Release of MyWorkDrive 2.0 Brings Competitive Advantages to Modern Business Professionals!

San Francisco Company Thrilled to Announce Latest Version of Groundbreaking Remote Access Solution

FOR IMMEDIATE RELEASE

SAN FRANCISCO, CA – December 12th 2016 – The modern business landscape is fast-moving and evolves rapidly, more often demanding significant adaptability and efficiency from entrepreneurs and business staff. Rob Schenk and Dan Gordon of San Francisco IT support and consultancy firm, Intivix, set out on a mission to help respond to this increasing demand by creating MyWorkDrive. MyWorkDrive is a remote file access solution for business-owners that is poised to replace its expensive and complex competitors.

To help modern business professionals thrive, MyWorkDrive is defined by three centralizing features: ease of access, speed and cost efficiency. Users can easily access the contents of their business server remotely, without concerns about security or complexity. The entire MyWorkDrive team is committed to continually optimizing the product to best suit the evolving demands of the modern business landscape.

In light of this commitment, Schenk and Gordon are incredibly excited to announce the release of MyWorkDrive Version 2! The latest version offers product optimizations and added benefits for users including:
• Expanded localization settings that include: English, Spanish, French & German.
• Windows Server Search service integration
• Capacity to download folders/files as ZIP
• Increased support for installing on a Domain Controller
• Improved setup and integration improvements in Windows Server 2012 R2
• Support for Windows Server 2016

“We’ve had such a great response from users who absolutely love MyWorkDrive and the advantages it offers over traditional remote access solutions.” Gordon claims. “It really means the world to us because helping business owners drive productivity and competitiveness through technology is a huge part of why we started MyWorkDrive. We look forward to making continual improvements to help business owners make the most of their MyWorkDrive use.”

The entire MyWorkDrive team looks forward to continually growing with the business landscape to offer the most user-friendly, comprehensive and cost-effective remote file access solutions for every kind of modern professional. In hopes of driving increased simplicity and security, features planned for future implementation include:
• Windows Mapped Drive Client
• Office Online Editing
• Two Factor Authentication
• Post Setup Configuration Wizard

About MyWorkDrive
Founded by San Francisco IT experts Dan Gordon and Rob Schenk of Intivix, MyWorkDrive seeks to offer cost effective remote file access solutions for business owners, without sacrificing speed or efficiency. MyWorkDrive allows users to remotely and securely access organizational files and data in a way that is designed to maintain productivity and ease of use. MyWorkDrive is rooted in a philosophy of helping modern business-owners harness technology to better support business needs and help realize organizational goals.

MyWorkDrive showcased in Small Business Trends

Great article explaining the MyWorkDrive solution and problem we fix for small businesses!!

 

MyWorkDrive Featured at Microsoft World Partner Conference

staff-dan-gordon

This past summer MyWorkDrive was highlighted at the Microsoft World Partner Conference.   We were excited to share our cloud success with other partners!  In addition to presenting at the conference MyWorkDrive has been accepted into Microsoft’s invitation only Enterprise Cloud Alliance.   We look forward to a great partnership!

Check out the Microsoft blog article here: 
 
 
The Video is here: http://resources.wpc.microsoft.com/#key=searchTerm&value=us04 Dan Gordon, Co-Founder presented.  MyWorkDrive Presentation starts at 33:19

 

MyWorkDrive:Faster, Cheaper, Better.

MyWorkDrive is not another File Sync and Share product. In fact, it is a NEW PARADIGM for providing remote workers with faster, easier, and direct access to their work files.

The premise for Enterprise File Sync & Share (EFSS ) products is that company files are synced across managed user devices, permissions are managed outside of Active Directory, and the process of connecting to existing file shares is more of an afterthought.

We designed MyWorkDrive from the ground up to provide simple, secure, and fast web browser & mapped drive access to existing file shares—leveraging native Active Directory integration.  For example, with other Sync and Share products, even if they do have an option to connect to existing Windows file shares, users must be manually imported from Active Directory every time a new user is created. With MyWorkDrive, since we tie directly into Active Directory, there is no user management maintenance needed going forward. As users are added or removed from a group in Active Directory, they are automatically added or removed from MyWorkDrive.

From an engineering perspective, MyWorkDrive has a much stronger and secure engine that utilizes Microsoft Internet Information Server (IIS) as opposed to many Sync and Share products that leverage Apache. This makes it much easier to manage, patch and add your own SSL Certificates, leveraging skills your technicians already have.

