M-Files Acquires Hubshare to Strengthen External Content Sharing and Collaboration, Deliver Best-in-Class Digital Client Experiences

M-Files, the intelligent information management company, today announced the acquisition of Hubshare to bolster external content sharing and collaboration and deliver an improved digital client experience. Hubshare offers a secure digital workplace portal that enhances user and client engagement through collaborative working, secure file sharing, and project management.

Now part of the M-Files product portfolio, Hubshare provides a secure information exchange platform where companies can be forerunners in driving digitalization and improving the customer experience using branded, customizable client portals. The portals can be quickly and easily tailored to meet individual client needs which drive collaboration and productivity.

“The Hubshare acquisition helps us deliver a unique digital client experience and better serve knowledge worker industries such as Professional Services, where information sharing and external collaboration are critical requirements,” said Antti Nivala, founder, and CEO at M?Files. “Our integrated offering takes M?Files from the back office to the frontline of our customer’s business, helping provide a digital window for our customer’s clients as they drive digitization across the organizations they serve.”

Unlike typical file sync-based document portal solutions where information is copied from an enterprise content repository, M-Files now offers a secure and integrated solution for internal and external collaboration without data duplication. While the M-Files user experience is optimized for streamlining internal document management processes, the new Hubshare hub in M-Files provides key information such as documents, people, processes, discussions, and more to external users, such as clients, via a branded portal that is optimized for an improved external user experience. This helps strengthen customer satisfaction with a better and more compliant collaboration experience.

“Today, with the announcement of our acquisition, we celebrate our common vision and goal of making work smarter and collaboration more efficient for our clients,” said Nicholas Child, CEO, Hubshare. “Our combined offering will undoubtedly benefit organizations across the globe seeking a more secure and integrated solution for internal and external collaboration. We are delighted to be an integral part of the M-Files journey, delivering our digital client experience and collaborative workspace solution alongside the visionary M-Files intelligent information management platform.”

M-Files’ mission is to profoundly improve how companies do business in the digital, work-from-anywhere world. M-Files connects siloed systems, applications, and repositories and provides a full view of all relevant information across an organization. Delivering connected content and intelligent automation, M-Files increases the productivity of knowledge workers, ensures a seamless digital experience, enables business continuity, and reduces business risk.

About M-Files Corporation

M-Files’ AI-powered intelligent information management solution connects all documents and information, across every platform and repository, then analyzes them to place them in context. This makes it possible to serve up the right information to the right people right when they need it—and automate information-driven business processes—while maintaining complete control and compliance. Thousands of organizations in more than 100 countries (including NBC Universal, OMV, SAS Institute, and ThyssenKrupp) use M-Files to manage their business information and processes—and give their employees A Smarter Way to Work. For more information, visit www.m-files.com.

M-Files is a registered trademark of M-Files Corporation. All other registered trademarks belong to their respective owners.

About Hubshare

Hubshare enhances user and client engagement through collaborative working, secure file-sharing, and project management. The solution provides an all-in-one, flexible, and customizable digital workspace that allows unlimited customer-specific portals, each one unique to each customer’s requirements. Hubshare helps its worldwide users boost their productivity and facilitate external and internal collaboration. Hubshare has offices in France and distributors in the UK, Hong Kong, Australia, and North America, and resellers in numerous other countries.

source: https://resources.m-files.com/blog/m-files-acquires-hubshare-to-strengthen-external-content-sharing-and-collaboration-deliver-best-in-class-digital-client-experiences-2

5 Best Security Practices for Remote Teams During Coronavirus and Beyond

Social distancing measures taken by responsible employers have greatly increased the number of employees working remotely. Even in the midst of this crisis, some companies and their employees can enjoy the objective benefits of not having to waste time and money on long commutes. At the same time, plenty of businesses really didn’t have the structure in place to support a vast, full-time work-at-home workforce with the security of business processes they needed.

Remote Workforce Security Challenges During the Coronavirus Outbreak

Because employees or departments scrambled for ad-hoc solutions to remote working, they sometimes sacrificed robust security to get up and running as quickly as possible. Sadly, cybercriminals can also work from home or other remote locations, and many saw the rise in remote workers as an opportunity.

For example, one survey of security professionals found: 

  •  A majority of security employees struggled to offer strong security solutions to remote employees.
  • At the same time, almost half of the respondents reported seeing an increase in phishing attempts.
  • Most of these corporate security pros had concerns about their ability to scale security, respond to abrupt environmental changes, and the difficultly of controlling employee use of unknown and untested software.

