MyWorkDrive Version 5.2 Released to Production

We are pleased to announce version 5.2 of MyWorkDrive server, Mobile and Windows client is now available for full production download. This release includes a major update that now supports logging in using ADFS/SAML from any device when connecting to server version 5.2. With this update secure remote access using Windows and Mobile Apps from any SAML provider with two factor authentication is now possible. An example would be Azure AD integration with MFA enabled – When enabled in MyWorkDrive and ADFS/SAML is set to required, users can access MyWorkDrive shares with our Mapped Drive and Mobile clients using SSO and MFA Two Factor as part of Azure AD.

Version 5.2 also includes a major overhaul to our mobile app that includes support for iOS files provider, Image previews (5.2 server required) and new offline capabilities. With iOS file provider enhancements user’s can access, upload, download and edit files stored on MWD shares from any app. See our updated mobile user guide here.

MyWorkDrive CEO Dan Gordon says, “We are very excited to these major enhancements for secure access from any device or authentication provider. With these speed and functionality improvements, now more then ever, our customers can eliminate file share VPN costs and security concerns while enabling their users to work from anywhere without VPN or remote desktop login headaches.”

New Version 5.2 features

Mobile Apps

  • Login using ADFS/SAML provider
  • Prevent password saving policy support
  • iOS files provider support for accessing files in any app

Web Browser Client

  • User favorites to folder locations
  • Alternative viewer for large text files
  • Improved support for ADFS and SAML SSO providers

Windows Mapped Drive

  • Login using ADFS/SAML provider
  • New command line options for unattended setup
  • Improved login/logout performance
  • Improved handing of custom branding
  • Numerous other enhancements and fixes – Release notes are here.

Mac Mapped Drive

  • Speed and performance improvements
  • Login using ADFS/SAML provider
  • Support for server password policies
  • Bug fixes and enhancements – Release notes are here.


  • Administrative Alerts for file downloads, delete or modify
  • Simplified SAML setup for Okta and OneLogin
  • Export/Import of settings for easy backup/restore
  • Azure AD single logout support
  • Numerous other enhancements and fixes – Release notes are here.

*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at or Phone: 877-705-4997

Cloud storage: Is it for you?

Cloud storage is a model of computer data storage where files are stored in logical pools. With Cloud Storage, the actual physical storage typically spans multiple servers (which can also be in located in multiple physical locations). While the storage is typically owned and managed by a hosting company many organization have their own private cloud storage. Cloud storage can fit the demand for convenience, mobility and cost-efficiency for data storage. With all of the advantages cloud storage provides, do not forget security.

The sophistication of the security options available for cloud storage are growing but there is no single set of solutions yet available. Just as there are layers of security required for on premise storage, even more are required for securely transporting, storing and accessing data in the cloud. Your data will be in the hands of a third-party. Security measures must be examined prior to selecting a vendor. Do not let cost be the determining factor in your vendor selection.

Cloud Storage Security

The cloud provider chooses authentication, authorization, and access control mechanisms that meet their needs to host multiple tenants in their cloud. Choosing the cloud provider that best meets your business and security needs are the primary selection criteria for choosing a cloud vendor. The vendor is responsible for securing your data on their servers. They will select the firewalls and chose the security polices they will enforce. Make sure those polices meet your needs. Insuring your data is safe and accessible to only you, this is what you are paying for. Limit security risks by encrypting the files before transferring them to the cloud storage location. Use a vendor that allows you to maintain your own encryption keys, instead of the cloud storage provider retaining them.

The portions of security the end users are responsible for need to be easy to use, flexible to manage and secure. The more complex the security the more effort the user will expend to get around them or ignore them. For a security solution to be effective, it must be used as designed and deployed. Citrix remote desktop is not only very expensive it is difficult to use and support. VPN’s are often not used because of the complexity of this technology. Your access solutions needs to be easy to use and not require a lot of training for the end user or the support staff.

With so many mobile devices accessing your data from different locations around the world, the tools you use to access your data must have excellent security. Security that not only prevents remote devices from being used by the wrong person (DUO, SSO), uses encryption in transit to and from the server behind the firewall. Insure no data is left behind on the remote device after the transaction has been completed.

Ease of Use

Usability is one of the biggest changes that cloud storage brings. Most solutions address both Mac and PCs. They use the ‘drag and drop’ option, moving any file easily to your cloud storage device. Backup and Disaster Recovery systems are a lot more user-friendly. Once set up, backups can be done quickly and automatically. Simpler interfaces are easier to use and manage; reducing the burden of extensive training.

Accessing Files in the Cloud

As long as you have an Internet connection, you have access to your files in the cloud. The cloud storage server is device agnostic, you can access your files with any Smartphone, notebook, tablet, laptop, desktop or thin client workstation using iOS, Windows, Unix or Android OS’s.

With the massive growth in remote work. With employees increasingly working from home for at least two days a week, and the growing use of the gig economy labor model, remote access to shared files is essential for worker efficiency and productivity.

Risk Factors

Cloud storage needs to be backed up just like your on-premise file shares. Control your backups; it is your data and your future. If the vendor says they do a full back up of the data, ask how often, where the backup is physically, if they test the backup and if you can restore and run your business quickly from that backup. Good backups are the best defense against disaster.

Data format and migration is another consideration since files migrated to proprietary hosted cloud storage will be converted away from NTFS native file storage with built-in security permissions to the vendors format making portability and future migration away from the vendor difficult. If possible choose a cloud storage vendor that natively integrates with Active Directory NTFS permissions and groups to maintain future portability.

