<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

security

Posted on 06.24.20 by Greg Mooney

What is MD5?

MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today. 

Posted on 06.11.20 by Greg Mooney

What is an FTP Sprawl?

To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...

Posted on 06.11.20 by Greg Mooney

Avoiding Data Loss During A Data Migration

Large scale data migrations are a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.

Posted on 06.11.20 by Rick Robinson

Prescription for Healthcare Data Encryption

It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...

Posted on 06.03.20 by Adam Bertram

How to Use OpenSSL to Generate Certificates

OpenSSL has been one of the most widely used certificate management and generation pieces of software for much of modern computing.

Posted on 05.28.20 by Mark Towler

MOVEit 2020 Released: Managed File Transfer For Mobile Users

Progress has just released MOVEit 2020, the latest version of their award-winning secure and managed file transfer solution.

Posted on 05.21.20 by Greg Mooney

Podcast: VPNs, Cybersecurity, and Data Privacy During COVID-19

Ted Kim, CEO of Private Internet Access, joins the podcast to chat about VPNs, privacy online, and how the cybersecurity threat landscape has changed during the COVID-19 pandemic.

Posted on 05.19.20 by Michael O'Dwyer

CCTV is a Data Compliance Issue

As a company owner, you may well think that you can install closed-circuit television (CCTV) cameras as you see fit on company premises, but the reality is a little different.

Posted on 05.18.20 by Greg Mooney

6 Data Security Tips for State and Local Government Agencies

The sense of urgency around cybersecurity is reaching a whole new level for state and local governments.

Posted on 05.15.20 by Adam Bertram

How to Set Up Windows Defender Custom and Scheduled Scans

Windows Defender comes with Windows 10 is a great way to keep your computer protected from malware.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.