs every time they go online, and how to connect to one in a quick and efficient manner.

 

Mobile security challenges remain a huge concern

Based on the earlier statistics, it’s not surprising that enterprises remain concerned about the security risk posed by the growing number of mobile workers. Overall, 92% of organizations said they were very concerned or somewhat concerned their growing mobile workforce presents an increasing number of mobile security challenges. There’s a perfect storm brewing: a rapidly growing mobile workforce, the proliferation of smart devices, the explosion of free public Wi-Fi coupled with ever more sophisticated hackers.

 

Conclusion

Companies are increasingly aware of the fact that the huge growth in mobile working presents new security issues to worry about. IT teams are no longer fully in control, as connectivity and access to corporate systems now extends beyond the corporate firewall. The huge, global growth in free Wi-Fi hotspots continues to skyrocket, so organizations outright banning employees from using them is a somewhat ineffective. The fact is, mobile workers will always seek out connectivity, regardless of the security risks involved, if it enables them to get their work done. In todays connected and increasingly ‘Wi-Fi’ first world, companies need a modern mobile working strategy that empowers employees, as opposed to trying to stop them in their tracks. In today’s risk environment the public Wi-Fi is the greatest threat and the ability to use it safely is the primary business goal of Remote Workers.

 

What is Remote Work?

What is Remote Work?

It seems simple enough. Remote work would appear to signify work done outside of an office. But there are so many different terms floating around regarding work flexibility that it’s important to know what each means. There are many names given remote workers: teleworker, iPro, telecommuter, distance worker, homeworker, freelancer, and outworker.  There are also many forms of remote work: Full time, Part time, Job sharing, Gig work, Contract work, Consulting, Road Warrior.  What all this means is that “work” is changing due to technology, education, mobility, security, and the age of the workforce.  Ultimately, what your company’s definition of remote work is will depend largely on your own practices and policies.

Remote Work Successes

While Corporations are struggling to keep up with this change, early adopters of this phenomena are reaping phenomenal rewards.

WeWork

WeWork is an American company that provides shared workspaces for technology startup subculture communities, and services for entrepreneurs, freelancers, startups, small businesses, and large enterprises. Founded in 2010, it is headquartered in New York City. As of July 2017, WeWork had a valuation of roughly US $20 billion and managed 10,000,000 square feet (930,000 m2) of office space.

Slack

Slack is a cloud-based set of proprietary team collaboration tools and services, founded by Stewart Butterfield. Slack began as an internal tool used by his company Tiny Speck. The current valuation estimate for Slack stands at around $8.3 billion based on the 2018 forecasts and estimates for the company.

Dropbox

Dropbox is a file hosting service operated by the American company Dropbox, Inc., headquartered in San Francisco, California, that offers cloud storage, file synchronization, personal cloud, and client software. Dropbox was founded in 2007 by MIT students Drew Houston and Arash Ferdowsi as a startup company.  Dropbox revealed in its SEC filing that it had around 540 million shares outstanding at the end of 2017. Using the $10 billion estimate for Dropbox’s value, this implies a price per share of about $18.50 as of now.

Box

Box, the business software company led by Aaron Levie, reported its fiscal first quarter earnings on May 30, 2018, posting revenues of $140.5 million—a record—and cash flow from operations of $18 million. Its quarterly revenue was up 20% year over year.

Toptal

Toptal accepted a $1.4 million seed round of financing from Andreessen Horowitz and angel investors including Quora founder Adam D’Angelo. In 2015 and 2016, their annual revenue was $80 million and $100 million respectively.  “There’s a network effect,” says Du Val who turned his office-less company into a $100 million-revenue business that connects high-level developers, designers, and finance pros with some 2,000 companies, including Airbnb, Pfizer, and the Cleveland Cavaliers.  Not only are new Start-Up’s enjoying the benefits but also these Fortune 100 companies.

Advantages of Remote Work

Real Estate Savings

The Global Workplace Analytics statistics show that the average real estate savings with full-time telework is $10,000 per employee per year.

