Blog

Blog

Key MFT Protocols and Their Security Implications

Deciding how to securely send files doesn’t have to be difficult. There are plenty of file transfer protocols that can do the job efficiently and securely (as well as a few that should be out of consideration).File Transfer Protocols and Their Security ConsiderationsFTP (File Transfer ProtocolSecurity considerations: Transmission of files is unencrypted, and data is sent in plaintext (including...
Blog

What Is an SFTP Port and Why Does It Matter?

If you need to establish a secure connection between a client and server to transfer business-critical or sensitive files, an SFTP (Secure File Transfer Protocol) port is a strong choice for securing data in transit. The SFTP port is a network port used to establish a secure connection or communication channel between the client and the server. It ensures that during transit, data is encrypted...
Blog

What is a TFTP Server?

What is a TFTP Server? TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less complexity, and therefore...
Blog

Considerations for Cloud File Transfers

Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution. There are no absolute right or wrong answers to...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a challenge in and of itself,...
Blog

What is Ryuk Ransomware?

The last few years have seen a rise in stories about Ryuk, a powerful piece of ransomware that is best known for targeting healthcare institutions, but has also been attacking municipal governments, state courts, enterprises, and large universities, among others. Many of these organizations have paid hefty fees – between $100,00 and $500,000,...
Blog

What is PGP and How Does It Work?

When someone in your organization wants to transfer a file – internally or outside of the organization – a few concerns may come up:Is the file complete?Is it being sent to the right place?Will it arrive intact?Is sensitive data protected and encrypted from unauthorized recipients?All are valid concerns, and each can be addressed with the help of...