Blog

Blog

9 Mistakes You Might Make When Sending Big Files

  Sending that small file, or even a few small files, is a no-brainer at most organizations. But what about those massive, unwieldly and oh-so-sensitive files that inevitably get “stuck” or noted as “undeliverable.” You know the ones…those really important files that need to be somewhere yesterday! Without a company-approved file sharing method in...
Blog

What is File Encryption Software?

  File encryption software is a tool – either free or paid – that encodes your information so that it remains secure in motion, at rest, or both. Securing sensitive data is essential for any organization, and file encryption software does the heavy lifting. File encryption software uses one of several complex algorithms to scramble the contents of...
Blog

The Cybersecurity Dangers of the Dark Web and How to Protect Your Organization

  Even as cybersecurity experts and researchers declare that the “underground golden age is over” as its top marketplaces are raided or close their doors, the dark web continues to thrive. In fact, Darkode, one of the most well-known hacking forums and black markets, recently reopened. And what are some of the most common wares at these underground...
Blog

35 Cybersecurity Jokes to Make Any Security Geek Chuckle (or Groan)

  Good IT jokes are few and far between, especially when it comes to cybersecurity. That’s why we put on our creativity hats to brainstorm joke after joke – with a break to pull in a few of our favorites from the web – for the ultimate result: the motherlode (or should we say motherboard?) of cybersecurity jokes and puns. P.S.: we side with Alfred...
Blog

Why You Should Use File Encryption Software

    File Encryption Software is “Key”   What is the key to keeping your data safe? One word: Encryption. There’s no question that encrypting sensitive data at rest and in motion is essential when it comes to guarding against cyber threats and complying with local, national, or industry-standard requirements. However, if you’re still on the fence...
Blog

German DPAs Announce New Email Encryption Guidance

In May of 2020, substantial guidance on email encryption was issued by the German Data Protection Authorities (German DPAs) specific to personal data transferred via email. These guidelines recommend reducing the risks of a personal data breach with both end-to-end encryption and transport encryption. The new guidelines build on previous requirements,...
Blog

3 Lessons Learned from a Data Breach

  Data breaches have been plaguing organizations for years and the numbers continue to climb. After a breach, an organization goes into survival mode — trying to recover data, reestablish trust, and ensure they can keep their business running. It’s understandable that there isn’t much leisure time to sit back and reflect on what could have been done...
Blog

5 Ways to Tighten Cybersecurity Working from Home

  Logistically, you’re good to go: employees are working from their home offices, spare rooms, and kitchen counters as if they’ve always been doing it, IT is keeping things chugging along on the back end, and you’ve even ironed out the kinks in video call happy hours. Now that your employees can successfully work from home, it’s time to circle back and...
Blog

How Do I Securely Share and Send Large Files?

  The biggest danger of passing notes in grade school was interception by your teacher (or a box checked “no”) but sending large files these days carries a lot more risk. Messages that you’re sending in a work capacity likely contain information that’s more sensitive than schoolyard gossip or a question for your crush – and the person intercepting it...
Blog

How a Data Security Breach Puts Your Organization at Risk

  Data breaches are, unfortunately for organizations everywhere, becoming likely events rather than worst-case scenarios, as more and more organizations are learning. There are a variety of safeguards businesses can implement to reduce their risk, but even with good data security in place, a breach can happen. So, what do you do? And what is the...
Blog

What's the Difference? AS3 vs. AS4

  If you have ever delved into the Applicability Statement family tree, you may know that AS3 and AS4 don’t have much in common. But what makes these two ostensibly sequential protocols similar, and what sets them apart? And why aren’t they sequential, anyway? Read on to discover the key details that differentiate AS3 and AS4, and what makes them stand...
Blog

Key Cybersecurity Takeaways from the EasyJet Data Breach

  A data breach can wreak financial and logistical havoc for companies who experience them, not to mention customers, employees, and others who depend on or work with the breached organization. And even though it seems like data breaches are becoming more pervasive, they continue to severely impact organizations’ carefully built reputations – and may...
Blog

How Encryption Works: Everything You Need to Know

  What is Data Encryption? Encryption is a method of encoding data (messages or files) so that only authorized parties can read or access that data. Encryption software uses complex algorithms to scramble the data being sent. Once received, the data can be decrypted using a key provided by the originator of the message. The effectiveness of...
Blog

Use Caution When Transferring Large Files – Mom Says So!

  Use Caution When Transferring Large Files – Mom Says So! “Drive carefully,” Eat your vegetables,” “Share those toys with your brother,” “Think again about how you’re transferring all those large files!” You know, your mom’s right. She usually is. And, when it comes to transferring big files, it IS smart to adopt a best practices approach when it...
Blog

Replace Your FTP Scripts to Increase Security

  One too many things has gone wrong: a file didn’t arrive at its destination and you’re not sure why; your developer is out of office and you need to make a small change to your file transfer script; you logged into five different tools to schedule a simple transfer. And suddenly you realize: the time has come to move away from FTP scripts. At one...
Blog

Benefits of Single Sign-on (SSO)

  More than one is usually a good thing. More french fries, more vacation days, more friends. More usernames and passwords? Not so much. Organizations are increasingly turning to single sign-on (SSO) to lessen the burden of employees needing to remember endless usernames and passwords to access all the applications, websites and data to do their daily...
Blog

How to Revamp Your Organization's Cybersecurity Program

  When cyberattacks and data breaches make the news, it’s usually because they’re at large companies like Facebook or healthcare organizations. But every organization, large or small, needs to be concerned about cybersecurity; hackers have begun to understand that, while smaller companies may have less data on hand, they may have access to covetable...
Blog

What is Wrong With Free File Transfer?

  Free time! Free food! Free kittens! All great concepts, right? Free file transfers! Ummmm, not so much. The old adage, “If it sounds too good to be true, it probably is…” definitely holds when it comes to file transfers. After all, the data you send to third-parties, vendors, customers and even internal staff is priceless and, in the wrong hands,...
Blog

Top Data Breaches of 2019: How You Can Minimize Your Risks

    Top Data Breaches of 2019: How You Can Minimize Your Risk   Your organization made the headlines! That’s great, right? Not if it’s because you had sensitive data breached. A data breach can wreak financial and logistical havoc for you, your customers, patients, employees, and others. More importantly, it can severely impact the reputation you’ve...
Blog

Best Practices to Share Large Files

  Sharing large files is critical for most businesses, but how do you ensure files make it to the right people — and not everyone else? When considerations like security, bulk transfers, and tracking come into play, businesses need more than a one-off solution to share files with employees, customers, and trading partners. Luckily, there are a lot of...