With MyWorkDrive, there are no databases to manage, unlike Sync and Share products. Therefore, administrators do not need to worry about databases that need pruning, patching or backups. Furthermore, MyWorkDrive can be installed on existing servers due to the smaller footprint.   MyWorkDrive price point is also much lower than Sync and Share products—ranging from $1 – $3 per user, instead of up to $15 per user per month.

With a much lighter footprint, easy management, and fast deployment, MyWorkDrive can be setup in UNDER 30 MINUTES.  With Sync and Share on-premises solutions,  you need to setup multiple servers, manage databases, configure your own file editors, configure LDAP, connectors and numerous other items to deploy the software.   With MyWorkDrive, native Active Directory integration is included in all pricing levels OUT OF THE BOX. Therefore, ALL user and group permissions are inherited and utilized automatically.

Another big differentiator of MyWorkDrive is our patent-pending Cloud Connector. We are unique in this respect.  The included Cloud Connector option enables direct access to your MyWorkDrive server through our patent-pending integration system.  This means there are no SSL Certificates to setup, no firewall/NAT policy rules to change, nor DNS settings to adjust.  Your files remain on your server UNDER YOUR CONTROL but are made available to your users through our network in minutes.  This means you can get a Proof of Concept or long-term MyWorkDrive solution up and running quickly—all with minimal technical skills and no ongoing maintenance.

Web file access - MyWorkDrive

MyWorkDrive File Server Web Access Now Live!

MyWorkDrive.com is now live!

We are pleased to report MyWorkDrive is now available for purchase and as a monthly subscription.

MyWorkDrive let’s you “webify” your existing windows file servers in place for cloud file web access by employees.  The server can be located on premise or as a hosted virtual machine on Azure, AWS and others.  Customers are in control of their data as it remains on premise on existing servers.   Unlike clunky SSL VPN file sharing solutions, MyWorkDrive’s simple file server web access client provides a robust interface allowing users to interact with file shares as though they are in the office.   Upload, Download, Drag & Drop, Active Directory Integration, Home Drive Access and WebDAV support are enabled for all versions out of the box.

Our product has been very well received and MyWorkDrive is running on numerous firms including our own!   Having been in the IT business ourselves for many years we developed MyWorkDrive for Windows Sysadmins ( fast 10 minute setup ) and end users ( easy, fast and secure remote file access ).   We subjected MyWorkDrive to rigorous security testing utilizing it in house and at our MSP where it has been deployed to numerous clients over the past year.

Simply install our software ( active directory connects to your internal domain out of the box) configure shares and enable our cloud connector to use our relay service or install your own SSL Certificate and host name. User’s can then connect via the web client for direct editing of office documents ( no download required ), home drive access and WebDAV support for mapping drives or accessing via mobile devices.

Simple, easy and quick.  Free trial is available for download.

 

What makes MyWorkDrive different?

What makes MyWorkDrive different?

MyWorkDrive is designed to integrate with existing on-premise Windows File Servers while providing end users with fast cloud file cloud access – all while maintaining local IT control over the data.  The server software is very lightweight – no databases or complicated LDAP requirements – and can be installed directly on existing Windows File Servers.

Server Services

Other products utilize 3rd party integration software to integrate into Window Active Directory and create error-prone, bloated databases that must be maintained, pruned, and backed up.  With MyWorkDrive, there are no databases or additional servers to maintain.   Our software components utilize native Windows components that can be easily patched as opposed to fragile open source software.  Backing up the MyWorkDrive configuration is as simple as copying a few XML files.

User Integration

Since MyWorkDrive utilizes native Windows components and runs within IIS, existing Active Directory users and groups are accessible and manageable right out of the box.  Provisioning shares is simple – the systems administrator simply points to the existing file folders (if installed on an existing file server) or share paths such as \\server1\share and chooses what user groups to allow access.  Existing NTFS permissions are supported automatically. Other products require complicated LDAP configurations and the continual import of new users & groups. With MyWorkDrive, an end user’s home drives are made available by default with no extra setup, formulas, or added configuration required.  Once the shares are set up, new users who are added to Active Directory, can login to MyWorkDrive with no additional requirements.

