Blog

Blog

Considerations for Cloud File Transfers

Image Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution.  There are no absolute right...
Blog

4 Ways You Can Use Your Digital Rights Management Tool

  Image   In an increasingly collaborative work environment, it’s more important now than ever before that your organization has the highest level of visibility and control possible over its data. While knowing how to choose the right data security solutions such as managed file transfer, data classification, and more is a...
Blog

What is Ryuk Ransomware?

  Image The last few years have seen a rise in stories about Ryuk, a powerful piece of ransomware that is best known for targeting healthcare institutions, but has also been attacking municipal governments, state courts, enterprises, and large universities, among others. Many of these organizations have paid hefty fees – between $100...
Blog

The Surprising Relationship Between Data Privacy Laws and File Sharing

  Image Location, location, location. Not just the mantra of realtors and would-be buyers – it’s also a concern for data security professionals world-wide. As cloud computing has ramped up across industries, the physical location of stored data has been called into question, alongside concerns stemming from data privacy laws. Read...
Blog

What is Ransomware-as-a-Service (RaaS)?

  Image   What is Ransomware-as-a-Service (RaaS)?   Ransomware-as-a-Service (RaaS) is a new pay-for-use business model used by ransomware developers where malicious actors (known as affiliates) can outsource or lease already-developed ransomware attacks the same way legitimate software developers lease Software-as-a-Service (SaaS)...