<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

security

Posted on 07.23.20 by Michael O'Dwyer

7 Alternatives to Email for Sending Large Files

Sending large files by email was never a practical solution as there are too many variables involved between the sender and recipient.

Posted on 07.20.20 by Karen Coleman

6 Steps for Creating a Manufacturing Cybersecurity Program

The rapid digitization of manufacturing, especially with the interconnectivity of IoT, has resulted in novel and unprecedented cybersecurity risks.

Posted on 07.16.20 by Greg Mooney

Podcast: 3 Ways Data Is Being Exposed During the Pandemic

Recently, I had a chance to talk with Arun Vishwanath about social engineering, legacy systems, and security vulnerabilities on home devices, such as routers, on the Defrag This podcast.

Posted on 07.13.20 by Greg Mooney

What Is Secure Copy Protocol (SCP)?

Does your business rely on the Secure Copy Protocol (SCP) to enable remote users to exchange files with each other and with customers and business partners? If so, it might be time to consider another approach!

Posted on 07.09.20 by Andrew Sanders

Pandemic Sees DDoS Attacks Jump 524%

With most office workers still working at home, the network has now become the major linkage between employees and their jobs.

Posted on 07.01.20 by Greg Mooney

5 Best File Sharing Platforms for Businesses

The importance of online collaboration took a quantum leap as the COVID-19 pandemic forced just about every office worker to stay at home.

Posted on 06.24.20 by Greg Mooney

What is MD5?

MD5 is still being used today as a hash function even though it has been exploited for years. In this article, we discuss what MD5 is; it's history, and how it is used today. 

Posted on 06.11.20 by Greg Mooney

What is an FTP Sprawl?

To this day, FTP (file transfer protocol) and the more secure SFTP (secure file transfer protocol) are still the most used standard to move files over the Web. It’s cost effective, quick and easy to deploy, and if used correctly in a regulated industry it keeps users...

Posted on 06.11.20 by Greg Mooney

Avoiding Data Loss During A Data Migration

Large scale data migrations are a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.

Posted on 06.11.20 by Rick Robinson

Prescription for Healthcare Data Encryption

It has taken a long time, but the medical community is finally embracing the information age. Thanks to the widespread adoption of toolsets such as Epic Systems, electronic health records (EHRs) are now making critical health information available when and where it is...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.