Web Publishing

Our optional MyWorkDrive Cloud Connector service allows the system administrator to publish the end user web file manager portal in minutes.  This means the administrator can simply choose their preferred client URL such as https://MyBusiness.myworkdrive.net and publish it to the end users without opening up firewall ports nor purchasing and maintaining SSL certificates.  Our Cloud Connector service utilizes the highest encryption available and is locked down to prevent all known threats. All files remain on the customer’s server, flowing through our encrypted relay channel as they are accessed by end users.  Unlike other vendors, we have no access to data – all data stays on the customer’s server. We regularly test our relay servers to ensure the highest rating on Qualys SSL Labs.   Self-hosted options from other vendors require significant security expertise to achieve the same level of encryption and availability with some vendors defaulting to no encryption all.  MyWorkDrive’s level of security expertise is not typically available to a small business nor is it maintained when using competing products.

Web File Access

MyWorkDrive’s Web File Manager access browser client is the most advanced and user friendly in the industry. Upon login, the user is presented with their home drive and file shares in a view similar to Windows File Explorer.  Files and folders are displayed in Detail view for easy sorting, by name and date.  Our browser client provides the unique ability to double-click on a Microsoft Office document, edit it and save it back – all without requiring the file to be downloaded or synced first to the user’s remote PC.  This unique function ensures data remains on premise and under business control.   Other vendor’s products require downloading of files and utilize an unfriendly user interface with only basic file and folder functions.

File Syncing

Competing products all assume System Administrators will maintain a file sync client on all user’s desktops.   Syncing clients generate a tremendous amount of network traffic that fills up an end user’s PC with files which creates a substantial support burden on System Administrators.  Since MyWorkDrive connects to existing file shares and the end users home drive with both a Web client and mapped drives, syncing is not needed.  It’s not uncommon for even the smallest business to have over 1TB of files on even the smallest of file servers.  Syncing that amount of data across multiple user’s desktops is unsupportable in these scenarios.  With fast Internet access available just about anywhere, error prone file syncing is not required nor desired by many businesses.

 

Secure File Sharing

5 Tips to Minimize Enterprise File Sharing Risks

Risks of Consumer Oriented File Sharing Platforms

Regardless of the industry your business falls under, the ability of your employees to securely access tools and information to perform their duties is critical.  Providing employees easy access to files and folders is essential to keep business operations flowing and to avoid serious file sharing risks.

Since the days of the floppy disk, users have come up with some pretty creative ways to quickly and easily save information, as well as share it with each other. Technology has advanced to the point where email is no longer considered a convenient or secure way to share data.  Consumer level file sharing and sync options being utilized by individuals without IT knowledge lack security and increase risks to your business.

According to a study done by Gigaom Research and Harris Interactive, a staggering 84% of IT professionals reported security problems caused by the use of consumer-oriented file sharing services for company business. Even for personal use, only about one-third of those users polled stated they trusted file sharing services.

There are many reasons why consumer-oriented file-sharing platforms aren’t trusted – chief among them being lack of control over how company data is shared, service reliability, and the fact these platforms steer users to set up automatic file syncing of work files to the cloud whether required or not.

Developing Policies for Enterprise Level File Sharing

However, all is not lost, as organizations can utilize Enterprise File Sharing and Sync platforms. Although there are still risks involved with even enterprise file share and remote access solutions. Here are five tips that you should take into account when developing policies for enterprise level file sharing.

Set Permissions

By documenting which network activities are allowed and which are not, you are making it clear to employees what is an acceptable use of your network.

Passwords Matter

You’d be amazed at how often employees use very basic passwords for their workstations on-site or remote. Some don’t even bother to change the default password that was initially set up. Having password rules with a minimum length of 9 characters and complexity restrictions in place can mitigate the security risk of generic passwords and can also control how data flows into your network and who has access.

Define Mobile Policy

BYOD isn’t going away, so if you haven’t taken the time to implement controls and policies as part of your IT strategy you need to. With the number of employees utilizing their mobile devices to access proprietary business data, keeping it secure and off personal devices that cannot be managed is a high priority.

Meet Employee Needs

If you don’t have the right tools in place for employees to do what they are supposed to do, you likely don’t have visibility or control over how they are sharing and accessing sensitive data. By meeting the needs of your workforce, you are also keeping your company secure.  MyWorkDrive provides employees this easy remote access to work files and folders.

Teach Security Best Practices

If you have a remote workforce of any kind you will want to ensure they are aware of security best practices for sharing and accessing company data, connecting to secure Wi-Fi and not using public Wi-Fi, and always locking their personal devices. Education is key.

Cloud Security Risks

Why File Syncing and Sharing Solutions are Broken

There has been a proliferation of data driven devices like tablets, smartphones, and laptops that has created an enormous demand for access to business files from anywhere at anytime. This is particularly troubling for businesses because it’s created a bit of a blind spot for IT departments.