Five Best Security Practices for Remote Employees

With the increase in cyberthreats and the concerns of security professionals in mind, it’s a good idea to consider some best practices to help keep business systems free of threats and just as important, to ensure compliance with rules that govern privacy and security in different industries.

1. Two-Factor Authentication

With two-factor authentication, sometimes called 2FA, users have to finish their login with a code that gets sent to another device, typically a cell phone. It takes a few seconds longer to access the system, but it provides better protection against phishing attacks. One CTO found that this simple measure reduced security problems in his company by almost 40 percent.

2. Use Secure Connections

Obviously, most of these home workers will rely upon their home Wi-Fi connections. Without any other protections, your security will only be as good as whatever the employee’s home internet company, router, and password can provide. To boost security, you might have employees log in through a VPN or other method of encrypting communication between their home device and your corporate systems.

3. Endpoint Security and Monitoring

No matter how well you protect logins and communication, you still can’t always avoid the threat of malicious code entering your system. On your server end, you can employ software to block threats and monitor system usages.

Even though most threats may stem from accidental vulnerabilities, it’s impossible to ignore the rise of inside jobs as a source of risks. Not only will these systems provide a firewall against malicious software, they can also send automatic alerts for unusual data use and provide a clear audit trail just in case something does happen.

4. Develop and Create Clear Security Policies

Even before the coronavirus outbreak, companies grappled with security issues that stemmed from remote workers and the rising use of personal devices.

For example:

  • In some cases, you may allow personal devices, so long as employees adhere to other security policies. For instance, you may require installation of approved security software and only let employees login to your network through your corporate VPN.
  • In other cases, you may ask employees in sensitive areas to only use the laptops or other devices that you have issued to them and to only use them in approved ways. For example, you may restrict these company-issued devices to work and not allow employees to use them to watch videos or browse social sites.

In any case, it’s important to develop clear policies. In addition to communicating these rules, you should also ensure that employees understand why they’re important and that they can incur consequences for ignoring them.

5. Deploy Secure Information Systems

Deploying intelligent and robust document and data management systems may not take as much of an effort as you think it will. These systems come designed and built to offer robust security and rule-based access for both in-house and remote workers. They also provide audit trails and guarantee recoverability, so if something suspicious happens, it’s easy to trace the issue to its source and remediate it.

How M-Files Offers the Best Solution for Remote and In-House Employees

Companies that already employed a smart data management system like M-Files didn’t have to worry about an abrupt change from working in a corporate office to a home office.

For example:

  • Access to documents could already have been set by role, so the people who needed information would have an easy time accessing it, according to their security levels. To others, that same information would be invisible. The right people could view, change, add, or delete information, and others would not even see it exists.
  • With built-in encrypted access and simple rollbacks for recoveribility, M-Files also has already been certifed as an ISO-27001 Certified Provider. This standard meets the requirements for the most sensitive data and systems.

Besides security, the intelligent features of M-Files can help improve your business processes. To learn how M-Files can help protect your business, employees, and information, schedule a custom demo today.

Source: https://resources.m-files.com/blog/5-best-security-practices-for-remote-teams-during-coronavirus-and-beyond

Your Digital Transformation Success or Failure Depends on these 6 IT Department Roles

Thanks to the onset of the global COVID-19 pandemic, more and more businesses find themselves in urgent need of a digital transformation to stay afloat. This includes both organizations who were previously interested in the idea but who didn’t think it would happen quite so quickly, along with those who never really gave it much thought at all.

Regardless, your IT department will play a crucial role in determining whether your own transformation is the success you need it to be or the failure you fear it might become. More specifically, there are six core IT department roles that will be instrumental in guiding your organization’s digital transformation.

The Cloud

By far, one of the most important contributors to the success of your digital transformation comes down to the cloud specialists you choose to surround yourself with.

Remember that these professionals are tasked with doing more than just managing the migration of information and services from one platform to another. They also need to be on hand to quickly troubleshoot any issues, to help team members navigate the cloud environment, and to help mitigate risk for your rapidly transforming organization. This is especially true during the COVID-19 era, where industries are constantly evolving in new and unexpected ways and businesses have to evolve just as quickly to stay ahead in increasingly uncertain times.

Systems Integrators

Another invaluable role during your digital transformation will be that of the system integrators. These IT professionals will need to customize the employee experience before, during, and after the digital transformation itself, carefully selecting the best combination of hardware, software, networking, and storage products to support your people and the important work they’re doing on a daily basis.

In a best-case scenario, systems integrators will be able to create a highly specialized experience that not only meets your business’ needs as they exist today, but that also makes sure your technology is finally aligned with your long-term business goals — which is a big part of what your digital transformation is supposed to accomplish, to begin with.

