<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 07.02.18 by Kevin Conklin

The Best Reasons for Moving from Basic FTP to Secure File Transfer

In your efforts to secure critical business and personal data, don't forget your file transfer and data sharing systems. One often overlooked area that can leave you vulnerable to cyber attack are outdated or under-managed FTP servers.

Posted on 06.18.18 by Kevin Conklin

Using Secure File Transfer to Protect Creative Assets

Network admins and IT engineers at companies that need to update their file transfer processes face a critical mission: making sure digital assets always remain safe and protected against lurking cybercriminals.

Posted on 06.11.18 by Greg Mooney

Defrag This - 3 Steps for Turning Cybersecurity Fears into an Action Plan

If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.

Posted on 06.07.18 by Rick Robinson

FTP Client Solutions and the Proprietary vs. Open Source Debate

Open source is cool. But when it comes to FTP client solutions, it may be hip to be square. Here's why proprietary software might be best for your company.

Posted on 06.05.18 by Kevin Conklin

File Transfer Protocol (FTP) vs. Managed File Transfer (MFT)

You've probably heard the axiom 'in an information economy, data is king' and know that data theft, has become a multi-billion-dollar global industry. You have likely arrived at the point where the daily transfer of files and documents between internal system and...

Posted on 06.04.18 by Rick Robinson

In the Healthcare Data Revolution, AI Looms Large

Healthcare data is reshaping medicine, and the transformation is only beginning. Until very recently, "data" as a concept hardly existed in the practice of medicine. Clinical researchers compiled data, to be sure, but the doctors who consulted their studies looked at...

Posted on 06.01.18 by Kevin Conklin

File Transfer Best Practices for Complying with the 7 GDPR Principles

CIOs, CISOs, data protection officers and compliance managers who work for businesses that interact with citizens in the European Union (EU) now need to be on-guard. The countdown for the General Data Protection Regulation (GDPR), which went into effect May 25, is over.

Posted on 05.23.18 by Greg Mooney

Defrag This - What's the Necessary  Experience For Entry Level Cyber Security?

So you decided that they want to pursue a career in information security. Of course, the first thought may be to go to school or study to pass certification exams such as Security+, CISSP, or CEH. However, there is an increasing argument that you can’t just walk right...

Posted on 05.22.18 by Jeff Edwards

The Meltdown Never Ended: Microsoft and Google Find New Meltdown/Spectre Vuln

Well, the time has come, the latest installment in of our favorite saga is finally upon us, and we can't wait to see where the story is going next. No, I'm not talking about the Solo: A Star Wars Story, I'm talking about the saga that is the Meltdown/Spectre chip flaws,...

Posted on 05.21.18 by Kevin Conklin

Managed File Transfer - What is it?

No matter which industry sector your business operates in, facilitating collaboration among your employees, customers and business partners is a key factor in driving business process efficiencies and increasing your revenue generation potential. Collaboration requires...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.