Most cloud service providers are reliable; however, they are only as reliable as your Internet connection. Having a poor Internet connection can keep your businesses from being able to access your data. Determine your bandwidth needs prior to selecting an ISP or cloud storage vendor.

Ask if you will share a common namespace with other clients of the cloud provider, if you use a single-sign-on authentication option it can make it easier to access your data and increase your risks.

Find out if when you upload your company data to a public cloud provider, if you still own it. Read the fine print in the contract of the cloud providers; find out if that cloud provider, not you, owns the data you save in their cloud service. Read the fine print, details are critical in the cloud vendor contracts.

In many cases issues around compliance or data sovereignty may eliminate some vendors or require the use of files stored in a private cloud.

Rising costs can also be a risk if you do not plan efficiently. Extensive research must be done prior to selecting a vendor to ensure scalability and that costs will remain reasonable over time.


One of the best benefits in cloud services is the ability to customize the services you need for your business. Even the least expensive cloud service providers can provide levels of customization greater than traditional on premise storage and networking systems. Because these systems are software driven they require very little investment in hardware (if any), so you may be able to afford new and additional services.

Although entry-level systems offer customization, if you have specific needs, care is needed in selecting a provider that best addresses your business needs. Do not sacrifice performance for price.


Cloud storage can be an excellent way to save on capital expense (CAPX) and reduce the internal IT support workload. But buyer beware, thoroughly research the vendor you choose and ensure that they are the best fit to help your company succeed and maintain control of your data in the future if you need an exit plan. MyWorkDrive provides the ability to maintain control of files using your own private cloud storage or interfacing with Azure File Share Sync or Netapp OnTap storage providers.

Data Loss Prevention Strategies

MyWorkDrive Version 5.2 Released to Preview

We are pleased to announce version 5.2 of MyWorkDrive server, Mobile and Windows client is now available for preview download. This release includes a major update that now supports logging in using ADFS/SAML from any device when connecting to server version 5.2. With this update secure remote access using Windows and Mobile Apps from any SAML provider with two factor authentication is now possible. An example would be Azure AD integration with MFA enabled – When enabled in MyWorkDrive and ADFS/SAML is set to required, users can access MyWorkDrive shares with Windows Mapped Drive and Mobile clients using MFA Two Factor as part of Azure AD.

Version 5.2 also includes a major overhaul to our mobile app that includes support for iOS files provider, Image previews (5.2 server required) and new offline capabilities. With iOS file provider enhancements user’s can access, upload, download and edit files stored on MWD shares from any app. See our updated mobile user guide here.

MyWorkDrive CEO Dan Gordon says, “We are very excited to these major enhancements for secure access from any device or authentication provider. With these speed and functionality improvements, now more then ever, our customers can eliminate file share VPN costs and security concerns while enabling their users to work from anywhere without VPN or remote desktop login headaches.”


Register for the 5.2 Launch Webinar on Feb 28th

Webinar Registration Link

New Version 5.2 features

Mobile Apps

  • Login using ADFS/SAML provider
  • Prevent password saving policy support
  • iOS files provider support for accessing files in any app

Web Browser Client

  • User favorites to folder locations
  • Alternative viewer for large text files
  • Improved support for ADFS and SAML SSO providers

Windows Mapped Drive

  • Login using ADFS/SAML provider
  • New command line options for unattended setup
  • Improved login/logout performance
  • Improved handing of custom branding
  • Numerous other enhancements and fixes – Release notes are here.


  • Administrative Alerts for file downloads, delete or modify
  • Simplified SAML setup for Okta and OneLogin
  • Export/Import of settings for easy backup/restore
  • Azure AD single logout support
  • Numerous other enhancements and fixes – Release notes are here.

Register for the 5.2 Launch Webinar on Feb 28th
Webinar Registration Link


*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at or Phone: 877-705-4997


California Consumer Privacy Act of 2018 (CACPA), Who, What, When, Where and Why?


Who Does the CaCPA Protect? Who must comply?

Any consumer, defined as a “natural person who is a California resident.” This is further defined as:

  • Any individual is in the state for any purpose that is not transitory or temporary
  • Any individual who lives in the state but currently or occasionally is outside the state for a temporary or transitory purpose

Meaning consumers traveling to or with partial residence in other states would be protected, as long as their home is California. This also means that the law applies to “business-to-consumer” (B2C) companies and to “business-to-business” (B2B).

A covered “business” is defined as a for-profit entity that meets 1 of the 3 following conditions.

  1. Earns $25 million or more in annual revenue.
  2. Holds the personal data of at least 50,000 people, households, or devices.
  3. Obtains at least half of its revenue selling personal data. Selling, is not just trading data for cash. Merely disclosing data to a third party if it results in financial gain, is subject to the law.

CaCPA states that that they must also meet the following 4 conditions.

  1. Be a legal business entity that is organized and operated for profit.
  2. Collects consumers’ personal information, or has someone collect it on its behalf.
  3. Determines the purposes and means of the processing of consumers’ personal information.
  4. Does business in California

Any “for profit business” passing this test will be subject to the law, regardless of its geographic location. According to iapp it is estimated the law will apply to more than 500,000 U.S. companies, most of which are small- to medium-sized. It will also impact businesses outside the U.S., as long as they do any of their business in California.

What Is the Penalty for Noncompliance?

For intentional violations not addressed within 30 days, the fine is from $2,500 to $7,500 per violation (e.g., per record in the database). Unintentional violations not addressed within 30 days, Consumers are able to recover damages in an amount not less than one hundred dollars ($100) and not greater than seven hundred and fifty ($750) per consumer per incident or actual damages, whichever is greater.