Companies that care about maintaining control and visibility over company data may have a difficult time staying ahead of the issues with this demand for access to business data because of how widespread it is within the workplace. For businesses needing to provide remote access to file shares, there are numerous challenges that file sync and share solutions pose to businesses.

Data Proliferation

As data storage increases file syncing solutions quickly breakdown.  Files are synced across multiple machines at all company locations meaning bloated hard drives, sync errors and corrupted data that increases support and hardware costs.    For many firms with several terabytes of data it simply is not feasible or cost effective to utilize syncing solutions due to the large number of files and amount storage space required on each users PC.

The additional file syncing also puts a strain on existing internet connections as each file is synced up and down over the network to all user’s machines and devices.

Data Theft

The large majority of the problems stemming from consumer-grade file sync solutions is a simple lack of oversight.  Company  data is  synced to smartphones, tablets, and laptops on end user devices outside the control of IT.  This makes the theft of company data all the more easy to hackers, past employees or to those that would steal the end users’ device.

Business grade monitoring solutions exist but they require large monthly fees per device and oversight labor by internal IT to manage them.

Data Loss

What cloud syncing provider never tell you is no syncing solution is perfect.  Over time any business will tell you they have lost critical files during syncing.  There are numerous ways in which data can be lost using syncing solutions including: hard disk problems, disks that are not ready when the sync software runs, collisions with other users, antivirus software that quarantines files, disk scanning software (for example, backup software) that locks the sync software and makes it appear as if files are missing.

All of a sudden whatever document an end user is working on is lost, corrupted, or deleted from your company’s system altogether.

 

MyWorkDrive provides a solution that allows access to files either on premise or remotely when online, either through a mapped drive or the MyWorkDrive.com web browser client. What this means for any company looking for a simple solution for accessing files remotely is greater accountability, lower cost, and increased security and control over your business data.

Hackers

5 Signs You’re the Victim of Hackers and What to Do About It

Has your privacy ever been invaded and shortly after, you have trouble trusting that it won’t happen again? If it hasn’t happened to you, you’re one of the lucky ones.

Unfortunately there are vicious hackers out there in the IT world, as we’ve seen recently with what could potentially be one of the largest breaches of data to the United States—affecting more than 4 million federal employees.

To make sure that this doesn’t happen to your information—keep an eye out for these signs of hacking:

1. Antivirus Messages We Would Like to Believe are Real

It’s commonplace to see those pesky anti-virus messages pop up on the computer screen. In fact, it seems almost inevitable and it usually happens when you’re doing something important. Unfortunately once you see the message, it may be too late even if you try your hardest to click the cancel button as soon as you see it.

2. Popups That You Can’t Escape

If you’re seeing frequent pop ups, it is a sure sign that you’ve been hacked. Not only are they annoying, but they can simultaneously hinder your system.

3. It May Not Be That You Changed Your Password and Forgot It This Time

If your password suddenly changes, and you know for a fact that you remember it, it’s a sign that you’ve been hacked. Whatever service the password was used for is now in the hands of the hacker—pretending to be you.

4. Is That You Moving the Mouse?

If your mouse suddenly starts making selections and choosing incorrect choices, a hacker is involved. It may happen after-hours, when the desktop has been out of use for a while, giving the hacker the ability to break into bank accounts or steal information.

5. Software Appears That You Didn’t Install

Worms will try and disguise themselves as real programs and install themselves on your computer. Sometimes programs will install themselves from another program that you installed after reading the legal agreement.

What Can You do to Protect Yourself from Hackers?

  • When logging into Wi-Fi in a public place, you are making yourself vulnerable to hackers. Also, be cautious of the websites you visit while logged into the public network.
  • Look for unwanted programs and toolbars that you didn’t install on your computer and delete them as soon as possible.
  • Run an antivirus scan on your computer if you feel like something just isn’t right.
  • Make your passwords complex and change them often. Making them complex involves using symbols, a mixture of upper and lower case letters and numbers.
  • Never click on links in e-mails that you don’t recognize and don’t download from a website that you are unfamiliar with.

It’s important to be aware of your surroundings while surfing the web at all times. Explore preventative options, like switching to a cloud-based data center, before a hacker has the chance to access your information.

The Cloud and File Sharing

5 Benefits of the Cloud for File Sharing

File Sharing

Lack of File Sharing Mobility in Workplace Costing Companies

Effects of the Lack of File Sharing Mobility

A recent study has revealed that companies and top executives have lost data, missed deadlines, and suffer from decreased productivity because of a lack of file sharing mobility and remote access.

