How to Copy Files to Azure Blob Storage
Adam Bertram | | Automation | Cloud | IT Insights | Security
When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.
Adam Bertram | | Automation | Cloud | IT Insights | Security
When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.
Greg Mooney | | Automation | Security
Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.
Jeff Edwards | | Security
In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.
Dan Franciscus | | IT Insights | Security
Two-factor authentication is currently one of the best security practices for protecting users, data and systems. Duo is one of the leading platforms for using two-factor authentication in the enterprise as it protects many common on-premises and cloud applications by...
Greg Mooney | | Cloud | Security
Too many IT professionals believe that companies that provide cloud platforms and services, such as AWS or Google Cloud, handle all the cloud-related security. Considering how much business transpires in the cloud, this is a dangerous assumption to make.
Jeff Edwards | | Security
Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.
Greg Mooney | | Security
It’s the proverbial 1,000-pound gorilla—a compliance violation. Perhaps you haven’t seen one yet, but you know it’s out there lurking, and it just might come banging on your door any day now.
Jeff Edwards | | Security
If 2017 was the year of the ransomware attack, then 2018, insofar as it can be defined by malware, was the year of cryptojacking.
Jeff Edwards | | File Transfer | Security
Collaboration is of utmost importance in the modern workplace, but when done incorrectly, a collaborative environment can also be an insecure one. Here's how you can allow increased workplace collaboration, without reducing security.
Nate Lewis | | File Transfer | Security
"The call is coming from inside the house...” This line from 1979’s When a Stranger Calls terrorized audiences by introducing the notion that the things we should be most fearful of may be in the spaces we feel most safe. This idea translates neatly to the enterprise...
In the BFSI (banking, financial services and insurance) industry, choosing a managed file transfer solution is rather simplified as FTP alone is not enough to meet the necessary regulatory and compliance requirements.
Username and password have long been the main method of authentication—and they remain so. But other authentication factors are often added to passwords to improve security. How well do these multi-factor authentication approaches work, and should businesses approach...
You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.
Prateek Singh | | Cloud | IT Insights | Security
Amazon Web Services (AWS) offers a service known as Identity and Access Management (IAM) that lets AWS Administrators provision and manage users and permissions in AWS cloud. AWS IAM can prove very useful for System Administrators looking to centrally manage users,...
Nate Lewis | | Security
One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...
Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...
Nate Lewis | | File Transfer | Security
Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.
Kevin Conklin | | File Transfer | Security
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.
With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.