9 Practical Ways to Protect Your Personal Data
Sensitive information you store on the cloud is always at risk. Read some tips on securing personal data as you navigate cloud storage and cloud file transfer.
Sensitive information you store on the cloud is always at risk. Read some tips on securing personal data as you navigate cloud storage and cloud file transfer.
In this blog post, FTP and SFTP battle it out for the honors of the most secure and reliable transfer protocol in town. It’s the classic case of winner takes all. Read on to find out more.
Securing your data over the cloud has never been this essential. See why it’s important to fast-track any cloud file transfer security plans you had.
Many people think they understand the intricacies of securing sensitive data until they’re asked to elaborate beyond the mere definitions. This post delves into the what, why and how of this topic in great detail, effectively separating chaff from grain and bringing clarity where many blogs have failed.
Doug Barney | | File Transfer | Security
How much do lost files and records really cost?
Doug Barney | | File Transfer | Security
All the firewalls and anti-malware solutions globally can’t protect this data when it is emailed around at near-spam levels. And with governmental organizations coming in all shapes and sizes, so do the threats.
Doug Barney | | File Transfer | Security
The secure transfer of legal files is crucial to maintaining lawyer-client privilege and can be done effectively and securely with a Managed File Transfer (MFT).
Joseph Barringhaus | | File Transfer | Security
Even after investing in everything — crossing all the T's, and dotting the i's, — executives will always feel like there is still something missing. Many wish that there was an extra mile or two they could go to secure their systems. That's where Managed File Transfer comes in.
Doug Barney | | File Transfer | Security
GDPR is now three-years old, and even the largest companies are still regularly caught in its snares. And those that haven't yet run into trouble are maybe more vulnerable than they think. In this blog, learn more about data protection and GDPR compliance.
Doug Barney | | File Transfer | Security
Data threats are increasing every day and smart IT pros are racing to not just keep up but get ahead. One area many neglect is secure file transfer.
Doug Barney | | File Transfer | Security
Just because a tool calls itself Secure File Transfer doesn't make it so. Many so-called secure solutions are in fact only partially secure – and sometimes barely secure. So what are the top methods to transfer files securely?
Doug Barney | | File Transfer | Security
Secure File Transfer is as simple as it sounds, the secure transfer of files. But the real questions revolve around why you need to securely transfer files, what happens if you don’t, and how the heck can we do it properly?
Doug Barney | | Automation | File Transfer | Security
You probably have heard the saying "practice makes perfect" countless times, but in situations where there's nothing to perfect, repetition gets boring and tedious with time.
Doug Barney | | File Transfer | Security
Well over 200,000,000 people across 250,000-plus organizations use Microsoft SharePoint. That's a lot of data and a lot of files. SharePoint is arguably the most common document library software in use today.
Evan Kirstel | | Security
Learn how MFT software was used in the healthcare sector for transferring huge amounts of data on a daily basis while maintaining security & compliance.
Doug Barney | | Security
No matter which industry sector your business operates in, facilitating collaboration among your employees, customers and business partners is a key factor in driving business process efficiencies and increasing your revenue generation potential. Collaboration requires...
Alexandra Cassandro | | Security
In today's age of the Internet, our personal data are stored on various servers, and they are continuously moving around. We need to realize how are the data handled, why it is like that, and how the process for data protection can be improved. Is there anything we can...
Robert Yeckley | | IT Insights | Security
By default, UNIX-based systems are inherently more secure than the Windows operating system. In this article, we describe precisely why that is.
Mark Towler | | File Transfer | Security
Thanks to input from MOVEit users the latest release includes also: Expanded Single Sign-On (SSO), MS SQL 2019 Support, Gateway Multi-Org Support & more!
Greg Mooney | | Security
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.