Specifically, these organizations found that such options allowed:

IBM to cut real estate costs by $50 million
Sun Microsystems saved $68 million a year in such costs.
Nortel estimates that they save $100,000 per employee they don’t have to relocate.
Recent Global Workplace Analytics studies show that offering workers flex options can boost productivity.
AT&T found its telecommuters worked more hours at home than its office workers.
JD Edwards teleworkers were shown to be 20-25 percent more productive than their office colleagues. American Express employees who home worked were 43 percent more productive than office workers.

Employee/Employer Benefits

• Improves employee satisfaction
• Reduces attrition
• Reduces unscheduled absences
• Increases productivity
• Saves employers money
• Increases collaboration
• Expands the talent pool

Obstacles to Remote Work

• Management mistrust
• It’s not for everyone
• Career fears from ‘out of sight, out of mind’ mentality
• Security issues
• IT infrastructure changes may be necessary

The Evolving View of the Office

The office is rapidly expanding beyond the cubicle.  The number of telecommuting workers has increased 115% in a decade, according to a new report from Global Workplace Analytics and FlexJobs. That translates to 3.9 million workers, or almost 3% of the total U.S. workforce, working from home at least half the time in 2015, an increase from 1.8 million in 2005.

In the EU a study released 29 May 2018 by Zug, Switzerland-based serviced office provider, IWG found that 70 percent of professionals work remotely at least one day a week, while 53 percent work remotely for at least half of the week.  The ability to work from home and the emergence of digital office rental services has led to changing attitudes around where people should work and whether they should stick to the traditional nine-to-five working hours.

Workplace Analytics and IWG both said their studies related to full-time employees rather than the self-employed or contractors. Chief Executive Mark Dixon said that technology was the primary driver of changing perceptions around locations and working hours. “The biggest driver is digital, changing every industry in the world,” Dixon told CNBC in a phone interview. “On the one hand, it’s changing how real estate needs to be offered, but it’s also companies wanting something different in the digital world.” Dixon said that firms are less inclined to invest in real estate and were looking to digital services instead to hire out office spaces. He added that the idea of remote working allows employees to be more flexible.

Who’s Working Outside the Office?

Telecommuters tend to be a little bit older than the average employee: half are 45 or older. They’re also more educated and earn more than non-telecommuters. The average yearly income for most telecommuters is $4,000 more than non-telecommuters, according to the report. Remote work is gender neutral with 52% of work-at-home employees being female. Telecommuting is most common among management positions. Professional, scientific and technical services industries have the highest percentage of telecommuters relative to their share of the workforce.

Employees are expecting more flexible work arrangements, customers are demanding more responsiveness from companies, and the challenge is now for CEO’s to embrace the change required within their organizations to address these needs.

Due to the rapid growth of the workplace, remote-working policies will rival the popularity of fixed office locations by 2025, rendering the future workplace unrecognizable.

MyWorkDrive’s Role in Remote Work

MyWorkDrive fits nicely into remote working strategies by enabling workers to collaborate on files remotely while keeping them stored on company storage with the added security of two factor authentication (to prevent sharing of passwords) and data leak protection to prevent downloads and casual sharing of confidential documents.

Secure Folders

The Art of SAML/SSO and MFA

SAML SSO Integration

Security Assertion Markup Language or SAML is well known by its function and not necessarily by its name or moniker. IT Managers use it on any given day possibly multiple times. With SAML multi device management becomes easier and less stressful and tedious. Simply put, you are able to sign on to one computer and access and perform security functions on other computers. In this current climate of data integrity worries and data leak prevention, being able to authenticate and authorize credentials is critical. SAML makes network security easier to manage.