According to the report, The State of Mobility in The Workplace, forty percent of top executives for companies have reported that they have missed a deadline because they could not access files remotely with a mobile device. Thirty percent say they missed a deadline because they could not edit files remotely. As a result, companies without a clear file sharing strategy in place are losing out on vital business and hurting overall efficiency and productivity.

Business owners need to think about many different administrative details, and how to share files securely is one of those main issues to consider. Now more than ever it is vital for a company to have remote access to files and workstations when not in the office, especially from a mobile device.

As the data from the report tells us, it can cost companies and individual workers or executives big time.

Benefits of Having a File Sharing Strategy/Platform

Access

Depending on which file-sharing platform you use, and there is seemingly an infinite number out there, one thing is fairly constant – access.

File sharing programs offer more access than ever before, as you can access your documents stored through your desktop, through the internet and a web-based interface, and even through your phone via an app or mobile browser.

Mobility

What would a file-sharing program be if it did not allow you to actually share your files? Rhetorical question, yes, but the best part about these file-sharing programs is the ability to share files between your business colleagues and employees – regardless of where they are located.

Now there are security measures built in that enable you to decide who has access to what and what they can do with files they upload and download, so you don’t have to worry about anyone going in there and messing things up. You can either have a password set up and provide access that way, or provide users with their own accounts so you can track their activity specifically.

Storage Backup

Other than the access and sharing capabilities of file-sharing platforms, one of the biggest benefits to instituting a file sharing strategy is the storage backup you get with it.

Not only is it paramount for businesses to have remote access to critical documents and projects, but you also need to store those files and data to ensure you always have a copy other than on your physical computer. Having a backup readily available, and accessible from anywhere, can ensure your company doesn’t lose vital information again due to disaster or human error.

File Sharing and Cloud File Access

5 Business Technology Pioneers

Where would we be without technology? From the World Wide Web to the Smartphone and everything in between, technology has changed the shape of the world and has complete transformed the way that humankind does virtually everything. Now it’s possible to order a pizza while riding the subway and book a hotel room while driving.

One thing is for sure, however; technology would not be anything it is today if it weren’t for the business technology engineers who shaped it. While there are so many individuals who have helped to shape and change this industry, here’s a look at five of the most influential pioneers.

  1. Mark Zuckerberg –You can’t even buy a package of gum without seeing that iconic blue ‘F’ for Facebook. With billions of users, and millions more new users joining the social media yearly, Mark Zuckerbereg, the creator of the social media giant, is, without a doubt, one of the most notable business technology pioneers.
  2. Sergey Brin and Larry Page – The Stanford University graduates co-created the world’s largest search engine – Google. Together, the two came up with the idea to create a search engine that would provide users with precisely what they were looking for and limited the amount of time that they would have to spend looking for what they wanted to find. Today, Google powers so many facets of the World Wide Web and technology that it the word ‘Google’ has become a verb.
  3. Bill Gates – At just 19 years old, Bill Gates created one of the first software companies for personal computers in the world. At 24, he joined forces with Paul Allen, and together, the two struck a deal that was pure gold. The duo went into business with IBM and completely transformed the way that the World Wide Web operated. Today, Gates is one of the richest people in the world.
  4. Steve Jobs –His name is synonymous with Apple, the company that he created. While Apple is certainly one of his greatest achievements, it’s not his only one; Steve Jobs also changed the animation industry when he pioneered and became the chairman of Pixar. He has single-handedly changed modern music, communication and entertainment.
  5. Thomas Watson Sr and Lou Gerstner – The pair, who both came from the working class, spearheaded a company that completely changed technology. Together, they created International Business Machines, better known as IBM, a computer technology and IT consulting corporation.
Cloud File Server Remote Access

Benefits of Having Remote Access to Your Work Files

Remote access is no longer a company perk it’s a necessity. Remote access means different things to different people. It can refer to telecommuters accessing their company’s server; branch offices that need interaction with systems at company’s main office; or enable mobile employees to upload or download data from a hotel, car, or even a customer’s office.

Remote technology applications boost collaboration. Employees anywhere can access and work with files in real time—no emails back and forth with updated files attached. Better collaboration improves productivity and creativity.

Meetings go digital, enabling effective participation and communication with colleagues, partners, and customers – anytime, anywhere, on virtually any device, eliminating travel and the need for on site interaction.

What Can Remote Technology do for Business?

