<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

security

Posted on 07.24.18 by Joe Hewitson

Five Top Soft Spots in Healthcare IT Security

Healthcare IT continues to be a poster child for enterprise security at large. Infosecurity Magazine reported that healthcare data breaches rose 63% over the prior year. It's clear that health care is a common target for cybercriminals, but in what specific areas of...

Posted on 07.20.18 by Julianna Bernardi

FIPS Validated vs. FIPS Compliant

If you work in IT for a regulated industry, security is one of your top priorities. Especially when working for the government, healthcare or finance, it is extremely important that products and services adhere to government-approved security requirements to ensure that...

Posted on 07.18.18 by Greg Mooney

Why Are File Transfers Considered High Risk?

External file transfers of digital assets are risky for everyone—no matter if you’re a healthcare organization, financial institution, insurance company, retail store, manufacturer or in education.

Posted on 07.12.18 by Greg Mooney

Podcast: California's New Consumer Privacy Act

In this episode of Defrag This, we discuss the repercussions the new California Consumer Privacy Act will have on US data privacy laws and how and if it relates to the GDPR.

Posted on 07.11.18 by Joe Hewitson

The HIPAA Security Rule: How to Better Manage Compliance

Document sharing is a double-edged sword in modern healthcare. On one hand, the ability to quickly and efficiently share critical patient information between authorized medical professionals can make all the difference in patient care. On the other hand, health care...

Posted on 07.02.18 by Kevin Conklin

The Best Reasons for Moving from Basic FTP to Secure File Transfer

In your efforts to secure critical business and personal data, don't forget your file transfer and data sharing systems. One often overlooked area that can leave you vulnerable to cyber attack are outdated or under-managed FTP servers.

Posted on 06.18.18 by Kevin Conklin

Using Secure File Transfer to Protect Creative Assets

Network admins and IT engineers at companies that need to update their file transfer processes face a critical mission: making sure digital assets always remain safe and protected against lurking cybercriminals.

Posted on 06.11.18 by Greg Mooney

Podcast: 3 Steps for Turning Cybersecurity Fears into an Action Plan

If you’re afraid of having a cybersecurity professional take your money without delivering on their outlandish claims, there are some steps you can take to weed out the snake oil salesmen from the real cybersecurity experts.

Posted on 06.07.18 by Rick Robinson

Open Source FTP Clients vs. Proprietary: Pros and Cons

Open source is cool. But when it comes to FTP client solutions, it may be hip to be square. Here's why proprietary software might be best for your company.

Posted on 06.05.18 by Kevin Conklin

File Transfer Protocol (FTP) vs. Managed File Transfer (MFT)

You've probably heard the axiom 'in an information economy, data is king' and know that data theft, has become a multi-billion-dollar global industry. You have likely arrived at the point where the daily transfer of files and documents between internal system and...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.