<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

security

Posted on 11.16.20 by Robert Yeckley

UNIX Has Always Been More Secure Than Windows

By default, UNIX-based systems are inherently more secure than the Windows operating system. In this article, we describe precisely why that is.

Posted on 10.27.20 by Mark Towler

Fast and Flexible SharePoint Workflows with MOVEit 2020.1

Thanks to input from MOVEit users the latest release includes also: Expanded Single Sign-On (SSO), MS SQL 2019 Support, Gateway Multi-Org Support & more!

Posted on 10.19.20 by Greg Mooney

Podcast: Why Cyber Hygiene Is So Important

In this podcast, Dr. Arun Vishwanath joined the podcast to discuss the theory of cyber hygiene, what it is, and why it needs to become part of everyone's vocabulary. 

Posted on 10.15.20 by Michael O'Dwyer

A VPN is NOT A Security Tool! It's in the Name

Some may argue that VPNs enhance security (encrypted connections etc.) but their core aim is privacy – it’s in the name – virtual private network.

Posted on 10.14.20 by Andrew Evans

FERPA, HIPAA, and Compliance in File Transfer and Storage

With the rising risk of a data breach, regulatory compliance is not optional. Avoid falling out of compliance with FERPA and HIPAA through proper encryption, user management, network protection, and the use of managed file transfer.

Posted on 10.08.20 by Greg Mooney

What is Electronic File Transfer (EFT)?

Electronic file transfer, abbreviated EFT is a procedure that follows an electronic format and protocol to exchange different types of data files.

Posted on 10.06.20 by Adam Bertram

Mobile File Transfers On The Go

Transferring files quickly and securely in a modern business environment is a challenge with various devices, methods, and environments an individual may find themselves in.

Posted on 09.14.20 by Kelly Fitzgerald

Podcast: Cybersecurity in the Automotive Industry

It is no secret that with rising digitalization, the risks of hacking, spying, and stealing data online went up—a focus point of the development of cybersecurity in the automotive industry.

Posted on 09.10.20 by Gwen Luscombe

Cyber Security Insurance and Minimizing Risk in the Cloud

There’s a lot of misconceptions around the cloud and liability. Organizations often assume risk is transferred when data moves to a third party.

Posted on 09.09.20 by Greg Mooney

What Is FERPA and What Are the Necessary Security Controls?

The right to privacy for individuals impacts just about every industry, and education is no different.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.