Access systems anywhere, anytime. With mobility being vital in today’s world, businesses need easy access to their files, calendars, and client database no matter where they are. Remote access applications are a great solution for today’s mobility requirements. Some of the best features:

 

  • File transfers: Easily transfer a file between computers without emailing files to yourself.
  • Remote printing: Send documents to the printers connected to your remote or local PC.

 

Remote technology can provide more time on the job. No more snow days or other challenges associated with absenteeism. Access and productivity are no longer issues with remote access technology. Users can log into their office desktop from home, inclement weather or a personal matter need not impact the business’s ability to continue with day-to-day operations. Remote productivity allows remote workers to perform tasks without interrupting end-users.

How Can a Business Get Remote Access?

When choosing the remote technology for a business, there are many avenues:

Remote Technology programs such as LogMeIn, grant employees access to the programs and data on their company PCs from outside locations. This allows them to work from their chosen device while leaving the actual data back in the office.

Terminal Services, or Remote Desktop Services, where multiple users connect to a single server. Applications are installed on this terminal server rather than on individual desktops.

Cloud-based, using remote servers on the internet to manage, store, and process data instead of using a personal computer.

Many methods of remote access leave your confidential data at risk. MyWorkDrive offers a solution to give you all of the benefits of the cloud and remote access, but with reduced risks.

VPN Costs

How to Avoid VPN Security Break-Ins

Major VPN Flaw

Do you remember Heartbleed?

A major security vulnerability affecting hundreds of thousands of websites, Heartbleed was not just another virus – it was a flaw. A mistake allowing hackers to extract massive amounts of information off the VPN connection:

  • User Names
  • Passwords
  • Other sensitive data.

SSL allows information to be securely transmitted between you and a server without the threat of a third party intercepting the information. OpenSSL is the open-source implementation of SSL. Many online businesses used OpenSSL, as it was considered to be one of the more secure ways to transmit data.

For this to work, your computer needs to communicate to a server. It sends out a “heartbeat” which sends a signal to a server to see if it is online. If the server is online, it returns the signal to your computer. Both your computer and the server send out heartbeats on regular intervals to ensure that both you and the server remain online.

The flaw, named Heartbleed, leaked memory content from clients and servers during the exchange. A VPN-targeting hacker took advantage of this “heartbeat” by maliciously changing the signal to servers. Instead of a return signal, the server diverted memory to the user who had sent the tainted heartbeat. Once connected to the VPN network, the hacker was free to intrude upon many more active sessions and escalate the attack.

Impact for Current VPN Users?

VPN Servers still pose core security problems. Developers wrote the code for using VPN servers and as we learned from Heartbleed, developers make mistakes.

Any connection from this network exposes you to more attacks whether from future attacks or from vulnerable systems that have not been patched yet.

MyWorkDrive as a Solution

Our Cloud ConnectorAgent hides the topology and characteristics of your back-end servers by removing the need for direct internet access to them, with a reverse proxy. Only the required ports to access the SSL user portal are available in the cloud for your users.

A proxy server is a server that forwards content requests from multiple clients to different servers across the Internet. A reverse proxy is between a client and a server in a private network and from behind a firewall. The proxy handles incoming requests and it directs them to the appropriate back-end server. When combined with the cloud, a reverse proxy gives you all the benefits of the cloud without compromising control or security.

This additional level of control between clients and servers is gained by utilizing the best features of using the MyWorkDrive Cloud ConnectorAgent.

MyWorkDrive acts as a VPN Replacement.

Security

By intercepting requests to back-end servers, your identity is protected and you have an additional defense against security attacks.

Load Balancing

Load balancers are crucial to networks that receive large volumes of requests. Placed in front of back-end servers, ConnectorAgent distributes requests across a cluster of servers. This maximizes speed and capacity and ensures no single server is overloaded, which can degrade performance. In the event that a server does go down, the load balancer redirects traffic to the remaining servers.

Web Acceleration (Reverse Proxies)

Our Cloud ConnectorAgent uses intelligent compression and caching for commonly requested content. Additionally, taking on tasks such as SSL encryption further reduce the load on servers and enables optimum performance.

With My Work Drive, you get all the benefits of the cloud without sacrificing privacy and security.

 

how safe is the cloud

Cloud Risks: Just How Safe is the Cloud?

Cloud computing provides instant access to data through an internet connection. Whether on a desktop, a tablet, or even a phone, data is available anytime, anywhere. For businesses, cloud computing reaps benefits such as scalable storage for databases, applications, and files while eliminating the need for a data center or IT support team.

Risks When Migrating to the Cloud

Even technology experts reveal that there is no such thing as a completely safe cloud system. From security flaws to support issues, there are significant risks users take when migrating to the cloud.

