<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

encryption

Posted on 10.31.18 by Mark Towler

Enforcing Security Policy Agreement at Sign On with MOVEit

It’s a given that users with access to your MFT solution have permission to use it and know exactly what they are allowed to do with it. But maybe it shouldn’t be.

Posted on 10.15.18 by Kevin Conklin

Which Secure File Transfer Solution Is Right for You?

You likely already realize that file transfers using the file transfer protocol (FTP) expose your sensitive data to high risks.

Posted on 09.28.18 by Nate Lewis

What you Need to Know About FIPS 140-2 Validation

One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...

Posted on 09.26.18 by Michael O'Dwyer

Internet of Things 101 – IoT Device Authentication Explained

Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...

Posted on 09.21.18 by Nate Lewis

Measuring The Benefits of Managed File Transfer for Insurance Companies

Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.

Posted on 09.14.18 by Kevin Conklin

WS_FTP Pro from Ipswitch: Protect Your Sensitive Data

Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.

Posted on 09.11.18 by Alex Jablokow

An Introduction to FIPS-140-2 Requirements

FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.

Posted on 08.20.18 by Rick Robinson

Prescription for Healthcare Data Encryption

It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.