Information Security

Any digital transformation always brings with it a certain degree of risk in terms of cybersecurity, which is why another one of the most important IT department roles that can mean the difference between success and failure will ultimately come down to your information security team.

As more and more information and activity happen within a cloud-based, “anytime/anywhere” infrastructure, security must become and remain a top priority no matter what. Information security specialists can not only help come up with a cybersecurity strategy that makes the most sense given your environment, but they can also monitor for any suspicious activity to help stop small problems today before they have a chance to become potentially catastrophic ones tomorrow.

Data Analysis

Hidden inside the massive volumes of data that your business is creating on a daily basis is a treasure trove of insight that would have otherwise gone undiscovered. This is especially true during a digital transformation when you need access to current and high-value information to make the most informed decisions possible every day.

Data analysts help enormously to that end by retrieving, gathering, and analyzing data — all of which allows you to take a more organic data-driven approach to what you’re doing. Not only can they spot important patterns and better understand how certain activities impact your business, but they can also make smarter recommendations on how to improve your operations to help you reach your long-term goals more efficiently than ever.

The User Experience (UX)

User experience designers also have a crucial role to play in your digital transformation by capitalizing on opportunities to improve not only the accessibility of your system but its usability and interaction potential as well. In a larger sense, they’re tasked with providing all of your users with the best possible experience that they can — all so that your employees can spend less time trying to figure out how to get their technology to work and instead focus on putting that technology to work for them.

This is once again particularly important during COVID-19, given the fact that your online experience is essentially the only experience that you’re able to offer your employees for the foreseeable future. Therefore, user experience designers are critical to not only help make sure that your digital transformation goes off without a hitch but to do so in a way that also makes sure that your employees have access to everything they need to do their jobs every day.

Information Management

Finally, we arrive at information management specialists, otherwise known as the hardworking men and women who are tasked with making sure that data is flowing freely across your organization at all times.

Especially when you’re talking about something as important as digital transformation, you cannot afford to deal with data silos at any point. If you’re not sure where information is or even what is important and what isn’t, it’s difficult to make sure that everything transitions from one system to another as securely and as smoothly as possible. Information management specialists can leverage solutions like M-Files to bring all of your data together, regardless of where it might be stored. An information management platform like M-Files will create a single data repository for all of your important files, regardless of whether they’re stored in the cloud, on personal drives, on network shares, or on something else entirely.

In the end, any digital transformation will always be a time-consuming and somewhat stressful process, but that is especially true during the COVID-19 era when more people are working remotely than ever. But by making sure that these six core IT department roles are filled before, during, and after the transition, you’ll have put your business in an excellent position to enjoy all of the benefits of this process with a few of the potential downsides as possible.

Source: https://resources.m-files.com/blog/your-digital-transformation-success-or-failure-depends-on-these-6-it-department-roles

The Top 4 Powerful Benefits of a Document Management System

One of the most important things that business leaders need to realize is that outdated technology – especially a document management solution – isn’t just frustrating. It can literally be costing organizations money in more ways than one. In this article, we’ll discuss four benefits of a document management system.

The sheer volume of information that your average enterprise is creating on a daily basis is enormous — to the point where simply keeping track of it all can be an uphill battle. Without the right type of document management structure in place, your employees quickly become overwhelmed by your data, rather than using it to help move your business forward.

Luckily, the right document management system like M-Files can help relieve these issues in businesses in nearly every industry. In fact, a document management system will bring with it a number of distinct benefits and opportunities, all of which are worth a closer look.

The 4 Benefits of a Document Management System

Empowering Compliance Capabilities

Depending on the industry you’re operating in, it’s likely that your business has its fair share of compliance requirements to deal with. One of the major things that a lot of people don’t understand (until it’s far too late) is that if your technology isn’t compliant with regulations like ISO 9001 or ISO 13485, your business isn’t either.

Thankfully, this is one of the chief benefits that a document management system like M-Files brings to the table: they allow you to demonstrate regulatory compliance in an effective way, all while improving visibility into and control over your own information at the exact same time.

M-Files allows you to finally understand how data and business processes flow across your enterprise, allowing you to finally conduct a risk-based approach to quality processes. Plus, approval history and audit trails mean that documents are always highly traceable in a way that meets your security expectations, too.

Superior Document Security

Speaking of document security, a document management system excels to that end by offering a single repository to offer better protection to the critical information you’re creating on a daily basis. When your essential business information is stored across personal and enterprise cloud drives, local storage, network shares and in other spread-out locations, it’s difficult to simply know what is where let alone to protect it all.

