<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Defrag This | security

Posted on 04.06.17 by Kevin Conklin

5 Steps to Prevent Privacy Breaches

Assuring data privacy has been a hot issue for years and the basic building blocks of a strong defense against cybercriminal data theft hasn't changed.

Posted on 04.04.17 by Kevin Conklin

What is file transfer protocol (FTP)?

At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another. 

Posted on 03.30.17 by Greg Mooney

Defrag This - The Risky Business of FTP Servers

If you’re sending personally indentifiable information (PII) via basic FTP then your business is at risk. FTP servers do not provide the protections that are needed for today’s threat landscape.

Posted on 03.29.17 by Greg Mooney

3 Reasons Encryption Backdoors Are Counter Productive

It has been a year since the Apple vs. FBI case in which the FBI requested Apple create a backdoor into smartphones, and like clockwork, now the UK home secretary, Amy Rudd, is requesting backdoors into end-to-end encryption services used in Facebook’s texting app,...

Posted on 03.29.17 by Kevin Conklin

FBI Alert to Healthcare: Mind Your FTP Servers

The FBI issued a Private Industry Notification (PIN) alert last week to healthcare providers concerning the security of their FTP servers. While the alert did not indicate a specific threat, industry experts note that the FBI is not in the habit of issuing alerts unless...

Posted on 03.16.17 by Kevin Conklin

Secure File Transfer Resources For Financial Services IT Teams

The world doesn't show enough appreciation for IT teams in general. But few of us actually appreciate how much we depend on financial services IT pros.

Posted on 03.14.17 by Joe Hewitson

3 Hacks To Achieve Agile IT

Agile business models are pretty much a necessity in today's enterprise world and IT security is certainly no different.

Posted on 03.09.17 by Alex Jablokow

EHR Adoption Still an Issue in Healthcare

Electronic Health Record (EHR) adoption in healthcare has been rocky and uneven. Many physicians and practices still find EHRs inadequate or poorly designed.

Posted on 03.06.17 by Missy Januszko

Relationship Between CISOs and IT Teams

The CISO (Chief Information Security Officer) position is complex and demanding. With an ever-expanding threat landscape, the CISO navigates a complex web of responsibilities that run the gamut from staying ahead of cyberattacks, managing security teams, and analyzing...

Posted on 03.03.17 by Sophie Pellissier

5 Tips IT Managers Can Use to Protect Sensitive Data

Sophie Pellissier of Ipswitch looks at 5 facts IT managers should be aware of to protect sensitive data.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.