Secure File Transfer—Protecting Personal Information and PII
Doug Barney | | Security
Personal Identifying Information (PII) must be secure and in compliance.
Doug Barney | | Security
Personal Identifying Information (PII) must be secure and in compliance.
All you ever wanted to know about file transfer encryption—encryption algorithms, layers and the encrypted file transfer protocols that bring the two together.
Learn about the inner workings of AES 256 encryption, symmetric cryptography, and the most effective encryption algorithm.
Greg Mooney | | Security
MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today.
It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...
Adam Bertram | | Security
OpenSSL has been one of the most widely used certificate management and generation pieces of software for much of modern computing.
Online shoppers are often encouraged to ensure that their chosen online stores are 'secure', that the 's' in HTTPS is visible, and that the web browser displays a lock symbol. Propagating these visible indicators as confirmation of website security is not only...
Adam Bertram | | Security
In this article, you’re going to learn how to get free SSL certificates from the Let’s Encrypt CA. We’ll also touch on how to make sure that the website is being served strictly using HTTPS and confirm that the right SSL certificate is in use.
Jeff Edwards | | Security
There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.
Mark Towler | | Security
Security policies are prone to change, and you need to keep your users up-to-date on those changes so that they won't violate the terms of the policy, but doing so is often easier said than done.
Greg Mooney | | Security
Ah, cryptography. It’s so important to us in our every day lives and yet it has one of the longest and confusing pasts of any type of technology we use today.
Jeff Edwards | | Security
Username and password may be the de-facto means of authentication for many organizations, but they can easily be the weakest link in security controls. In this article, we’ll detail why Multi-Factor Authentication (MFA) should be paired with encryption for top-level...
Since encryption is used to secure data, it would seem only natural that encrypting something twice would increase security. However, that isn't always the case.
Jeff Edwards | | IT Insights | Security
There are basically two ways to keep data out of the hands of hackers. One is to protect every endpoint leading to it, making it essentially inaccessible. The other is to encrypt the data, so that even if hackers get to the document they cannot read it. But where should...
You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.
Nate Lewis | | Security
One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...
Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...
Nate Lewis | | File Transfer | Security
Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.
Kevin Conklin | | File Transfer | Security
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.