SSO or Single Sign On is what any executive or front-line staff wants and needs for easy collaboration, streamlined workflow, and smooth operations as more staff work remotely. For example, if your core inventory management database is cloud based and your retail POS has a local server but they have an API that makes them talk to each other along with a dashboard that talks to an on premise file server with financials and you have a single sign on credential for all logins then you are not constantly having to remember passwords or create usernames and secure logins for every point of contact in your enterprise where operations and performance metrics live.

Some security experts’ shudder at the thought of a CEO keeping a post-it note in a drawer with passwords but before you snicker just remember that a lot of Network Security professionals don’t always use a password protector or authenticator either and are prone to losing cell phones at trade shows. You have one key to your front door and this lets you in every time. Don’t make things complicated.

Picture yourself at an airport sitting with your laptop with time to kill before boarding your business flight. On your laptop you have an icon you click open that you enter your single sign on credentials and bingo you are instantly in your home drive at the office and on the server at the colo. You are working at the speed at light and not missing a beat regarding the latest report just updated and saved on the server in the folder marked sales reports. Having a web dav client and being able to instantly, securely, and remotely access your files is a game changer. You can stay agile, productive, and efficient with your time. No need to text the IT desktop support back at HQ to find out who changed passwords all of the sudden or why you are locked out right now.

There is duo authentication which most gmail users are familiar with via entering a phone number to get a text with a code that you enter so you can add another layer of protection to signing in to your email account. MFA or Multi Factor Authentication adds yet more layers and added protections especially if the data you are sharing is critical, classified, and/or for certain eyes only. Many contractors in the government sector as well as in healthcare and research and development are well aware of MFA just like in banking where you have a safety security box locked in a vault behind the closed doors of a bank who also has an armed security guard at the door. Banks and financial institutions use MFA all the time.

You can live dangerously and have all your logins saved to your browser but what if you lose your laptop or you click open a link in an email that renders your machine kaput and has to be taken off the network immediately…what then? You should make a habit of clearing your cache, removing cookies, updating logins and securely storing them somewhere in your own vault of some kind whether that be a platform like LassPass or while also having your enterprise network architecture and data security protocol include SSO. You don’t want staff members being the master of your universe. Don’t make your IT Department lose sleep every night by making them chase down each and every staff member to get updated login credentials. That should be managed from top down. They can have their own passwords, but every platform and software used should have a master admin account that can access everything and that SAML and SSO should live with IT and Executive Management. Terming out an employee should not be a fire drill in getting your network back or worrying who still has access to what.  Active Director integrated with Windows File Server Shares should be managed concurrently, and onboarding or terming staff should have the same consistent protocol each time. You need to be able to pull the plug so to speak on all logins at all touch points to the system based on what level or what clearance the employee had. If you have it related to SSL or NTFS permissions, then it’s not a nightmare to manage. Adding another layer of MFA that you are able to control from internally is also an essential safeguard.

On one side you have ease of use for the employee and on the other side you have ease of control on the management side. Your user base will be very happy being able to log on to all aspects of operations with one sign on credential even if it means they have to enter a code that is generated to their cell phone with a text alert when logging in. Again, this level of security depends on what is being accessed and what permission has been granted to staff member.

What constitutes a work stoppage? Someone can’t get their email? That’s inconvenient but not a reason to fold your arms in your lap and plan on catching the early train home. With SAML and/or SSO all you need is a browser and you are back in business accessing the information you need. It’s always good protocol and policy to have some kind of Multi Factor Authentication on your phone and mobile devices like tablets, etc. Think of it much like an Apple ID account. You have that added layer of having to use your thumbprint when downloading an app and then to purchase and set up an account you still need to enter your Apple ID. You want layers between you and someone else trying to steal your identity, hack your network, or corrupt your files. You also want it to be easy and fast to access your files. Use MyWorkDrive with any compliant SAML solution with streamlined setup of Azure AD, Okta and Onelogin.  Add MFA or DUO as you need to and start working away from anywhere!

