{"id":1127,"date":"2013-02-06T07:17:12","date_gmt":"2013-02-06T07:17:12","guid":{"rendered":"http:\/\/www.sogolytics.com\/blog\/?p=1127"},"modified":"2025-02-24T07:10:25","modified_gmt":"2025-02-24T12:10:25","slug":"maintaining-security-in-workflow-management","status":"publish","type":"post","link":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/","title":{"rendered":"Maintaining Security in Workflow Management using Sogolytics"},"content":{"rendered":"<p>We <i>know<\/i> how easy it is to compromise network security. Every day, we read stories about dedicated hacker groups that have infiltrated the most sophisticated public and private systems. Many of us have received frantic phone calls and texts from concerned family members and friends wondering why they received an email telling them to wire money to us in BoraBora.<\/p>\n<p><a href=\"http:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-1135\" title=\"Workflow Management\" src=\"http:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management.jpg\" alt=\"Online Survey Tool\" width=\"311\" height=\"312\" srcset=\"https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management.jpg 346w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management-150x150.jpg 150w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management-300x300.jpg 300w, https:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management-299x300.jpg 299w\" sizes=\"(max-width: 311px) 100vw, 311px\" \/><\/a>And password sharing is one of the primary causes of data insecurity.<\/p>\n<p>While many businesses take certain steps to protect their data such as assigning each employee a unique username and password, shared projects often come with shared passwords. The intent may be to facilitate workflow, but this is a disaster waiting to happen.<\/p>\n<p>When it comes to designing, launching and analyzing a survey \u2014 especially complex, comprehensive surveys \u2014 assigning additional users to perform certain tasks <i>can<\/i> make it easier to complete a project. Unfortunately, password sharing can hamper or derail a project. Lack of accountability, the risk of unauthorized access and the potential for information theft are just a few of the risks of password sharing.<\/p>\n<p>Sogolytics has the solution. We let you add <a title=\"Multi-user-access\" href=\"https:\/\/www.sogolytics.com\/help\/users-permissions-workflows\/\" target=\"_blank\" rel=\"noopener\">multiple users<\/a> to a single account, with every user receiving their <i>own <\/i>username and password \u2014 eliminating the risks of password sharing.<\/p>\n<p>Good workflow management helps promote innovation through collaboration, and <a title=\"Sogolytics\" href=\"https:\/\/www.sogolytics.com\" target=\"_blank\" rel=\"noopener\">Sogolytics<\/a> ensures that all your collaborations are secure by keeping your data safe.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We know how easy it is to compromise network security. Every day, we read stories about dedicated hacker groups that have infiltrated the most sophisticated public and private systems. Many of us have received frantic phone calls and texts from concerned family members and friends wondering why they received an email telling them to wire money to us in BoraBora. And password sharing is one of the primary causes of data insecurity. While many businesses take certain steps to protect their data such as assigning each employee a unique username and password, shared projects often come with shared passwords. The intent may be to facilitate workflow, but this is a disaster waiting to happen. When it comes to designing, launching and analyzing a survey \u2014 especially complex, comprehensive surveys \u2014 assigning additional users to perform certain tasks can make it easier to complete a project. Unfortunately, password sharing can hamper or derail a project. Lack of accountability, the risk of unauthorized access and the potential for information theft are just a few of the risks of password sharing. Sogolytics has the solution. We let you add multiple users to a single account, with every user receiving their own username and password \u2014 eliminating the risks of password sharing. Good workflow management helps promote innovation through collaboration, and Sogolytics ensures that all your collaborations are secure by keeping your data safe.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[211,317,258,60,219,257],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.7.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Maintaining Security in Workflow Management | Sogolytics Blog<\/title>\n<meta name=\"description\" content=\"Sogolytics&#039;s workflow management promotes collaborated innovation. Data is safe in its multi-user accounts complete with individual passwords and access levels.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Maintaining Security in Workflow Management | Sogolytics Blog\" \/>\n<meta property=\"og:description\" content=\"Sogolytics&#039;s workflow management promotes collaborated innovation. Data is safe in its multi-user accounts complete with individual passwords and access levels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/\" \/>\n<meta property=\"og:site_name\" content=\"Sogolytics Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-06T07:17:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T12:10:25+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management.jpg\" \/>\n<meta name=\"author\" content=\"Sogolytics\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/\",\"name\":\"Maintaining Security in Workflow Management | Sogolytics Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\"},\"datePublished\":\"2013-02-06T07:17:12+00:00\",\"dateModified\":\"2025-02-24T12:10:25+00:00\",\"author\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1\"},\"description\":\"Sogolytics's workflow management promotes collaborated innovation. Data is safe in its multi-user accounts complete with individual passwords and access levels.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Maintaining Security in Workflow Management using Sogolytics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#website\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/\",\"name\":\"Sogolytics Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1\",\"name\":\"Sogolytics\",\"url\":\"https:\/\/www.sogolytics.com\/blog\/author\/sogosurvey\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Maintaining Security in Workflow Management | Sogolytics Blog","description":"Sogolytics's workflow management promotes collaborated innovation. Data is safe in its multi-user accounts complete with individual passwords and access levels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/","og_locale":"en_US","og_type":"article","og_title":"Maintaining Security in Workflow Management | Sogolytics Blog","og_description":"Sogolytics's workflow management promotes collaborated innovation. Data is safe in its multi-user accounts complete with individual passwords and access levels.","og_url":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/","og_site_name":"Sogolytics Blog","article_published_time":"2013-02-06T07:17:12+00:00","article_modified_time":"2025-02-24T12:10:25+00:00","og_image":[{"url":"http:\/\/www.sogolytics.com\/blog\/wp-content\/uploads\/2013\/02\/Maintaining-Security-in-Workflow-Management.jpg"}],"author":"Sogolytics","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/","url":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/","name":"Maintaining Security in Workflow Management | Sogolytics Blog","isPartOf":{"@id":"https:\/\/www.sogolytics.com\/blog\/#website"},"datePublished":"2013-02-06T07:17:12+00:00","dateModified":"2025-02-24T12:10:25+00:00","author":{"@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1"},"description":"Sogolytics's workflow management promotes collaborated innovation. Data is safe in its multi-user accounts complete with individual passwords and access levels.","breadcrumb":{"@id":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.sogolytics.com\/blog\/maintaining-security-in-workflow-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Maintaining Security in Workflow Management using Sogolytics"}]},{"@type":"WebSite","@id":"https:\/\/www.sogolytics.com\/blog\/#website","url":"https:\/\/www.sogolytics.com\/blog\/","name":"Sogolytics Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sogolytics.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sogolytics.com\/blog\/#\/schema\/person\/137ad89cc093b0bb889c68e4b1825fb1","name":"Sogolytics","url":"https:\/\/www.sogolytics.com\/blog\/author\/sogosurvey\/"}]}},"_links":{"self":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/1127"}],"collection":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/comments?post=1127"}],"version-history":[{"count":25,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/1127\/revisions"}],"predecessor-version":[{"id":63580,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/posts\/1127\/revisions\/63580"}],"wp:attachment":[{"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/media?parent=1127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/categories?post=1127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sogolytics.com\/blog\/wp-json\/wp\/v2\/tags?post=1127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}