Podcast: Why Cyber Hygiene Is So Important
Greg Mooney | | Security
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Greg Mooney | | Security
In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary.
Michael O'Dwyer | | IT Insights | Security
Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network.
Andrew Evans | | Cloud | Security
With the rising risk of a data breach, regulatory compliance is not optional. Avoid falling out of compliance with FERPA and HIPAA through proper encryption, user management, network protection, and the use of managed file transfer.
Greg Mooney | | Automation | File Transfer | Security
Electronic file transfer, abbreviated EFT is a procedure that follows an electronic format and protocol to exchange different types of data files.
Adam Bertram | | File Transfer | Security
Transferring files quickly and securely in a modern business environment is a challenge with various devices, methods, and environments an individual may find themselves in.
It is no secret that with rising digitalization, the risks of hacking, spying, and stealing data online went up—a focus point of the development of cybersecurity in the automotive industry.
Gwen Luscombe | | Cloud | Security
There’s a lot of misconceptions around the cloud and liability. Organizations often assume risk is transferred when data moves to a third party.
Greg Mooney | | Security
The right to privacy for individuals impacts just about every industry, and education is no different.
Cyberattacks versus colleges and universities are undeniably lucrative for attackers.
Greg Mooney | | File Transfer | Security
Talk about an awkward situation—you and a customer collaborate online, sharing a view of a contract and trying to agree on the payment schedule.
Arun Vishwanath | | Cloud | File Transfer | Security
Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting and adjusting their exceptions.
Greg Mooney | | File Transfer | Security
Keeping files and data secure when more users are working remotely is, of course, a concern. That's why a SaaS managed file transfer solution is critical.
Arun Vishwanath | | Cloud | Security
The adoption of public cloud computing makes user data less secure. And it's not for the reasons most in IT realize.
Michael O'Dwyer | | File Transfer | Security
Like it or not, today’s world is a connected one, and data is shared at an alarming rate between mobile device users, company networks, and cloud services (including social networks).
Adam Bertram | | File Transfer | Security
Secure Shell (SSH) has been used for many years to remotely access systems, and a common need has been to transfer files to those systems, along with a standard terminal connection.
Michael O'Dwyer | | File Transfer | Security
Nope, I haven’t lost my mind. “One is secure, the other isn’t,” you claim. But there’s more to it than that.
Alexandra Cassandro | | Security
In today’s evolving workplace environment, companies like yours are more vulnerable than ever.
Adam Bertram | | Security
Sometimes private or sensitive data is sent over email without much thought towards who may be able to access that data other than the intended recipient.
Greg Mooney | | Security
What does the new merger of GoAnywhere and Globalscape mean for the managed file transfer market?
Michael O'Dwyer | | File Transfer | Security
Sending large files by email was never a practical solution as there are too many variables involved between the sender and recipient.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.