Twenty percent of the penalties collected by the State will be allocated to a new “Consumer Privacy Fund”. Any funds in excess of Court and collection costs may be placed in the CA State General Fund.

Where Did This Law Come From?

The CaCPA was rushed through Legislation in just 7 days’ time and was signed just hours before the closing of the 2017-18 California legislative session. Speedy for a Law with such widespread ramifications.

This rush was in response to a much stricter ballot initiative proposed by San Francisco real estate developer Alistair Mactaggart. Mactaggart spent $3.5 million of his own money to fund initiative measure No. 17-0039 which received more than 629,000 signatures, more than enough needed to put the issue on the November 2018 ballot.

How Does the CaCPA Define “Personal Information?”

CaCPA’s definition of personal information is much more extensive than the definition of PII, it does align more closely with the broader list in the GDPR. It’s defined as “information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.” In addition to the information typically included under PII, it also includes:

  • Geolocation data
  • Education information
  • Audio, electronic, visual, thermal, or similar information
  • Professional and employment information
  • IP addresses
  • Internet activity (i.e., browsing and search history, web tracking data)
  • Aliases
  • Characteristics of protected classifications under California or federal law
  • Commercial information (i.e., personal property records, purchasing history)
  • Inferences drawn from any of the information contained in the definition


Just days before Mactaggart could certify the signatures, California Democrats agreed to push a compromise bill in exchange for dropping the initiative. The tech industry lobbyists believe that they will have a much better chance of controlling the narrative and the ultimate impact of the CaCPA. Industry Lobbyists agreed not to oppose the bill since the much less favorable ballot initiative had a good shot of passing later in the year.

What did they get for their compliance?

  • 18 months’ time to lobby on how to rewrite the details of the bill.
  • CA legislature can modify the CaCPA with a simple majority instead of a 70% super majority required by the CA Consumer Privacy Act of 2018.
  • CaCPA makes it more difficult for consumers to sue noncompliant businesses, giving most of the enforcement control to the CA state Attorney General.
  • CaCPA affects more companies, as it lowered the threshold by half to businesses with only $25 million annual revenue.

“Data regulation policy are complex and impacts every sector of the economy, including the internet industry,” the Internet Association lobbying group said. “That makes the lack of public discussion and process surrounding this far-reaching bill even more concerning. It is critical going forward that policymakers work to correct the inevitable, negative policy and compliance ramifications this last-minute deal will create for California’s consumers and businesses alike.”

The winners and losers of this bit of legislation (10,660 words), have yet to be determined, due to the massive rewriting of the details going on right now. It is very likely that the new and improved CaCPA will apply mainly to the Small to Medium Business, the ones that can’t afford the high priced Lobbyists and their massive expenses. This bill hastily written and barely reviewed by anyone other than its writers with its many typo’s and poorly written text was approved by Governor Brown on June 28th 2018. On Aug. 24th just 57 days later the first 45 amendments came. These amendments were primarily to adjust technical errors. Get prepared.

Sources: Assembly Bill No. 375, iapp The Privacy Advisor, New York Times, FairWarning


GDPR Fines: Blood in the water. Who’s first?

GDPR Fines Against Google

The (CNIL), France’s data protection authority (DPA), has levied a €50 million ($57 million) fine against Google for violating the GDPR’s transparency, information, and consent requirements in deploying targeted advertisements. The largest fine by GDPR to date and the first involving a U.S. technology company was issued on January 21, 2019.GDPR Compliance

The CNIL’s investigation was triggered by complaints from two advocacy groups, None of Your Business and La Quadrature du Net, filed immediately on the GDPR’s May 25, 2018 effective date. The complaints alleged “forced consent,” by which users of Android-powered mobile devices, had to agree to Google’s entire privacy policy and terms of service before using the Android device. Google lacks a legal basis to process users’ personal data as it relates to ad personalization.

Why a €50 Million Fine?

The CNIL relied on four factors in issuing its €50 million fine.

  1. Nature of the infringements relating to lawfulness (Art. 6) and transparency (Arts. 12 and 13), both of which are core principles of the GDPR and listed as triggering the highest fining threshold (of 4% of International Revenue) in the GDPR (Art. 83.5).
  2. Because the infringements were continuous and ongoing after the GDPR’s effective date.
  3. The processing purposes, their scope, and the number of individuals concerned.
    • CNIL’s investigation focused on users who created a Google account while setting up their Android device and noted that this is a very large number of individuals.
    • They contend that due to Android’s dominant market share in the French smartphone market and the number of smartphone users in France, the processing is vast.
    • Also given the number of Google services involved (more than twenty).
      • The variety and type of data involved
      • The multiple technological processes that enable Google to combine and analyze data from various services, applications, or external sources.
      • These processes undeniably have a “multiplying effect” on the knowledge the company has about its users.
      • The company has the means for potentially unlimited combinations enabling a massive and intrusive use of consumer’s data.
  4. When viewing the infringements from the perspective of Google’s economic model,
    • The processing of user data for advertising purposes via Android.
    • Advantages Google obtains from that processing,
    • CNIL found that Google must be extra cautious about its responsibilities under the GDPR.

CNIL does not say how it got to the amount of €50 million, but indicates these infringements would be subject to the GDPR’s 4% maximum fine. Fine was based on Google’s 2017 global revenue of €96 billion. It’s clear that the CNIL did not impose the maximum fine. However, other than saying the fine of €50 million was “justified”. CNIL provides no reasoning for this starting amount or how the factors referred to above influenced the amount.

