What Is FERPA and What Are the Necessary Security Controls?
Greg Mooney | | Security
The right to privacy for individuals impacts just about every industry, and education is no different.
Greg Mooney | | Security
The right to privacy for individuals impacts just about every industry, and education is no different.
Cyberattacks versus colleges and universities are undeniably lucrative for attackers.
Greg Mooney | | File Transfer | Security
Talk about an awkward situation—you and a customer collaborate online, sharing a view of a contract and trying to agree on the payment schedule.
Arun Vishwanath | | Cloud | File Transfer | Security
Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting and adjusting their exceptions.
Greg Mooney | | File Transfer | Security
Keeping files and data secure when more users are working remotely is, of course, a concern. That's why a SaaS managed file transfer solution is critical.
Arun Vishwanath | | Cloud | Security
The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT realize.
Michael O'Dwyer | | File Transfer | Security
Like it or not, today’s world is a connected one, and data is shared at an alarming rate between mobile device users, company networks, and cloud services (including social networks).
Adam Bertram | | File Transfer | Security
Secure Shell (SSH) has been used for many years to remotely access systems, and a common need has been to transfer files to those systems, along with a standard terminal connection.
Michael O'Dwyer | | File Transfer | Security
Nope, I haven’t lost my mind. “One is secure, the other isn’t,” you claim. But there’s more to it than that.
Alexandra Cassandro | | Security
In today’s evolving workplace environment, companies like yours are more vulnerable than ever.
Adam Bertram | | Security
Sometimes private or sensitive data is sent over email without much thought towards who may be able to access that data other than the intended recipient.
Greg Mooney | | Security
What does the new merger of GoAnywhere and Globalscape mean for the managed file transfer market?
Michael O'Dwyer | | File Transfer | Security
Sending large files by email was never a practical solution as there are too many variables involved between the sender and recipient.
The rapid digitization of manufacturing, especially with the interconnectivity of IoT, has resulted in novel and unprecedented cybersecurity risks.
Greg Mooney | | Security
Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast.
Greg Mooney | | Security
Does your business rely on the Secure Copy Protocol (SCP) to enable remote users to exchange files with each other and with customers and business partners? If so, it might be time to consider another approach!
With most office workers still working at home, the network has now become the major linkage between employees and their jobs.
Greg Mooney | | File Transfer | Security
The importance of online collaboration took a quantum leap as the COVID-19 pandemic forced just about every office worker to stay at home.
Greg Mooney | | Security
MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today.
Greg Mooney | | Security
To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.