
Jeff Edwards | | Security
I’ve said it before and I’ll say it again: We are living in the age of the data breach. Now more than ever, our lives are defined by the massive data sets built from our online presence, and now more than ever, they are routinely disrupted when those data sets fall into...
By integrating this REST API in, not only does it show how you can leverage AirTable and Azure, but how you can integrate just about any REST API out there into Azure DevOps.
Once upon a time back in 2006, PowerShell was introduced to the world. The scripting language thought up by Jeffrey Snover and distributed by Microsoft with Windows would soon turn into a ubiquitous part of IT automation and scripting, replacing the aging VBScript as the...
Jeff Edwards | | IT Insights | Security
Understanding and complying with data protection and privacy regulations is hard enough. With all of the jargon and acronyms thrown around, it can sometimes feel like lawyers and regulators don't want you to understand. Fear not, we've put together a comprehensive data...
Mark Towler | | Cloud | File Transfer | IT Insights
If you’re planning on taking advantage of a Software-as-a-Service MFT solution you need to consider several key features to ensure you’re getting something that will meet all your requirements.
Artificial intelligence (AI) is being applied across an ever-increasing range of services. One of those applications is in the text to speech realm.
Mark Towler | | Cloud | File Transfer | IT Insights
MFT solutions are now also available as cloud-based Software-as-a-Service (SaaS) offerings which can provide a number of benefits over traditional on-premise MFT offerings. Generally this means you’re getting all the capabilities of a full-featured MFT solution without...
The EU’s PSD2 directive (a revised payment service directive) aims to regulate electronic payments in EU member countries. It has no impact on traditional paper-based transactions.
Greg Mooney | | Security
If you are doing business in Australia, then you will need to study up on the Federal Privacy Act 1988 and its underlying principles.
Jeff Edwards | | IT Insights | Security
In this post, we’ll break down Brazil’s General Data Protection Law—who needs to comply, what is protected, and how to meet its requirements.
Greg Mooney | | Security
Many years since the initial publication of ISO 20022, more and more financial firms are beginning to leverage the standard.
One of the nice things about having a simple Windows file share on a local file server is that the support to transfer files to/from it is built into Windows. Since the share is created for SMB, you can map Windows drives to it, navigate to it’s UNC path and so on. When...
Adam Bertram | | Automation | IT Insights
Azure File Sync is a fairly new service that allows users to sync on-premises files to Azure Storage. Think of this service as DropBox for business. Now, we can simply drop files into a folder on an on-prem server and automatically upload those files to Azure!
Adam Bertram | | Security
The Windows event logs are a great place to start when troubleshooting problems or investigating potential security breaches.
Mobile devices are one of the weakest links in cyber security for businesses, yet very little is being done to mitigate the risks around these top 5 types of mobile device breaches.
Level 8 Solutions called into the Defrag This - Have You Met? podcast studio to provide some insight into how they are implementing IT solutions in the UK.
Jeff Edwards | | IT Insights | Security
In this article, we'll answer some of the most common questions about the CSL, and make compliance goals as clear as possible.
Adam Bertram | | Automation | IT Insights
A typical company has thousands of workflows happening all of the time, whether it's onboarding new employees, approving expense reports or opening up a helpdesk ticket.
Businesses have steadily improved their perimeter security to better protect against an ever increasing number of cyber attacks. This has left hackers to look for other, less challenging paths to an enterprise’s data in 3rd party APIs.
Greg Mooney | | IT Insights | Security
MiFID II signifies the continuing onslaught of financial market regulations that demand transaction transparency. Such regulations burden compliance and IT teams who have to ensure their companies meet increasingly stringent security standards.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.