2018 Decisions & Fines

This case against Google represents the CNIL’s first published enforcement action, explicitly under the GDPR and the largest fine it has ever imposed. It also highlights the CNIL’s scrutiny of notice and consent in online advertising, which had been building up in the past months, as evidenced by other recent CNIL decisions.

This fine comes 1 month after Italy’s DPA fined Facebook €10m for misleading its own users over data practices. The watchdog said Facebook wrongly emphasized the free nature of the service without informing users of the fact that their data would be used to generate a profit for the company.

Google was not the first GDPR fine just the largest to date.

The first fine was issued in Austria in October 2018, although it is not strictly related to personal data processing. A betting shop received a €4,800 fine for a security camera that was recording part of the pavement outside since large scale monitoring of public spaces is not permitted under the GDPR.

At the end of October, the Comissão Nacional de Protecção de Dados (National Data Protection Commission) in Portugal imposed three fines on the Hospital do Barreiro: These are the first fines related to the processing and storage of personal data. Two €150,000 sanctions and another of €100,000. For a total cost of €400,000 for the hospital. The first two fines of €150,000 were for violation of the principle of data integrity and confidentiality, and violation of the principle of data minimization, which in theory prevents indiscriminate access to data. 985 physicians had active accounts on the system giving them access to clinical files, while the hospital had only 296 active doctors on the date of the inspection.

The third fine was related to the inability of the Hospital as data controller to ensure the confidentiality and integrity of the data of its clients and patients.

In the middle of November, a social network in Germany,, received a €20,000 fine after a hack that caused 808,000 email addresses to be leaked, along with over 1.8 million usernames and passwords. This information was then published online with no encryption. The social network reacted by saying that once the leak had been discovered, it immediately improved its security measures.

After the incident, it was discovered that the website had no kind of protection on its sensitive information. According to LfDI Baden-Württemberg, the German data protection agency handling this case, one of the reasons that the website received a “relatively low” fine was that it acted with transparency, and quickly implemented security improvements.

Higher Fines Expected in 2019

The economic sanctions so far are clearly conservative compared to the maximum possible penalties allowed, but with the recent spate of high profile data leaks from Marriott, British Airways, and Quora it won’t be long before larger, harsher fines start to appear.

How Can You Avoid GDPR Fines?

What can you do to avoid a fine of millions of Euros or Dollars? The most important thing to bear in mind is that prevention is better than a cure. By having appropriate data leak protection in place for the personal data your company manages, you can avoid sanctions and fines.

  • Start by determining if online storage or on prim is the right solution for your needs
  • Controlling who has access to it
  • Realize that if you use Sync and Share instead of a private cloud file sharing solution, you have just doubled the amount of data you have, and you have also doubled the # of locations that you need to defend. Plus one of these locations you have no control over.
  • Complexity reduces security. The more complex a solution is the less it will be used.

The Security Risks of Remote Work

The Security Risks of Remote WorkCloud Security Risks

According to industry analyst Strategy Analytics: The global mobile workforce is set to increase from 1.52 billion in 2017, accounting for 39.3% of the global workforce, to 1.88 billion in 2023, accounting for 43.3% of the global workforce. Globalization will continue to drive the growth of mobile office workers in all regions. The latest mobile devices and technologies are now able to meet most of the demands of mobile workers of all types. While the more significant growth opportunities ahead will depend on the mobile internet, as it contributes to developments in the wider digital ecosystem. Mobile internet users are the addressable market for e-commerce, Fintech (Financial technology) and a range of digitally delivered shared files, services and content.

At the same time, mobile security threats are on the rise: according to the McAfee Mobile Threat Report Q1 2018, 16 million users were hit with mobile malware in the third quarter of 2017. Q3 2018 had more than 62,000,000 new malware files reported, with over 820,000,000 total malware files listed. The biggest change was the increase in size of the ransom payment. Past versions required US $1,000, now costs are US $2,400 for the decryption key up 140%.

iPass Mobile Security Report 2018 surveyed 500 CIOs and senior IT decision makers from the U.S., U.K., Germany and France, to examine how organizations view today’s mobile security threats and how employees’ use free public Wi-Fi.

The use of free public Wi-Fi continues to pose the biggest mobile security threat for hotspots globally. With all the varying security credentials, how can enterprises ensure the connections that their mobile workers use are secure? At a time when data protection is paramount, enterprises need to strike a balance between keeping their data and systems secure, while not hampering the productivity of their mobile workforce.

Hacking Risks

The majority (57%) of CIOs suspect their mobile workers have been hacked or caused a mobile security issue in the last 12 months.

Wi-Fi Security

Overall, 81% of respondents said they had seen Wi-Fi related security incidents in the last 12 months, with cafés, airports and hotels being cited as the most vulnerable locations. 62% of Wi-Fi related security incidents occurred in cafés and coffee shops. This is perhaps not surprising, as all these locations see a high turnover of visitors each year and the level of security at each hotspot varies. There were also significant geographic differences when it came to Wi-Fi related security issues at airports: more than two thirds (68%) of U.S. respondents said they had seen incidents at airports, in contrast to only 39% in the U.K.

Personal Devices

CIOs believe mobile security risks have increased due to the rise of employees using their own devices (BYOD). Banning employee use of free Wi-Fi hotspots is still the preferred security measure for most organizations but their mobile workers are using them all the time.

BYOD: Bring Your Own Danger?