Loss of Control

Someone else is looking after data that is transmitted, processed, and stored in the cloud. Data is stored off premises and all maintenance and monitoring is done by a third party provider.

Lack of Support

Many cloud-based services have inadequate customer service in ratio to customers. Imagine being unable to access your information, but being unable to get help right away. Waiting up to 48 hours for a response could ruin a business in a crisis situation.

Privacy and Confidentiality

Privacy violations happen frequently enough in the cloud to cause concern among potential and current users. This is unacceptable when transmitting and storing sensitive information, specifically financial and health-related data.

Insider Breaches

A contractor for Vodaphone stole personal information from two million German customers. Victims were warned about possible email phishing attempts, as the thief had enough significant data on users to make these seem legitimate. With a cloud, this could be worse as administrative access enables an attacker to steal, and even destroy the cloud, in a matter of minutes.

Cyber Attacks

With recent cyber attacks, such as the hacking of Apple’s iCloud, businesses are right to be concerned. Any time people data is stored on the internet, there is a risk for a cyber attack. This is especially problematic with cloud computing, where all types of users on the same cloud system store extensive amounts of data. The fear of cloud computing is that data is always at risk. Hackers are advancing as fast as the technology.

MyWorkDrive as a Solution

If the above concerns make cloud computing an unacceptable risk, consider a different approach. Businesses can get all of the benefits of saving to the cloud but in a more secure and private solution with MyWorkDrive.com.

apple icloud hack

Apple iCloud Hack

The U.S. Federal Bureau of Investigation warned U.S. Businesses in early October that hackers it believes to be backed by the Chinese government have recently launched attacks on U.S. Companies.

Days later, Apple’s iCloud storage service China was attacked by hackers trying to steal user credentials. Greatfire.org, a Chinese web monitoring group, broke the news online and adds that it believes that Beijing’s Cyberspace Administration of China is behind the campaign.

Using what is known as a man in the middle attack to intercept user data. This is when the attacker intercepts messages and then retransmits them, substituting his own key for the requested one, so that the two original parties still appear to be communicating with each other. Earlier in the day, Google and Yahoo faced similar attacks.

The attack coincided with the release of the new iPhone 6 and iPhone 6 Plus in China. Apple added new security measures to its latest phones, designed to limit government and law enforcement surveillance of users.

Ironically, China’s Ministry of Industry and Information Technology accused Apple’s iPhone of posing a threat to China’s national security and delayed the release. Bowing to government pressure, Apple’s iCloud data storage was shifted to China Telecom, which was the target of the attack.

Greatfire.org explains that since the attacks appear to originate from “deep within the Chinese domestic Internet backbone” data interception would not have gone unnoticed by Chinese Internet providers.

The timing of the hack could be related to tens of thousands of Hong Kong citizens taking to the streets seeking freedom from the mainland Chinese government. Chinese authorities could gain access to photos and data stored on iCloud related to the Hong Kong protests.

This operation does not just affect China, but for Internet users everywhere in the world. In December, news emerged that the Cyberspace Administration of China was now in charge of China Internet Network Information Centre; the authority that issues digital certificates to Web sites here. Web browsers all over the world are now trusting the Chinese government to tell it which sites are genuine.

Foreign companies are bending over backwards to comply in exchange for market access. These attacks are these companies paying the price for that privilege.

Policies mandate that vendors file sensitive IP, such as source code, with the Chinese government. While foreign entities are hesitant to adhere to these policies, the potential for impressive profits in China makes compliance tempting. And to the extent that they do comply, experts say, the companies’ hardware and software become vulnerable to Chinese hackers who could obtain those keys.

Incidentally, Apple posted the biggest quarterly profits in its history thanks partly to booming sales of the iPhone 6 in China, revealing that it sold more iPhones in China than in the US in the final quarter of 2014.

decentralizationof the internet

The Decentralization of the Internet

If you have heard of or are familiar with Bitcoin, you are witnessing that revolution of decentralizing the Internet. The Internet we know now is not the net we knew just 10 years ago, and it is not the same as the Internet we will see in the next decade. Think about the daily activities that occur on the Internet: file sharing, photo sharing, sending and receiving money, and collaborating or saving files to a cloud. This is the centralized Internet we know today, but there is a technology Super Storm brewing and it will completely transform the Internet platform. Decentralization of the Internet is inevitable, and it is simply a change of power: Internet control is taken away from the bureaucracy’s government agencies, and it is placed in the hands of its users.