MyWorkDrive Awarded Patent for Innovative Secure File Access Relay

MyWorkDrive Awarded US Patent

Secure Remote Access VPN Alternative Start-Up Releases Patented Application

FOR IMMEDIATE RELEASE December 18th, 2018 (San Francisco, CA)

Wanpath LLC, the San Francisco based publisher of MyWorkDrive that enables secure file share access with data leak prevention has been awarded U.S. Patent, No. 9,985,930.  MyWorkDrive also released version 5.1 continuing their strident efforts to provide data leak prevention best practices and data governance compliance with new security enhancements perfect for the Government, Healthcare, Financial, and Educational sectors.

 

The official patent issued is for ‘Reverse Proxy For Accessing Local Network Over the Internet.’  MyWorkDrive software runs in the customer’s own private cloud, connects to Windows Active Directory and enables instant secure file share remote access, online collaboration and editing with O365 while keeping files stored on their existing file shares.  Customers control their own files with no third-party cloud or database migration needed.   Files can be accessed securely using a desktop mapped drive, web file manager browser client, or with a mobile app.  Installation and managing multiple stakeholders in various remote locations is easy with no changes to existing infrastructure.  Regulatory compliance standards including HIPAA, GDPR, FINRA, and FIPS are attained while using MyWorkDrive to securely access and edit files for Enterprise agility, efficiency, lower cost of ownership and elimination of the security risks of legacy VPN clients.

 

CEO Dan Gordon says, “Our new patent for enabling on-premise connectivity without VPN’s is a technology breakthrough for our company and our customers.  Secure file share remote access and the ability to collaborate free from the complexity and security risks of VPN’s from anywhere without migrating data to the cloud is the cornerstone of our success and strategic goal of helping our customers.  This patent has allowed customers to instantly enable file share remote access and online collaboration in Office 365 using MyWorkDrive, which is a major a competitive differentiator for our platform.”

 

Along with watermarking, Version 5.1 offers download restriction, no clipboard copy, encrypted view mapped drive, file type blocking, open documents online directly from the mapped drive and easy single sign on SAML integration with Azure AD.  Just set it and forget it.  No additional user management needed.

 

MyWorkDrive is a product and dba of Wanpath LLC, founded in 2014 and based in San Francisco, CA.  For Enterprise pricing visit MyWorkDrive.com

MyWorkDrive Version 5.1 Released to Production

We are pleased to announce version 5.1 of MyWorkDrive server and Windows client is now available for download.  We are excited to include streamlined Azure AD/Office 365 Single Sign On (SSO) setup options, local document editing from the browser and a major update to our Windows Mapped Drive Client that greatly improves transfer speeds and login time.

MyWorkDrive CEO Dan Gordon says, “We are very excited to see these major improvements in speed and functionality with version 5.1 of MyWorkDrive Server and Windows Client. With these speed and functionality improvements, now more than ever, our customers can eliminate file share VPN costs and security concerns while enabling their users to work from anywhere.”

 

New Version 5.1 features

Web Browser Client

  • Edit Documents from the browser using Local Office
  • Local Document editing using ADFS/SAML SSO
  • Improved support for ADFS and SAML SSO providers

Mapped Drive

  • Dramatic speed improvement of 500% or more
  • Multi-threaded downloads and customization
  • New command line scripting options
  • Pull company logo on first login and during scripted installs

Server

Numerous enhancements and fixes – Release notes are here.

Watch the Webinar

 

*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at sales@myworkdrive.com or Phone: 877-705-4997

 

MyWorkDrive featured in Tech Republic

MyWorkDrive featured in Tech Republic

 

MyWorkDrive’s Chief Marketing Officer, Jackie Rednour-Bruckman was recently asked by Tech Republic- What Are the Best Data Center Upgrades? You can buy a bunch of hardware and software but first and foremost you must decide on your data protection and data leak prevention strategy. Adding MyWorkDrive’s solution to your infrastructure is fast and easy and should be strongly considered if your enterprise is worried about data protection and secure remote access.

https://www.techrepublic.com/article/best-data-center-upgrades-for-2019/