Flexible Security

Flexible security almost sounds like an oxymoron.  How can you provide the flexibility you need while maintaining security?  In our blog post on 10/14/16 (The Balancing Act of Security), we discussed the need to balance security with the usability of software.  AMS Connect is designed to be flexible enough to adapt to your individual security needs; we offer a variety of features that you can adapt to your specific requirements.

  • Dual-Factor Authentication – This feature, when turned on, requires users to verify their identity through a unique code sent via text or email. This feature can also remember (if enabled and the user selects it) a particular computer/browser so that the user only has to authentic once for a designated time frame.
  • Granular Security – Since its inception, AMS Connect was designed to provide security down to the individual item. Meaning that in order for a user to access a specific item in the software, they have to be granted access.  Additionally, if the user doesn’t have any permissions to an item (even a matter/workspace) the user won’t be able to see the item.  This is perhaps the main feature (in addition to custom branding) that makes AMS Connect stand alone, very few if any SaaS collaboration solutions offer this kind of security.
  • Groups – To ease the setup of new users, an administrator can create a group for each matter. For example, under Client A’s workspace you can have a group called “Firm” for those within your organization, a group called Client A Executives for the executives who need high level access to their information, and a group called Client A Admin for the administrative team at Client A.
  • Password Rules – The AMS Connect software allows administrators to set up customized password rules. Do you want a simple 4-digit pin or do you want a 20 character, upper case letter, lower case letter, special character, etc.?  AMS Connect can match to your password requirements, even setting password expiration and preventing repeat passwords (up to a number of your choosing).   Additionally, AMS Connect allows you to set your account lockout fail number (e.g. user inputs wrong password three times, the account is locked).
  • Password Forget – In the event you have users that have a tendency to forget their password, you can turn on a feature that allows the user to have their password reset automatically. The user simply clicks on forget password and inputs their email address (the one in the AMS Connect System) and their user id.  An email is generated to the user with password reset instructions.

There are many other features that are customizable as related to security.  If you need to step up to the best and most flexible security contact us today.

The Balancing Act of Security

Today, an organization who is holding someone’s trusted data is going to get hacked. Even though we see regular news reports regarding company’s lackluster security policies and getting hacked, the majority of data breaches are never reported.

True foolproof security can only be accomplished one way, don’t write information down, don’t put it in a computer, and absolutely don’t tell anyone else (i.e. keep it in your head). Obviously this is impractical because the only way to get business done is to share information. The problem of course is how to share this information while maintaining the necessary safeguards.

There is two main factors to consider when implementing safeguards. First: Is the method for access too complicated for the authorized user. Second, Is the security methods strong enough to protect the data from unauthorized access.   There is a third factor to consider when dealing with data that isn’t necessarily security but useful for tracking. That factor is access logs.

When deciding on how you are going to interact with your clients or coworkers you will want to take those two considerations into play.   AMS Collaborator’s secure portal (AMS Connect) provides high level security in a manner that makes it easy for you and your clients to use.

The AMS Connect software allows an organization to customize how secure you want your data. In addition to the highest standards for data security we provide organizations options such as customized password controls (simple to complex), dual factor authentication, and cascading permissions (i.e. if a user doesn’t have permissions to a data set, they can’t see it). Additionally, we allow organizations to create customized groups (i.e. users identified as participants in various areas) and security profiles (i.e. roles or permission templates).

You and your clients deserve better than subpar security. AMS Collaborator’s team is here to help you identify the right way to balance your security requirements with users ease of access. Our AMS Connect software is a full featured collaboration extranet that can be set up fast and have you up and running with top notch security in a short amount of time.

Is Your Document Accessible yet Secure?

How do you share documents with your clients and colleagues? Are you certain that the individual you give access to your document is the only one? Most online document sharing solutions scan your documents for their own gain (marketing, etc.) or worse, you email the document which provides little to no security.

With this in mind, how do you ensure you maintain control over access and security? Organizations that use AMS Connect already know. AMS believes that your data is entirely yours and you should have full control over not only who has access to that data, but how you organize and maintain those secure documents.

AMS Collaborator continually improves and enhances one of the most secure document collaboration tools available. While maximum security is always our priority, some of our latest updates are also designed to increase usability and the efficient organization of your documents. These updates include improvements to:

Folder Loading – A feature allowing for efficient organization of documents utilizing folders and subfolders, the “folder tree” has been redesigned to handle much larger data sets. Rather than loading the entire list of folders when a user opens the Documents feature or navigates to a new folder or page of documents, the folder tree loads only what is needed to display, and continues to load additional content as the user expands each subfolder.

Color Coding – Another update promoting the organization of your content, folders and documents can now be color coded. The selected color will be displayed in the folder tree and the document list.

View As – This feature expands on the existing “View in Browser” option to allow the user to select how the document will display: In the original file format (which may trigger a download if the file is not supported for viewing in the browser); as Html; or as a PDF. Note that converting the file to Html or PDF is limited to files compatible with Microsoft Word or Excel.

General UI Improvements – AMS has made a number of additional improvements to enhance usability and update the customizable look of the extranet site. These improvements include: the consolidation of hyperlinks into buttons, the ability to resize the space and sizing of the folder tree when working with the documents feature, and the addition of quick links to folders that can be added to document lists.

Just a few of the recent updates AMS Connect has recently applied, the modifications ensure ease of use and maximum efficiency when navigating through the site and securely storing documents. Contact us today to see how we can improve your current document sharing needs.

How Secure is your Cloud?

Ask this question, “Where does my file go?” Can the provider provide an audit trail—not just to the individuals with whom you have chosen to share your file, but perhaps more importantly, individuals and organizations you have not chosen to share with. When a file is deleted, is it gone? What surprises may be found six months from now—or six years? Even if the file is not directly shared, what about the content? Providers routinely scrape file content so that full-text searching can be performed. But other purposes can be applied to that scraped content as well: tagging and matching files, recommendations to related services (advertising), and even notifications.

For most service providers, file sharing and collaboration is nothing more than a commodity service. Accessibility trumps security. It is easier to answer the question, “Can I access I my files?” than it is to ask the question, “Who else can access my files?” If the provider cannot or will not answer that second question, then seriously consider what information you are willing to post.

Articles are becoming increasingly common raising this question. Virtually all of the major providers have undergone some form of review and critique. With a commodity service, agreements are limited and often in the favor of the service provider. Some providers have admitted to back-end sharing of data. Some scan the content of all files posted to provide additional services such as directed advertisements and connecting interested parties.

Any service provider that offers “free” or “freemium” service is likely making up the cost through one of these methods. Careful review of the service agreement often demonstrates exactly what rights to security and privacy the end-user is giving up when posting content to these providers.