The concept of bring your own device (BYOD) is now commonplace: despite the large number of people working remotely, Gartner says fewer than (23%) have been supplied with a mobile device by their employer. This can leave companies open to security risks, if they do not have control over the security settings or capabilities of devices that are being used. Enterprises are in a Catch-22 situation when it comes BYOD. Many enterprises realize it can improve not only employee productivity, but also wider job satisfaction. However, there is a trade-off with potential security risks. Survey respondents recognize that the risk has been increased by BYOD, with 94% reporting that they think BYOD has increased mobile security risks.


Is Mobile VPN a solution?

Virtual Private Networks (VPNs) can be a way to secure remote connections to data and central systems, providing an alternative to a blanket ban on free Wi-Fi hotspots with an extra layer of security. This solution has to be deployed by the end user each time they wish to connect. VPN usage is increasing: in 2016, just 26% of enterprises were fully confident mobile workers were using a VPN every time they went online, but that figure has jumped to 46% in 2018. That does however leave more than half (54%) of respondents reporting that they still aren’t fully confident that their mobile workers use a VPN every time they go online. This figure leaps in the U.K. and France, where 62% and 59% of respondents, respectively, said they weren’t fully confident that their mobile workers are using a VPN when they go online. There are several barriers preventing mobile workers from connecting to VPNs, including the fact that mobile workers might not want personal data to run over the corporate network and that connecting to VPNs can take extra time. The challenge lies in training employee on the importance of using VPNs every time they go online, and how to connect to one in a quick and efficient manner.


Mobile security challenges remain a huge concern

Based on the earlier statistics, it’s not surprising that enterprises remain concerned about the security risk posed by the growing number of mobile workers. Overall, 92% of organizations said they were very concerned or somewhat concerned their growing mobile workforce presents an increasing number of mobile security challenges. There’s a perfect storm brewing: a rapidly growing mobile workforce, the proliferation of smart devices, the explosion of free public Wi-Fi coupled with ever more sophisticated hackers.



Companies are increasingly aware of the fact that the huge growth in mobile working presents new security issues to worry about. IT teams are no longer fully in control, as connectivity and access to corporate systems now extends beyond the corporate firewall. The huge, global growth in free Wi-Fi hotspots continues to skyrocket, so organizations outright banning employees from using them is a somewhat ineffective. The fact is, mobile workers will always seek out connectivity, regardless of the security risks involved, if it enables them to get their work done. In todays connected and increasingly ‘Wi-Fi’ first world, companies need a modern mobile working strategy that empowers employees, as opposed to trying to stop them in their tracks. In today’s risk environment the public Wi-Fi is the greatest threat and the ability to use it safely is the primary business goal of Remote Workers.


Remote Work Software & Services

What is Remote Work?

It seems simple enough. As described in our Remote Work Article, Remote Work would appear to signify work done outside of an office. But there are so many different terms floating around regarding work flexibility that it’s important to know what each means. There are many names given remote workers: teleworker, iPro, telecommuter, distance worker, homeworker, freelancer, and outworker. There are also many forms of remote work: Full time, Part time, Job sharing, Gig work, Contract work, Consulting, Road Warrior. What all this means is that “work” is changing due to technology, education, mobility, security, and the age of the workforce. Ultimately, what your company’s definition of remote work is will depend largely on your own practices and policies.

Remote Work Successes

While Corporations are struggling to keep up with this change, early adopters of this phenomena are reaping phenomenal rewards.


WeWork is an American company that provides shared workspaces for technology startup subculture communities, and services for entrepreneurs, freelancers, startups, small businesses, and large enterprises. Founded in 2010, it is headquartered in New York City. As of July 2017, WeWork had a valuation of roughly US $20 billion and managed 10,000,000 square feet (930,000 m2) of office space.


Slack is a cloud-based set of proprietary team collaboration tools and services, founded by Stewart Butterfield. Slack began as an internal tool used by his company Tiny Speck. The current valuation estimate for Slack stands at around $8.3 billion based on the 2018 forecasts and estimates for the company.


Dropbox is a file hosting service operated by the American company Dropbox, Inc., headquartered in San Francisco, California, that offers cloud storage, file synchronization, personal cloud, and client software. Dropbox was founded in 2007 by MIT students Drew Houston and Arash Ferdowsi as a startup company. Dropbox revealed in its SEC filing that it had around 540 million shares outstanding at the end of 2017. Using the $10 billion estimate for Dropbox’s value, this implies a price per share of about $18.50 as of now.


Box, the business software company led by Aaron Levie, reported its fiscal first quarter earnings on May 30, 2018, posting revenues of $140.5 million—a record—and cash flow from operations of $18 million. Its quarterly revenue was up 20% year over year.


Toptal accepted a $1.4 million seed round of financing from Andreessen Horowitz and angel investors including Quora founder Adam D’Angelo. In 2015 and 2016, their annual revenue was $80 million and $100 million respectively. “There’s a network effect,” says Du Val who turned his office-less company into a $100 million-revenue business that connects high-level developers, designers, and finance pros with some 2,000 companies, including Airbnb, Pfizer, and the Cleveland Cavaliers. Not only are new Start-Up’s enjoying the benefits but also these Fortune 100 companies.

Advantages of Remote Work

Real Estate Savings

The Global Workplace Analytics statistics show that the average real estate savings with full-time telework is $10,000 per employee per year.

Specifically, these organizations found that such options allowed:

IBM to cut real estate costs by $50 million
Sun Microsystems saved $68 million a year in such costs.
Nortel estimates that they save $100,000 per employee they don’t have to relocate.
Recent Global Workplace Analytics studies show that offering workers flex options can boost productivity.
AT&T found its telecommuters worked more hours at home than its office workers.
JD Edwards teleworkers were shown to be 20-25 percent more productive than their office colleagues. American Express employees who home worked were 43 percent more productive than office workers.