By bringing everything together into a single source of information and knowledge, however, you make that information immediately less accessible to hackers and other malicious types of third parties.

Robust Search Facilities

Another issue with having your data so spread out ultimately involves how difficult it can be to find what you’re looking for. This is especially problematic given the sheer volume of documents that make their way through a business every day. If it takes your employees on average ten minutes to find the document that they’re looking for just so that they can START their work, that’s ten minutes that they weren’t doing anything meaningful to drive revenue for your organization. Multiply that opportunity cost by the total number of employees you have and the total number of documents they may need each day and you can begin to get an idea of just how severe this problem can be.

With a proper document management system, however, all of this goes away. It doesn’t matter WHERE something is stored at that point because so long as your employees know WHAT they’re looking for they’ll be able to find it. Likewise, with version control and similar features, you can always make sure that your people are retrieving the correct version of a document at all times.

Enhanced Collaboration Anytime, Anywhere

Finally, we arrive at the ways in which a document management system doesn’t just support internal collaboration but enhances it. The important work that your employees are doing for your clients isn’t created in a vacuum. Oftentimes successful projects are the result of the hard work of countless people, all working in tandem with one another to contribute something more effective than they could as individuals.

But when information is still trapped in data silos, it’s nearly impossible for this to happen because those documents aren’t getting into the hands of the people who need them. Without proper version control, collaboration becomes a disjointed and frustrating process. Three different people may need to review a document before it can be passed onto a client, but how can you be certain that they’re reviewing the same version of that document? If a change is made that eventually comes into question, how do you know who made it? How can you get all key stakeholders on the same page, let alone always moving in the same direction?

A high-quality document management system like M-Files eliminates these issues by providing a single source of information that all parties can access securely anywhere at any time. It doesn’t matter if your workforce will be operating out of home offices for the foreseeable future — they can all access the same versions of documents at the same time and contribute to the job that needs to be done.

This doesn’t just eliminate wasted resources — it promotes far better productivity and delivers more value to your customers as well.

If information is the foundation of your business, it’s safe to say that you need to make the effective management of that information one of your ongoing top priorities. That, in essence, is what a document management system is designed to do: it creates an opportunity to stop worrying about things like compliance, security, lost productivity and poor collaboration, all so that you can focus the maximum amount of your attention on running the most successful business that you can.

Source: https://resources.m-files.com/blog/the-top-4-powerful-benefits-of-a-document-management-system

These Seven Little Document Management System Changes Can Make a Big, Big Difference

Over the years, document management systems have evolved to the point where they’ve become a major contributing factor to the productivity of your organization… or they can be, under the best possible circumstances.

So how do you lean into the strengths that make these solutions so powerful, taking advantage of those “best circumstances” at every opportunity? By making seven little changes to your approach that add up to a big, big difference before you know it.

Create a Culture that Embraces New Software

By far, the most important thing you can do to make a big difference with regards to your document management system involves embracing new software when the situation calls for it. But don’t just drop a new solution into your employee’s laps. Start slow, schedule training sessions to make sure people actually know how to use it (something that will certainly increase adoption) and make yourself available to answer any questions or to address any concerns that your employees might have. Change management is key here and how your organization achieves it will be a key to adoption of your document management system.

Empower Collaboration

You should also make sure that you’re making collaboration a central focal point of all your document management efforts. It will have an almost immediate impact on content creation, for example, as the quality of the work your employees will be able to deliver will always be better if they can freely partner with one another during the process.

Likewise, employees should understand their role in helping to organize files, label documents correctly, delete duplicate files and more. All of this goes a long way towards turning your document management system into something that drives results. 

Enable Better Communication

If you had to make a list of all the elements that are the cornerstone of any successful project, communication would undoubtedly be right at the top. One of the major reasons why projects fall apart usually has to do with a breakdown in communication — which is why your document management system is about to become invaluable to that end.

By making your document management system your central point for communication, you’re removing the need for people to interact with multiple applications just to get things done. Plus, you’ll be eliminating yet another potential data silo for information to get lost in — which is why this is one step you should take sooner rather than later. 

One Community Administrator to Rule Them All

This is one of those little best practices that far too many organizations overlook — having a project leader (otherwise known as a community administrator) to oversee your document management system moving forward.

For the best results, try to find someone who already has an idea of how to operate every aspect of the system. Not only will this help you continue to make sense of things, but it also gives your employees someone they can always turn to if they have any questions or concerns. 

The Power of Versioning

Versioning is a terrific change to implement to your document management system because it allows people to make as many changes as they’d like to a file, all without overwriting the original content contained inside it.

