" "

Yep, you read that correctly. But no, it’s not what you think. It’s not a goofy jacket, a new watch, computer glasses, or a Virtual Reality headset. W.E.A.R. actually stands for Worldox Encryption at Rest. WEAR is one of the many amazing and very timely additions coming soon to the award-winning Worldox document management system. Being able to encrypt your data at rest (while not in use) is an important added layer of security in today’s world.

Last week I had the privilege to attend the Worldox annual reseller conference in Phoenix, AZ where we got to see a preview of WEAR by Senior Vice President Fred Grossman. Fred is also the creator and main brain behind WEAR. In fact, if it were up to Fred, it would be called FEAR, or Fred Encryption at Rest. However FEAR your Data, might send the wrong message.

In as much as fearing your data isn’t quite right, it’s the healthy fear of protecting your data that leads us to the importance of real-time file-level encryption at rest. Data encryption has been around for years of course, but with all the news of recent hacks and data breaches, it has now come to the forefront. And while the technical details of encryption are mind-numbingly complex, on a basic level, data encryption scrambles all of the files on your server’s hard drives and they can only be unscrambled by someone who holds the “key” to do so.   As a result, if someone were to attempt to steal your data, either by hacking in, or physically running away with your server, they would be unable to read any of the scrambled data left behind.

So while watching the preview of WEAR, even though much of the activity occurs on the backend, I was impressed with how well it worked and how seamlessly it integrated into Worldox.  With as complex and cumbersome as data encryption can be, Worldox using their unique approach overcomes this typical burden and keeps it user-friendly in the process.  

Worldox CIO Rebecca Sattin perhaps sums it up best in a recent interview when asked: “What makes WEAR stand out from other Encryption Systems?” She answers with “End users will continue to access documents the same way they did before. However, if data is removed from the file system outside of the Worldox interface, it will be unreadable. We are combining our advanced technology with our user-friendly and familiar interface to provide encryption at rest in such a way that it does not compromise the user’s convenience.”

As the saying goes… “There are two types of companies: Those that have been hacked and those that will be hacked.” In today’s world, it really is simply a matter of time. So Security today truly needs to be a multi-layered approach. Thanks to Worldox and WEAR, firms will now have one more layer to protect what is arguably their most valuable asset.

So protect yourself…. and WEAR your data!!

Derek Burnham
Vice President
DCNC, Inc.

Worldox actually had a few exciting announcements at this year’s conference in addition to WEAR. Watch for a future blog post detailing the new Worldox Connect, and Indexer running as a service product updates.

If you wish to learn more about the award-winning Worldox document management system, and/or their new WEAR addition to the product, please contact DCNC today and we will be happy to answer all of your questions.

Pertinent links:





5 Tips for Working Remotely

5 Tech Tips for getting your workforce working remotely and keeping them secure Whether by choice or by government order, as COVID-19 continues to spread, companies have employees working from home. Here are some tech tips and tricks from DCNC, to help make the remote...

read more

Meet Our New Regional Sales Manager

Jeff Lindvall has been in technology sales for near twenty years now and enjoyed working in telecom, AV integration, cloud, software, and unified communications. As far as IT sales, he’s held almost every position imaginable. He...

read more

We All Share this One Single Planet Earth

Many people are guilty of not recycling their old and obsolete electronics. It’s never a good idea to dispose of your electronics in the garbage, in fact in Colorado it’s been illegal since 2013.   Instead, it should be disposed of in the proper way and through proper...

read more

Microsoft Office 2019

If you're not on Office365, you may be curious about  the newest release of Office from Microsoft. Here’s what you need to know for now: For starters, you won’t be forced to upgrade. Microsoft Office 2019 is a standalone, one-time purchase that does not receive...

read more

Spam, Spam, Spam, Spam…

So, one morning, you log onto your computer, open your email, and find yourself staring at a bunch of undeliverable emails in your Inbox.  These emails were created and sent from your computer, or so it seems, and have bounced back from yonder destinations......giving...

read more

I know what you’ve been doing…

Now that we have your attention...   The following email text has been received by multiple contacts. Although the original email contains a user's accurate password, in the opening sentence, it has been verified that this action was not possible and no ill-effects...

read more

7 Red Flags to Reduce Cyber Attack

John Podesta fell for a phishing attack, which led to the release of a decade’s worth of emails. The hacker posed as Google and alerted Podesta to change his password because of suspicious activity on his account. By clicking on the link within the email, hackers were...

read more

Meet Our Team: Rachel Yanez

Rachel has been the Administrative Assistant and one of the dispatchers at DCNC for over 3 years. If you have ever called the office or help desk, you have probably spoken with her. Rachel also helps with ordering, inventory, billing and planning employee events. She...

read more


Submit a Comment

Your email address will not be published. Required fields are marked *

We Are Here To Help!

11 + 15 =


7100 Broadway #1B
Denver, CO. 80221

Call Us

(303) 920-9472

©1998-2020 DCNC, inc

All rights reserved

Privacy Policy