Blog

Blog

13 Essential MFT Blog Posts You Might Have Missed

  Image There’s a lot out there (and just on this website) about what MFT (managed file transfer) software is, why it’s a good FTP alternative, and how to choose the best file transfer software for your business. That’s why we’ve selected 13 of our top blogs that answer those exactly those questions – and more. And because questions...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Image Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read...
Blog

Ransomware Attacks on Small Businesses: How to Mitigate

  Image More than fireworks exploded as Americans were prepping for Independence Day celebrations as hundreds of companies awoke on July 3rd to yet another massive ransomware attack. This attack attempted to cripple the networks of up to 200 companies and up to 1,500 downstream businesses. All signs point to it being the handiwork...
Blog

10 Tips to Protect Your Company’s Data in 2021

Image The amount, complexity, and relevance of the data that companies handle has increased exponentially. Today the data stored by organizations can contain information from buying and selling transactions, market analysis, ideas for future technological innovations, customer or employee information (salaries, health information) and...
Blog

The State of Financial Services Cybersecurity

  Image From Robin Hood to Bonnie and Clyde to Equifax, banks and the finance industry have been in jeopardy since the beginning of recorded history. For one, banks and financial services are enticing targets. The promise of a big payout, whether by breaching the vault or ransoming sensitive personal data, is what keeps would-be bank...
Blog

Is Dropbox Secure?

  Image When it comes to file sharing software, Dropbox is often top of mind: many individuals and organizations use it to simplify their file sharing, syncing, and collaboration. But how secure is Dropbox, and is it right for your organization? To break down Dropbox security effectively, we’ll explain what Dropbox is.   What is...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

  Image A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully...
Blog

Top 3 Things to Look for in a Remote Collaboration Tool

  Image   Feel Like You're Working Together — Even From Apart Finding the best way to securely collaborate on and share files can be difficult in the best of times. With large swathes of people working from home for the first time, finding the solution that meets your business requirements is paramount. Content collaboration...
Blog

How to Revamp Your Organization's Cybersecurity Program

  Image When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may...
Blog

How Does the DMZ Impact Security?

  Image Your Secret Weapon for Data Security When weapons and military forces have been removed from active duty, this is referred to as “demilitarization.” On the internet, the demilitarized zone, or the DMZ, is a similar situation. What is the DMZ? The DMZ is the neutral network that resides between the Internet and your...
Blog

User Sharing and Collaboration: Security Concerns, Risks, and How to Securely Collaborate

  Image Collaboration in the Workspace Secure collaboration tools that permit the sharing of sensitive data between users are quickly gaining momentum in the world of technology and file transfer. Although there are many benefits to utilizing these tools in the workspace, with user sharing and secure collaboration comes security...
Blog

What is a DMZ and Why Do You Need a DMZ Secure Gateway?

  Image If you’ve watched a science-fiction movie about space travel, then you’ve likely seen some version of a scene in which an astronaut reenters their ship from the outside abyss. Because the ship exists as a haven from the dangerous environment of empty space, the astronaut cannot simply open the door and stroll directly into...
Blog

5 Best Practices for IBM i File Transfers

  Image Using IBM’s built-in FTP and Open SSH servers to transfer files to and from your IBM i systems can be time-consuming, if not simply riddled with fine details. From scripting knowledge to running specific (and sometimes obscure) commands, there’s a lot to consider—and the safety and integrity of your files is probably at the...
Blog

SFTP Server in the DMZ or Private Network

Many organizations have an SFTP server installed where their trading partners can connect to securely upload and download sensitive files.   SFTP Server in the DMZ Traditionally SFTP Servers have been installed in the DMZ (or public facing) segment of the network since organizations were fearful of opening inbound ports into the Private (internal) network.   ...