At that point, you can always refer back to an older version of a document if you need to — something that is particularly important while editing. Plus, you’ll be able to see who changed a file, why and when — all of which can be helpful in the long term.

The Importance of Access Rights

Another important best practice you’ll want to implement involves defining access rights for every file and document in your system. Keep in mind that not every employee is going to need access to every last kilobyte of data in order to properly do their jobs.

Not only will access rights help avoid confusion by making sure that nobody can access or even edit a document if they don’t expressly need to, but you’ll also go a long way towards safeguarding those documents as well.

Tagging, Tagging, Tagging

Finally, one of the most important changes that you can implement to your document management system involves leaning into the importance of metadata and tagging — something that makes finding the critical data you’re looking for far, far easier than ever before.

At a minimum, you should eliminate all guesswork from the equation by training your employees how to tag files and other documents the right way at the moment of their creation. Not only can this save a significant amount of time, but it can also increase productivity as well.

As you can see, improving your document management system is less the product of anyone’s major move and is more about a series of smaller ones. But these small tweaks all add up to something far more powerful than they could be on their own — which is a very exciting position for you to be in.

source: https://resources.m-files.com/blog/these-seven-little-document-management-system-changes-can-make-a-big-big-difference

The 4 Types of Collaboration Habits That Make Information Security Breaches an Inevitability

Because of the ongoing COVID-19 pandemic, more people are working remotely than ever before. On the one hand, productivity hasn’t really suffered as there are a large number of cloud-based tools that make it possible to be just as productive outside of the office as you are in it.

But on the other hand, there are also certain types of collaboration habits that make security breaches no longer a matter of “if” but “when.” Understanding what these are is the best way to avoid them at all costs. 

The Dreaded “User Error”

If you had to make a list of all the reasons why data breaches are allowed to occur in the first place, the human error would undoubtedly be right at the top. It’s not that your employees are outright trying to sabotage your network — far from it. But when people share passwords with other employees, share sensitive data via insecure collaboration tools or make any similar mistakes, they’re essentially opening the door to your network for anyone to walk through.

To combat this as much as possible, you need to make it as easy as possible for employees to access the data, the tools, and the systems they need to do their jobs. Likewise, you need to invest in ongoing cybersecurity training to help make sure people are aware of all of the potential risks they face. You can’t expect someone to avoid falling victim to a phishing attack if they’re not even really sure what one looks like.

The Risk of Data Overexposure

A lot of people don’t realize that the types of chats and files shared by employees on online collaboration platforms are usually retained forever — meaning that this data is always going to be vulnerable to a cyber-attack if you’re not very, very careful. So even if your business’ network isn’t breached, you’re still not out of the woods if that collaboration tool is as at that point hackers would have access to everything someone ever said or did with the platform.

This is why you always need to choose your cloud-based partners wisely and assess each one’s level of data and system security before picking one to go with moving forward. Likewise, you should add as many security measures to reach the data repository as possible to help reduce your risk surface as much as you can. Always make sure that employees are using two-factor authentication, for example, and move away from free applications. Finally, make sure that all sensitive or otherwise confidential information is always classified that way so that you know exactly where critical data is and where it needs to be protected.

M-Files gives organizations full control over who can access information at different stages of a process. Access will also automatically change when people leave or move into a new role.

Risky Personal Devices

Another one of the major collaboration habits that makes it possible for data breaches to take place has to do with employees who insist on using their (inherently insecure) personal devices.

If you give an employee a laptop computer, you can encrypt any data contained on it. You can always make sure that it is up to date in terms of patches and you can take whatever other steps are necessary to mitigate risk. You don’t have that option when someone is using their own personal devices, which is why you need to pay close attention to this phenomenon at all times.

Always audit your IT environment and network activity and pay attention for suspicious activity. If you find that users are working with their own devices, try to get them to use corporate devices and always install endpoint protection tools on each one. 

Shadow IT

Finally, one of the biggest collaboration habits that increase the chances of a data breach ultimately comes down to the use of unsanctioned tools, otherwise known as Shadow IT.

Sure, your employees may feel more comfortable working with their own personal file sharing services. But you can’t protect this data repository if you don’t know that it exists in the first place and if someone is using it to link to or share corporate files, it runs afoul of the very best practices that cybersecurity plans are built on.

For the best results, always be sure to work closely with all departments to understand employee workflows and their business needs. Try to really understand WHY someone is using Shadow IT — what feature do they need that you’re not giving them access to, or what other concern do they have that this relieves? Then, select collaboration tools that address these issues — thus minimizing security risks across the board.

Source: https://resources.m-files.com/blog/the-4-types-of-collaboration-habits-that-make-security-breaches-an-inevitability