<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | security

Posted on 05.18.17 by Kevin Conklin

What is Extreme File Transfer (XFT)?

There is a growing trend in the data transfer arena. What is extreme file transfer and why is there an increasing need for it?

Posted on 05.17.17 by Virginia Lux

What Is A Data Protection Officer (DPO)?

What is a Data Protection Officer (DPO) and why are they important for complying with the GDPR? 

Posted on 05.12.17 by Greg Mooney

Massive Malware Attack Will Infect More Than Healthcare

Ransomware is infecting businesses across the globe, from healthcare to telecommunications. And the malware is spreading via a known exploit that was leaked and patched months ago. 

Posted on 05.08.17 by Michael O'Dwyer

The GDPR and US Data Protection Regulations Diverge

There are some serious difficulties ahead for businesses in the wake of the repeal of the US Internet Privacy Bill. How can US businesses comply with the GDPR?

Posted on 05.05.17 by Virginia Lux

Homebuyers Lose Potential Home For Trusting Email

Email is not safe, yet so many businesses from healthcare to financial institutions use email as a method of moving sensitive data. Here is another example of what can go wrong. 

Posted on 05.04.17 by Michael O'Dwyer

Business Associate Agreement Under HIPAA Could Apply to You

The U.S. Department of Health and Human Services, Office for Civil Rights (OCR) recently sued a small healthcare practice. Turns out they didn't have a BAA in place.

Posted on 05.03.17 by Virginia Lux

How Can Property and Casualty Insurers Secure Data?

How can property and casualty insurers (P&C) get from First Notice of Loss (FNOL) to claim resolution quickly and efficiently while keeping data secure?

Posted on 04.27.17 by Michael O'Dwyer

Reducing Security Breaches in Fintech is a Business Priority

Fintech is a valuable target for hackers seeking financial reward and we can’t stop all breaches without changing our attitude towards security.

Posted on 04.25.17 by Greg Mooney

Defrag This - What is a Public Key Infrastructure?

In episode 8 of Defrag This, IT expert Missy Januszko, discusses the recent PowerShell and DevOps Global Summit 2017 and what exactly a public key infrastructure is.

Posted on 04.20.17 by Michael O'Dwyer

Data Privacy Dead After FCC Reversal Legalizes ISP Data Mining

The repeal of the FCC rule on ISP data mining has serious implications, not only for individual data privacy, but for businesses as well. 

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.