Yep, you read that correctly. But no, it’s not what you think. It’s not a goofy jacket, a new watch, computer glasses, or a Virtual Reality headset. W.E.A.R. actually stands for Worldox Encryption at Rest. WEAR is one of the many amazing and very timely additions coming soon to the award-winning Worldox document management system. Being able to encrypt your data at rest (while not in use) is an important added layer of security in today’s world.

Last week I had the privilege to attend the Worldox annual reseller conference in Phoenix, AZ where we got to see a preview of WEAR by Senior Vice President Fred Grossman. Fred is also the creator and main brain behind WEAR. In fact, if it were up to Fred, it would be called FEAR, or Fred Encryption at Rest. However FEAR your Data, might send the wrong message.

In as much as fearing your data isn’t quite right, it’s the healthy fear of protecting your data that leads us to the importance of real-time file-level encryption at rest. Data encryption has been around for years of course, but with all the news of recent hacks and data breaches, it has now come to the forefront. And while the technical details of encryption are mind-numbingly complex, on a basic level, data encryption scrambles all of the files on your server’s hard drives and they can only be unscrambled by someone who holds the “key” to do so.   As a result, if someone were to attempt to steal your data, either by hacking in, or physically running away with your server, they would be unable to read any of the scrambled data left behind.

So while watching the preview of WEAR, even though much of the activity occurs on the backend, I was impressed with how well it worked and how seamlessly it integrated into Worldox.  With as complex and cumbersome as data encryption can be, Worldox using their unique approach overcomes this typical burden and keeps it user-friendly in the process.  

Worldox CIO Rebecca Sattin perhaps sums it up best in a recent interview when asked: “What makes WEAR stand out from other Encryption Systems?” She answers with “End users will continue to access documents the same way they did before. However, if data is removed from the file system outside of the Worldox interface, it will be unreadable. We are combining our advanced technology with our user-friendly and familiar interface to provide encryption at rest in such a way that it does not compromise the user’s convenience.”

As the saying goes… “There are two types of companies: Those that have been hacked and those that will be hacked.” In today’s world, it really is simply a matter of time. So Security today truly needs to be a multi-layered approach. Thanks to Worldox and WEAR, firms will now have one more layer to protect what is arguably their most valuable asset.

So protect yourself…. and WEAR your data!!

Derek Burnham
Vice President
DCNC, Inc.

Worldox actually had a few exciting announcements at this year’s conference in addition to WEAR. Watch for a future blog post detailing the new Worldox Connect, and Indexer running as a service product updates.

If you wish to learn more about the award-winning Worldox document management system, and/or their new WEAR addition to the product, please contact DCNC today and we will be happy to answer all of your questions.

Pertinent links:

https://dcncinc.com/services/legal-applications

www.Worldox.com

https://www.buyerslab.com/News/Editors-Desk/2016/May/Worldox-to-Debut-Enhanced-Encryption-Feature

http://www.prweb.com/releases/worldox/bli-report-request/prweb13720605.htm

Who’s Lurking in Your Computer?

Who’s Lurking in Your Computer?

Why do you need to worry about getting cyber security support? According to recent data, SMBs with less than 250 people, are the target for cyber attackers to camp out on their systems for an average of 51 days.  That’s almost 2 months' worth of business data that is...

read more

3 Remote Work Security Tips

  Copied from our trusted source at Trend Micro Remote and hybrid work environments are here to stay, which means CISOs need to establish an effective security strategy for managing the expanding attack surface. Organizations can no longer afford (quite...

read more

DCNC Inc. Cloud Computing

DCNC Inc. Cloud Computing In an increasingly mobile world where workers are finding ways to work remotely in an efficient manner, security and accessibility are two factors of increasing importance. Employees and employers alike need to be able to quickly access files...

read more

Co-Managed IT- 4 Benefits

The complexity of business technology has increased to the point where most organizations today require somebody in-house with a technical skillset. Whether it's managing IoT technology, hardware maintenance, or specialized software, companies often need to have a...

read more

Cloud Backup

Why Office 365 Customers Need a Backup Solution   Many business owners using Office 365 believe that their data is totally secure. The reality, however, is a different story. Although Microsoft offers many benefits in productivity, efficiency, and collaboration...

read more

Why Wait For A Security Breach?

Today’s digital age is ripe with people looking to take advantage of weak systems.  From Remote Monitoring and Maintenance to Backup and Disaster Recovery, we provide around the clock IT support services to ensure what you want to be kept safe, stays safe!

read more

9 Ways Your Employees Can Lead to a Breach

We all do it, use one set of login credentials everywhere on the web.  For work, for shopping, for banking; studies show that individuals reuse login credentials for at least 5 different applications.After all, we all have way too much to remember and the thought of...

read more

0 Comments

We Are Here To Help!

14 + 3 =

Office

7100 Broadway #1B
Denver, CO. 80221

Call Us

(303) 920-9472

Cloud computing
Cloud computing
comanaged IT services

©1998-2022 DCNC, inc

All rights reserved

Privacy Policy