256-bit SSL encryption

The secure sockets layer (SSL) protocol is now enabled on our application. SSL creates a secure link between our web server and your browser. Wiredrive uses 256-bit encryption technology, which is the strongest SSL available, to ensure that sensitive files, project information, user logins and other data added to Wiredrive is private and cannot be intercepted.

Additional information

SSL encryption is enabled for Wiredrive system sessions; Wiredrive presentations are not SSL-encrypted, but they are protected with a security token and sent through our content delivery network (CDN). This configuration allows Wiredrive to quickly serve presentation files. All parts of Wiredrive system webpages are SSL-encrypted, including the JavaScript, CSS libraries and content delivered through the CDN (though the presentation link, itself, is not encrypted). The traffic between the Wiredrive origin servers and the CDN edge servers are also encrypted, which helps protect against man-in-the-middle (MITM) attacks. Session cookies are only available for encrypted webpages and are inaccessible from JavaScript, which helps to prevent session tampering and hijacking.

Security best practices

An application is only as safe as the person using it. We’ve enabled SSL to supplement our system security and give you peace of mind, but you should follow best practices to secure your digital environment:

  • Keep your login information confidential
  • Create strong passwords; 12345, asdf and password are dangerously weak and easy to guess
  • Change passwords at least once a year
  • Do not leave your workstation unattended while logged into Wiredrive; a session will eventually time-out, but you should always log out and log back into Wiredrive if you will be away from your desk
  • Give new users access levels that are appropriate for the kind of work they are doing; see About users and access levels for more information
  • Audit your Wiredrive users to make sure that past employees, old freelancers and other unauthorized users no longer have access to your system
By Lindsey Jones

Tags: , ,