 

Who is in charge of the centralized Internet? Not you. It is government agencies, banks, social networks, and bureaucratic mega groups. They are essentially the gatekeepers of the net. Everything shared, stored, downloaded, paid, and uploaded go through the Centralized Almighty. What does this mean for Internet users? Well, first, it means nothing is truly safe or owned. When Google goes down, worldwide Internet traffic tanks by nearly half. This system is weak and flawed, and inevitably susceptible to greed, security attacks, and exploitation. Honestly, when users click the ‘terms of use’ on a site, they do not know what it really entails. The on-demand access we crave opens us up to wire-tapping, intrusions and leaks.

 

The movement to grant users control of their own data is one that many programmers, law professors, and anyone else who values security and privacy, is to decentralize the Internet. The process of decentralizing the Internet makes users ‘self-hosts,’ out of the boardroom and government institutions and in to the hands of the users.

 

Many technologies will contribute to the transition to a decentralized internet: peer-to-peer social network models; open source software routers that enable communities to build their own mesh networks; mesh networking apps; small, wearable computer devices; Wireless Registry; Cryptocurrency; cryptography; peer-to-peer payments and lending sources; and online learning platforms. Ownership will be authenticated and correspondence will be achieved individually. Instead of large scale hack attacks, ‘.bit’ domains and the information on the sites cannot be taken over by government agencies or criminals; access is granted to or surrendered by the owner of the site.

 

It is expected by 2020 that more than 50 billion devices will access the Internet, which means data and privacy are the most susceptible victims of the centralized Internet. Decentralization will face tough legal, political, social and technological challenges. With anonymity and control being the focus of the movement, pushback will surmount. One of the most desirable functions of decentralization may also be its greatest hurdle. It is possible that liability and accountability will be compromised as well, as increased illegal activities. Nevertheless, privacy, ownership, data protection and innovation will keep the decentralized Internet a technology for the people.

dropbox hacked

Dropbox Hacked

Was Dropbox hacked? According to Dropbox, absolutely not. The Internet lit up with reports that the popular cloud service was hacked, which potentially exposed millions of its users, but Dropbox quickly reassured its users that reports were false. Dropbox quickly came to its own defense and strongly rejected the claims.

 

According to The Next Web, an international, Internet technology online news provider, the leak was noticed on a site named Pastebin. The hackers released a list of 400 accounts and threatened to release more if it did not receive its requested Bitcoin ransom.

 

According to the hackers, they had more than 6.9 million email addresses and passwords that belonged to Dropbox users. A Reddit thread appeared online when the story was first uncovered. According to The Next Web, Pastebin had four files that linked to documents containing Dropbox usernames and passwords. An anonymous user that sought out Bitcoin donations for more leaks teased the posts. The hacker teased that he/she had more information, and continued financial support would result in more leaks. A few Reddit users reported that the information really worked. However, a more thorough investigation was not conducted to verify the validity of the grand, and expensive, claim.

 

Immediately, Dropbox issued a response on its site, forcing The Next Web to print an update to its initial report. The Dropbox statement stated that the site was not hacked.

 

Dropbox Response:

 

Dropbox wasn’t hacked

Posted by Anton Mityagin on October 13, 2014

Recent news articles claiming that Dropbox was hacked aren’t true. Your stuff is safe. The usernames and passwords referenced in these articles were stolen from unrelated services, not Dropbox. Attackers then used these stolen credentials to try to log in to sites across the internet, including Dropbox. We have measures in place to detect suspicious login activity and we automatically reset passwords when it happens.

Attacks like these are one of the reasons why we strongly encourage users not to reuse passwords across services. For an added layer of security, we always recommend enabling 2 step verification on your account.”

 

“Update: 10/14/2014 12:30am PT

A subsequent list of usernames and passwords has been posted online. We’ve checked and these are not associated with Dropbox accounts.”

 

There are a few concerns users can take away from the Dropbox story: reusing the same password on multiple sites and the threats of third-party sites. Many users are discouraged by trying to remember multiple passwords for multiple sites, but it is absolutely necessary to ensure your online privacy and to protect your data. Use passwords that are difficult to decipher, and consider using a password management system to assist you with remembering and frequently changing the information.

 

One of the most disturbing dimensions of the story is the risk of third-party sites. Too many services permit access to third parties. Third parties are often blamed for the security breaches, but the fact is, many services are not doing enough to vet the application and sites that are permitted to access their platforms.

Enjoy the benefits of the cloud without giving up your data to a third party service like Dropbox with My Work Drive.