Employee/Employer Benefits

• Improves employee satisfaction
• Reduces attrition
• Reduces unscheduled absences
• Increases productivity
• Saves employers money
• Increases collaboration
• Expands the talent pool

Obstacles to Remote Work

• Management mistrust
• It’s not for everyone
• Career fears from ‘out of sight, out of mind’ mentality
• Security issues
• IT infrastructure changes may be necessary

The Evolving View of the Office

The office is rapidly expanding beyond the cubicle. The number of telecommuting workers has increased 115% in a decade, according to a new report from Global Workplace Analytics and FlexJobs. That translates to 3.9 million workers, or almost 3% of the total U.S. workforce, working from home at least half the time in 2015, an increase from 1.8 million in 2005.

In the EU a study released 29 May 2018 by Zug, Switzerland-based serviced office provider, IWG found that 70 percent of professionals work remotely at least one day a week, while 53 percent work remotely for at least half of the week. The ability to work from home and the emergence of digital office rental services has led to changing attitudes around where people should work and whether they should stick to the traditional nine-to-five working hours.

Workplace Analytics and IWG both said their studies related to full-time employees rather than the self-employed or contractors. Chief Executive Mark Dixon said that technology was the primary driver of changing perceptions around locations and working hours. “The biggest driver is digital, changing every industry in the world,” Dixon told CNBC in a phone interview. “On the one hand, it’s changing how real estate needs to be offered, but it’s also companies wanting something different in the digital world.” Dixon said that firms are less inclined to invest in real estate and were looking to digital services instead to hire out office spaces. He added that the idea of remote working allows employees to be more flexible.

Who’s Working Outside the Office?

Telecommuters tend to be a little bit older than the average employee: half are 45 or older. They’re also more educated and earn more than non-telecommuters. The average yearly income for most telecommuters is $4,000 more than non-telecommuters, according to the report. Remote work is gender neutral with 52% of work-at-home employees being female. Telecommuting is most common among management positions. Professional, scientific and technical services industries have the highest percentage of telecommuters relative to their share of the workforce.

Employees are expecting more flexible work arrangements, customers are demanding more responsiveness from companies, and the challenge is now for CEO’s to embrace the change required within their organizations to address these needs.

Due to the rapid growth of the workplace, remote-working policies will rival the popularity of fixed office locations by 2025, rendering the future workplace unrecognizable.

MyWorkDrive’s Role in Remote Work

MyWorkDrive fits nicely into remote working strategies by enabling workers to collaborate on files remotely while keeping them stored on company storage with the added security of two factor authentication (to prevent sharing of passwords) and data leak protection to prevent downloads and casual sharing of confidential documents.

Secure Folders

The Art of SAML/SSO and MFA

SAML SSO Integration

Security Assertion Markup Language or SAML is well known by its function and not necessarily by its name or moniker. IT Managers use it on any given day possibly multiple times. With SAML multi device management becomes easier and less stressful and tedious. Simply put, you are able to sign on to one computer and access and perform security functions on other computers. In this current climate of data integrity worries and data leak prevention, being able to authenticate and authorize credentials is critical. SAML makes network security easier to manage.

SSO or Single Sign On is what any executive or front-line staff wants and needs for easy collaboration, streamlined workflow, and smooth operations as more staff work remotely. For example, if your core inventory management database is cloud based and your retail POS has a local server but they have an API that makes them talk to each other along with a dashboard that talks to an on premise file server with financials and you have a single sign on credential for all logins then you are not constantly having to remember passwords or create usernames and secure logins for every point of contact in your enterprise where operations and performance metrics live.

Some security experts’ shudder at the thought of a CEO keeping a post-it note in a drawer with passwords but before you snicker just remember that a lot of Network Security professionals don’t always use a password protector or authenticator either and are prone to losing cell phones at trade shows. You have one key to your front door and this lets you in every time. Don’t make things complicated.

Picture yourself at an airport sitting with your laptop with time to kill before boarding your business flight. On your laptop you have an icon you click open that you enter your single sign on credentials and bingo you are instantly in your home drive at the office and on the server at the colo. You are working at the speed at light and not missing a beat regarding the latest report just updated and saved on the server in the folder marked sales reports. Having a web dav client and being able to instantly, securely, and remotely access your files is a game changer. You can stay agile, productive, and efficient with your time. No need to text the IT desktop support back at HQ to find out who changed passwords all of the sudden or why you are locked out right now.

There is duo authentication which most gmail users are familiar with via entering a phone number to get a text with a code that you enter so you can add another layer of protection to signing in to your email account. MFA or Multi Factor Authentication adds yet more layers and added protections especially if the data you are sharing is critical, classified, and/or for certain eyes only. Many contractors in the government sector as well as in healthcare and research and development are well aware of MFA just like in banking where you have a safety security box locked in a vault behind the closed doors of a bank who also has an armed security guard at the door. Banks and financial institutions use MFA all the time.

You can live dangerously and have all your logins saved to your browser but what if you lose your laptop or you click open a link in an email that renders your machine kaput and has to be taken off the network immediately…what then? You should make a habit of clearing your cache, removing cookies, updating logins and securely storing them somewhere in your own vault of some kind whether that be a platform like LassPass or while also having your enterprise network architecture and data security protocol include SSO. You don’t want staff members being the master of your universe. Don’t make your IT Department lose sleep every night by making them chase down each and every staff member to get updated login credentials. That should be managed from top down. They can have their own passwords, but every platform and software used should have a master admin account that can access everything and that SAML and SSO should live with IT and Executive Management. Terming out an employee should not be a fire drill in getting your network back or worrying who still has access to what. Active Director integrated with Windows File Server Shares should be managed concurrently, and onboarding or terming staff should have the same consistent protocol each time. You need to be able to pull the plug so to speak on all logins at all touch points to the system based on what level or what clearance the employee had. If you have it related to SSL or NTFS permissions, then it’s not a nightmare to manage. Adding another layer of MFA that you are able to control from internally is also an essential safeguard.

