Posts

Showing posts from November, 2017

Does two-factor identification matter for file sharing?

Image
    Does two-factor authentication matter for file sharing? Today, let’s look at two-factor authentication and its value in protecting your file sharing efforts. First, what is it? Two-factor authentication requires two different forms of identification to verify an employee. In general, the idea behind it is that the two forms of identification aren’t necessarily closely linked to each other: the possession of one form of ID doesn't reveal the factor in the other ID. What does this have to do with File Sync & Share (FSS) platforms? Organizations routinely share very confidential files among employees as well as third parties. All this sharing is occurring on external networks and via a wide variety of non-secure devices. This means the security that is built into an FSS platform is exceptionally important. Anyone who follows any business news is aware of the severe consequences of a data breach. You should look carefully at the level of security offered by any file sharing too...

BYOD: What is it, and why do it?

Image
    BYOD: What is it, and why do it? BYOD refers to “bring your own device” — a business environment where employees of an organization are permitted to use their own laptops, tablets and other mobile devices in lieu of company provided ones.  Why is this done? Aside from saving money, the primary reasons companies allow this are:   Familiarity: This may be the most obvious reason for workers to bring their own tablet or laptop to work. It may be the operating system, web browser or other apps on their devices that they know and feel comfortable using. They don’t have to live in two electronic worlds at the same time.  Simplicity: Companies have been providing their employees mobile phones for business use for a few decades. Now those employees carry two phones, since everyone also has a personal phone. This can be a nuisance for your employees. It is hard enough to care for one mobile phone, and now they worry about two of them. The reality is that companies expect employees to be i...

End Version Control Nightmares

Image
       End Version Control Nightmares Did you send out a Word document for a client or colleague to review today?  If you answered yes, here are four reasons to stop doing this: Time delays - Edits cannot happen in real time. You write the document, send it, they review and edit it, add comments, then they send it back to you. You receive it and make the changes, then send a revised version back to them. Meanwhile, they've moved on to some other task. Now you’re waiting for their second review. Version control - Each time you create or edit a Word doc, you save it before you send it. And the recipient who edits it does the same. No matter how careful you may be with naming protocols, the fact remains that there are multiple versions of that document out there, and there is no guarantee that an older version won't be used or distributed improperly. Lack of collaboration - Because reviews can’t take place in real time, there cannot be any real-time, on-screen “conversation” amo...

The big picture on access: Is it time for a policy?

Image
     The big picture on access: Is it time for a policy? Autotask offers a set of tools that allow you to ensure optimized collaboration across all levels within and outside the organization. A key part of this collaboration is the security features that permit you to create access settings for content, people and devices. These features are critical for maintaining security and protecting the integrity of confidential data.  The availability of these features is a great starting point for your organization to discuss broader policies for determining access.  When you adopt a File Sync & Share (FSS) solution, it’s a great opportunity to define internal policies about file access (who should see it), content (who can change it) and data integrity (from where can it be accessed). As your enterprise grows, the need for strict policy guidance to control your data will only become more important.