<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 07.12.18 by Greg Mooney

Defrag This - California's New Consumer Privacy Act

In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.

Posted on 07.11.18 by Joe Hewitson

The HIPAA Security Rule: How to Better Manage Compliance

Document sharing is a double-edged sword in modern healthcare. On one hand, the ability to quickly and efficiently share critical patient information between authorized medical professionals can make all the difference in patient care. On the other hand, health care...

Posted on 07.02.18 by Kevin Conklin

The Best Reasons for Moving from Basic FTP to Secure File Transfer

In your efforts to secure critical business and personal data, don't forget your file transfer and data sharing systems. One often overlooked area that can leave you vulnerable to cyber attack are outdated or under-managed FTP servers.

Posted on 06.18.18 by Kevin Conklin

Using Secure File Transfer to Protect Creative Assets

Network admins and IT engineers at companies that need to update their file transfer processes face a critical mission: making sure digital assets always remain safe and protected against lurking cybercriminals.

Posted on 06.11.18 by Greg Mooney

Defrag This - 3 Steps for Turning Cybersecurity Fears into an Action Plan

If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.

Posted on 06.07.18 by Rick Robinson

FTP Client Solutions and the Proprietary vs. Open Source Debate

Open source is cool. But when it comes to FTP client solutions, it may be hip to be square. Here's why proprietary software might be best for your company.

Posted on 06.05.18 by Kevin Conklin

File Transfer Protocol (FTP) vs. Managed File Transfer (MFT)

You've probably heard the axiom 'in an information economy, data is king' and know that data theft, has become a multi-billion-dollar global industry. You have likely arrived at the point where the daily transfer of files and documents between internal system and...

Posted on 06.04.18 by Rick Robinson

In the Healthcare Data Revolution, AI Looms Large

Healthcare data is reshaping medicine, and the transformation is only beginning. Until very recently, "data" as a concept hardly existed in the practice of medicine. Clinical researchers compiled data, to be sure, but the doctors who consulted their studies looked at...

Posted on 06.01.18 by Kevin Conklin

File Transfer Best Practices for Complying with the 7 GDPR Principles

CIOs, CISOs, data protection officers and compliance managers who work for businesses that interact with citizens in the European Union (EU) now need to be on-guard. The countdown for the General Data Protection Regulation (GDPR), which went into effect May 25, is over.

Posted on 05.23.18 by Greg Mooney

Defrag This - What's the Necessary  Experience For Entry Level Cyber Security?

So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.