On one side you have ease of use for the employee and on the other side you have ease of control on the management side. Your user base will be very happy being able to log on to all aspects of operations with one sign on credential even if it means they have to enter a code that is generated to their cell phone with a text alert when logging in. Again, this level of security depends on what is being accessed and what permission has been granted to staff member.

What constitutes a work stoppage? Someone can’t get their email? That’s inconvenient but not a reason to fold your arms in your lap and plan on catching the early train home. With SAML and/or SSO all you need is a browser and you are back in business accessing the information you need. It’s always good protocol and policy to have some kind of Multi Factor Authentication on your phone and mobile devices like tablets, etc. Think of it much like an Apple ID account. You have that added layer of having to use your thumbprint when downloading an app and then to purchase and set up an account you still need to enter your Apple ID. You want layers between you and someone else trying to steal your identity, hack your network, or corrupt your files. You also want it to be easy and fast to access your files. Use MyWorkDrive with any compliant SAML solution with streamlined setup of Azure AD, Okta and Onelogin. Add MFA or DUO as you need to and start working away from anywhere!

MyWorkDrive Awarded Patent for Innovative Secure File Access Relay

MyWorkDrive Awarded US Patent

Secure Remote Access VPN Alternative Start-Up Releases Patented Application

FOR IMMEDIATE RELEASE December 18th, 2018 (San Francisco, CA)

Wanpath LLC, the San Francisco based publisher of MyWorkDrive that enables secure file share access with data leak prevention has been awarded U.S. Patent, No. 9,985,930. MyWorkDrive also released version 5.1 continuing their strident efforts to provide data leak prevention best practices and data governance compliance with new security enhancements perfect for the Government, Healthcare, Financial, and Educational sectors.


The official patent issued is for ‘Reverse Proxy For Accessing Local Network Over the Internet.’ MyWorkDrive software runs in the customer’s own private cloud, connects to Windows Active Directory and enables instant secure file share remote access, online collaboration and editing with O365 while keeping files stored on their existing file shares. Customers control their own files with no third-party cloud or database migration needed. Files can be accessed securely using a desktop mapped drive, web file manager browser client, or with a mobile app. Installation and managing multiple stakeholders in various remote locations is easy with no changes to existing infrastructure. Regulatory compliance standards including HIPAA, GDPR, FINRA, and FIPS are attained while using MyWorkDrive to securely access and edit files for Enterprise agility, efficiency, lower cost of ownership and elimination of the security risks of legacy VPN clients.


CEO Dan Gordon says, “Our new patent for enabling on-premise connectivity without VPN’s is a technology breakthrough for our company and our customers. Secure file share remote access and the ability to collaborate free from the complexity and security risks of VPN’s from anywhere without migrating data to the cloud is the cornerstone of our success and strategic goal of helping our customers. This patent has allowed customers to instantly enable file share remote access and online collaboration in Office 365 using MyWorkDrive, which is a major a competitive differentiator for our platform.”


Along with watermarking, Version 5.1 offers download restriction, no clipboard copy, encrypted view mapped drive, file type blocking, open documents online directly from the mapped drive and easy single sign on SAML integration with Azure AD. Just set it and forget it. No additional user management needed.


MyWorkDrive is a product and dba of Wanpath LLC, founded in 2014 and based in San Francisco, CA. For Enterprise pricing visit

MyWorkDrive Version 5.1 Released to Production

We are pleased to announce version 5.1 of MyWorkDrive server and Windows client is now available for download. We are excited to include streamlined Azure AD/Office 365 Single Sign On (SSO) setup options, local document editing from the browser and a major update to our Windows Mapped Drive Client that greatly improves transfer speeds and login time.

MyWorkDrive CEO Dan Gordon says, “We are very excited to see these major improvements in speed and functionality with version 5.1 of MyWorkDrive Server and Windows Client. With these speed and functionality improvements, now more than ever, our customers can eliminate file share VPN costs and security concerns while enabling their users to work from anywhere.”


New Version 5.1 features

Web Browser Client

  • Edit Documents from the browser using Local Office
  • Local Document editing using ADFS/SAML SSO
  • Improved support for ADFS and SAML SSO providers

Mapped Drive

  • Dramatic speed improvement of 500% or more
  • Multi-threaded downloads and customization
  • New command line scripting options
  • Pull company logo on first login and during scripted installs


Numerous enhancements and fixes – Release notes are here.

Watch the Webinar


*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at or Phone: 877-705-4997


MyWorkDrive featured in Tech Republic

MyWorkDrive featured in Tech Republic


MyWorkDrive’s Chief Marketing Officer, Jackie Rednour-Bruckman was recently asked by Tech Republic- What Are the Best Data Center Upgrades? You can buy a bunch of hardware and software but first and foremost you must decide on your data protection and data leak prevention strategy. Adding MyWorkDrive’s solution to your infrastructure is fast and easy and should be strongly considered if your enterprise is worried about data protection and secure remote access.

ShareFile Alternative

How to Prevent Data Leaks in a Collaborative World – MyWorkDrive Version 5 Review

MyWorkDrive is honored to have been reviewed by StorageSwiss for our new data leak file share security options now available in version 5. The team has worked very hard to bring these new features to the market and we are excited to solve the secure file share remote access problem for enterprises. Read the review..


