<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 08.23.18 by Kevin Conklin

HIPAA Compliance & Managed File Transfer: Do You Have a Safety Net?

Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries. 

Posted on 08.21.18 by Adam Bertram

Cross-Site Scripting (XSS) and How MOVEit Transfer 2018 Protects You

Attackers wanting to steal your information online are some of the most creative people alive. It’s amazing how many ways they can come up with to steal your information. One of those ways is through a technique called cross-site scripting or XSS for short.

Posted on 08.20.18 by Rick Robinson

Prescription for Healthcare Data Encryption

It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...

Posted on 08.17.18 by Jeff Edwards

NSA Adviser Lists The Top Culprits for Nation State Hacking at DEF CON

The former chief of the NSA’s elite Tailored Access Operations Unit told DEF CON attendees who the top culprits for Nation State attacks are, and the results won’t surprise you at all. Except that he left the US off the list…

Posted on 08.15.18 by Greg Mooney

DEF CON 26 Highlights US Electronic Voting Machines Security Flaws

DEF CON 26 is over, but more questions than answers remain. After all we've seen, are electronic voting machines really the best and safest way to cast our votes?

Posted on 08.06.18 by Nate Lewis

The Real Cost of File Transfer Software

We’re living in the age of information. In both the world of the enterprise and in our own personal lives, we expect speed first and foremost. The exchange of data between customers, employees, and partners is become a critical component of business operations. Shadow IT...

Posted on 07.30.18 by Greg Mooney

Defrag This - How to Prepare for a HIPAA Audit

Nobody likes to be audited. It’s invasive and unpleasant, but being prepared for it can make the process much easier.

Posted on 07.24.18 by Joe Hewitson

Five Top Soft Spots in Healthcare IT Security

Healthcare IT continues to be a poster child for enterprise security at large. Infosecurity Magazine reported that healthcare data breaches rose 63% over the prior year. It's clear that health care is a common target for cybercriminals, but in what specific areas of...

Posted on 07.20.18 by Julianna Bernardi

FIPS Validated vs. FIPS Compliant

If you work in IT for a regulated industry, security is one of your top priorities. Especially when working for the government, healthcare or finance, it is extremely important that products and services adhere to government-approved security requirements to ensure that...

Posted on 07.18.18 by Greg Mooney

Why Are File Transfers Considered High Risk?

External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.