Email Unsafe for Transferring Sensitive Files: How COVID Made it Worse
Doug Barney | | Security
Remote work has increased email security vulnerabilities, exposing files in transit.
Doug Barney | | Security
Remote work has increased email security vulnerabilities, exposing files in transit.
Doug Barney | | Security
Enterprises dealing with loads of money must invest in file security.
Canada is the latest GDPR-like entrant and drafted the Canadian Consumer Protection Act.
Doug Barney | | File Transfer | Security
GDPR is now three-years old, and even the largest companies are still regularly caught in its snares. And those that haven't yet run into trouble are maybe more vulnerable than they think. In this blog, learn more about data protection and GDPR compliance.
Doug Barney | | Automation | File Transfer | Security
You probably have heard the saying "practice makes perfect" countless times, but in situations where there's nothing to perfect, repetition gets boring and tedious with time.
Doug Barney | | File Transfer | Security
Well over 200,000,000 people across 250,000-plus organizations use Microsoft SharePoint. That's a lot of data and a lot of files. SharePoint is arguably the most common document library software in use today.
Evan Kirstel | | Security
Learn how MFT software was used in the healthcare sector for transferring huge amounts of data on a daily basis while maintaining security & compliance.
Andrew Evans | | Cloud | Security
With the rising risk of a data breach, regulatory compliance is not optional. Avoid falling out of compliance with FERPA and HIPAA through proper encryption, user management, network protection, and the use of managed file transfer.
Greg Mooney | | Security
The right to privacy for individuals impacts just about every industry, and education is no different.
Cyberattacks versus colleges and universities are undeniably lucrative for attackers.
As a company owner, you may well think that you can install closed-circuit television (CCTV) cameras as you see fit on company premises, but the reality is a little different.
Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find.
Greg Mooney | | Security
The Gramm-Leach-Bliley Act (GLBA) has been around since 1999, but it doesn't just affect financial services, it also requires higher education to comply.
Greg Mooney | | File Transfer | Security
The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.
Greg Mooney | | Security
In this article, we discuss what the HIPAA Omnibus Rule is and how it relates to HIPAA and HITECH.
Michael O'Dwyer | | IT Insights
Disclaimer: This post should not be used to determine your CCPA obligations and does not offer legal advice. It is designed to inform, raise some questions and lead you to investigate further by consulting with attorneys with relevant experience in data privacy laws and...
The Health Insurance Portability and Accountability Act (HIPAA) was introduced in 1996, and compliance was (and indeed is) necessary for all U.S. healthcare organizations.
Jeff Edwards | | IT Insights | Security
Time and time again, retailers prove to be a popular (and easy) target for hackers. The tangible and intangible costs for an e-commerce site that’s been breached can escalate quickly. In this post, we'll explore the issue, and outline some solutions.
Jeff Edwards | | IT Insights | Security
If your business deals with credit card payments in any way, then PCI compliance is going to be a fact of life, and an essential part of running your business securely and efficiently. PCI compliance is a critically important step in protecting your customer's or...
Greg Mooney | | Security
If your organization is finding it difficult to comply with PCI DSS, the Payment Card Industry Data Security Standard, it could be due to some of the misconceptions about the standard.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.