Be The Bridge, Not The Blocker With Link Sharing Protocols

A reflection from July 4th. When we are on vacation we make it our mission to get the most out of the time we spend away - with families, friends, even hobbies. Back at work, we are re-invigorated and attack the pile of work that inevitably awaits...

This is, as an excellent blog post noted last week, a time that brings "a certain amount of risk".

Perhaps you have an email from a colleague linking to an article and asking you to take a look.

"If we were entirely rational beings, we’d compute the exact expected outcome of taking each risk in turn. It’d be an exhausting life, and one in which we wouldn’t get much done."

Laptop typing Photo

So we don't compute risk every second. This email is from a colleague. They clicked it first, right?

Do you click the link, or not? The reality is that there are two approaches in IT to dealing with this situation. The first is to block the link and protect the user. The second is to provide some sort of method for ad hoc sharing that requires a series of approvals, provisioning of hardware and/or software and/or accounts, and then getting the person on the receiving end to do the same.

So, what if the user trades in information for your company? For example - if they are in sales. They may need a favor from the colleague in the future. A tip. An introduction. A bit of information.

What if they have to read this article to complete their mission? The answer is that if IT offers nothing but prevention, they will turn to some other method. They'll try to send it via GMail. Or Dropbox. Or This may be problematic.

The good news is that there is a far better way to support this user: deploy eShare!

Here's why:

e-Share diagram

1. eShare's cloud platform is fully integrated with O365. Your administration and security teams can use our self service platform to set policies that govern sharing. When the user needs to share with an unknown domain they can send an email and it and/or the attachments are automatically secured. Power users can choose from a range of fine-grained options that go way beyond read-only.

2. eShare operates on your sub-domain, with your SSL certificate, and via single-sign on. Your employees will never see our URL or logo.

e-Share - Smart URL

3. You can train your users to look at URL domains. That's a much simpler proposition than trying to explain phishing in all it's glory.

Even if they make a mistake, with eShare, the worst case scenario is a view-only share which they can immediately recall. Further, if they realize something was shared with the wrong person they can instantly terminate the link. (Even if they don't, the link expires automatically after a few days.)

Learn about how leading companies use eShare to drive cross-company collaboration and please, schedule a demo to see how it can help your company.

Bill Fletcher

Get the latest from eShare

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Better collaboration.
Higher productivity.
Better employee and client engagement.

Transform the way you collaborate. Contact eShare to get started.

Schedule a Demo