<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 09.24.18 by Michael O'Dwyer

What UK Businesses Must Know About GDPR and Brexit

Regardless of industry, companies are subject to data protection laws according to their jurisdiction. 

Posted on 09.21.18 by Nate Lewis

Measuring The Benefits of Managed File Transfer for Insurance Companies

Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.

Posted on 09.19.18 by Greg Mooney

Did British Airways Violate the GDPR?

Companies around the world have anxiously awaited who will be made an example of under the new GDPR regulations. Under GDPR, entities who violate the regulations are on the hook for stringent fines and civil lawsuits.

Posted on 09.14.18 by Kevin Conklin

WS_FTP Pro from Ipswitch: Protect Your Sensitive Data

Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.

Posted on 09.12.18 by Dan Franciscus

The Future of Remoting in Windows - OpenSSH

With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!

Posted on 09.11.18 by Alex Jablokow

An Introduction to FIPS-140-2 Requirements

FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.

Posted on 09.06.18 by Ashish Tawade

3 Phases of Network Security

Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.

Posted on 09.05.18 by Adam Bertram

5 Cool New Features in MOVEit 2018 SP1

These five new features in MOVEit 2018 Service Pack 1 will increase the speed and security of your business' automated file transfer workflows. There are also new improvements to MOVEit's REST API!

Posted on 08.31.18 by Jeff Edwards

Breaking Down the GDPR's Data Protection Principles, Part 4: Integrity, Confidentiality, and Accountability

It’s been months since the EU’s landmark data protection regulation, the General Data Protection Regulation (GDPR) went into full effect. This means that companies around the world now have to be more careful about the way they handle personal data collected about...

Posted on 08.27.18 by Michael O'Dwyer

How to Choose the Right Managed File Transfer Architecture

For the purposes of this post, we are concerned with two relevant options, namely File Transfer Protocol (FTP) and Managed File Transfer (MFT). The second, being managed, obviously offers more features than a standard file transfer solution. But, which offering is best...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.