Azure File Shares Remote Access with MyWorkDrive

MyWorkDrive Launches Version 5 at Gartner Symposium

MyWorkDrive, a leader in private cloud secure remote file access, will debut new enhanced security file remote access features at Gartner Symposium/ITxpo, in Emerging Technologies, October 14-18, 2018 in Orlando, Florida.

MyWorkDrive is a software-only solution for secure remote access to in-house file servers from anywhere for any device. Users gain access in minutes without Sync, VPN, RDP or migrating data. IT leaders looking for a cloud-like file sharing solution can rely on MyWorkDrive’s ransomware protection, data leak protection (DLP), data governance compliance (FIPS, HIPAA, FINRA, GDPR) and enhanced Office 365 real-time online collaboration, with a lower total cost of ownership in comparison to other solutions.

“Our growth is an excellent indicator of the need for secure private cloud file access without VPN or complex cloud migrations” said Dan Gordon, CEO, MyWorkDrive. “Our customers are embracing our new security features rolled out in Version 5. We strive to meet the rigorous security requirements for the enterprise to enable them to meet the demands of the Digital Workplace.”

MyWorkDrive connects to Windows Active Directory and enables instant online collaboration and editing with Office 365 using Duo’s Unified Access Security (UAS) authentication. The release of Version 5 includes robust security updates including:

  • Encrypted views of locked down documents
  • Over 60 available file types to view in the browser without downloading
  • Watermarking of all files to prevent printing and screen photos
  • File access without the ability to download, print or copy to a clipboard
  • File extensions can be blocked or approved increasing ransomware protection
  • Direct online access to Office 365 documents
  • Prevention of password saving

Stop by booth ET12, in the Emerging Technology section or attend an informative session on October 17, 2018.

Session: Think Outside the Cloud
Speaker: Dan Gordon, CEO of MyWorkDrive
When: Wednesday, October 17, 2018, 6:00 pm
Where: Stage 4, Pacific Terrace

About Gartner Symposium/ITxpo
Gartner Symposium/ITxpo is the world’s most important gathering of CIOs and senior IT executives. This event delivers independent and objective content with the authority and weight of the world’s leading IT research and advisory experts and provides access to the latest solutions from key technology providers. CIOs and IT executives rely on Gartner Symposium/ITxpo to gain insight into how their organizations can use IT to address business challenges and improve operational efficiency. For more information, please visit

About MyWorkDrive
MyWorkDrive provides a software-only, on-premise data center solution for secure remote file access from anywhere for any device. Users gain access in minutes without Sync, VPN, RDP or migrating data. MyWorkDrive is for IT leaders looking for a cloud-like file sharing solution that has ransomware protection & DLP, facilitates data governance compliance (FIPS, HIPAA, FINRA, GDPR), enhances Office 365 real-time online collaboration, with a lower total cost of ownership. MyWorkDrive’s rapidly-growing customer base includes Oxford University, Loyola University, Habitat for Humanity, the United Way and the Boston Celtics. MyWorkDrive is privately held, based in San Francisco, California and a product and dba of Wanpath LLC. Visit us at

MyWorkDrive Version 5 Released to Production

We are pleased to announce version 5 of MyWorkDrive is now available for full production download. We have dubbed this our “Security Update” and released it as version 5 as it’s the most robust security release in the history of the company. MyWorkDrive CEO Dan Gordon says, “We are proud of Version 5 and happy to offer major security updates including a new critical feature that allows encrypted views of locked down documents and sixty other file types in MyWorkDrive’s web browser client. Version 5 also prevents a user from downloading, printing or copying with watermarking text overlays and extensive logging. Our clients asked for critical security enhancements and we are happy to deliver them.”

Watch the Webinar



New Version 5 features

Web Browser Client

  • View 60+ file types in the browser without downloading
  • Data Leak Prevention Features: Access files while preventing downloads, clipboard copy or printing
  • Watermarking of all files to prevent printing and screen photos

Mapped Drive



  • Mobile Browser Client Improvements
  • Open documents for viewing without needing Office in Mobile Apps

Numerous enhancements and fixes – Release notes are here.


To Download Login to our portal here.

*Upgrade note: Existing customers can upgrade for free in place.

Questions? Need a trial extension? Email us at or Phone: 877-705-4997

Why MyWorkDrive?

Version 5 continues our strident efforts on providing data leak prevention best practices and governance compliance with many security enhancements especially tailored to the Government, Healthcare, Financial, and Educational sectors. MyWorkDrive connects to your Windows Active Directory and enables instant secure online collaboration and editing with O365 using active directory and optional two factor authentication. You own your data, no third-party cloud migration needed with a secure web client, desktop mapped drive, or iOS and android app enabled editing. MyWorkDrive is easy to install and manage for multiple stakeholders in various remote locations. Major regulatory compliance standards including HIPAA, GDPR, FINRA, and FIPS are easily attained while using MyWorkDrive to securely access and share files for Enterprise agility, efficiency, and lower cost of ownership.

The mobile workplace is a reality that every CTO knows that involves multiple stakeholders across various time zones and locations who need to collaborate often in real time. As we have heard in the headlines, one simple click on a wrong link in a phishing type email could compromise an entire network’s security, an enterprise’s brand reputation, eradicate customer loyalty, or render an institution’s governance compliance null and void. Conventional remote access via VPNs do not guarantee privacy and are expensive to maintain. MyWorkDrive’s Version 5 solves critical data protection problems.