Home Featured

Featured

The Pros and Cons of Open Source Managed File Transfer Software

Nowadays with how much sensitive data is needing to be shuffled around between businesses, it’s coming to the time for many companies to implement a managed file transfer (MFT) solution. Regardless if there are new compliance requirements that have...

Five Cyber Security Best Practices to Follow

It is estimated that businesses will be shelving out an estimated $11.5 billion in expenses due to ransomware in 2019. Cyber-attacks are occurring with increasing alacrity this year, one on average every 14 seconds. The impact of cyber security...

How to Improve Security and Efficiency for Your File Transfers

Security continues to be top of mind for those in the business of keeping their company’s data out of the wrong hands. To learn where organizations are in their security initiatives, HelpSystems surveyed more than 650 IT and cybersecurity...

The 2018 Guide to Finding a Secure File Transfer Solution

It’s no secret—file transfers are an integral part of how each business runs. From purchase orders and quarterly reports to banking transactions and patient data, organizations may share a multitude of files with various participants every day. Sadly, this...

Cyber Security Job Outlook for 2018 and Beyond

Cybersecurity is quickly becoming the most lucrative of careers in IT. As cyber threats continue to grow, the need for certified IT security professionals remain in-demand. Currently, there are roughly half a million cybersecurity-related job openings in the United...

MFT: Still Young and Growing

Occasionally, I attend events with other technology professionals to talk about managed file transfer. When I bring it up, it’s not unusual that someone may give me an incredulous look and say, “Is that still happening?” Their viewpoint is...

Yahoo! Data Breach Didn’t Need to Happen…Here’s Why…

I remember meeting Tim Koogle in one of the 'ten plague' conference rooms in the early days of Yahoo! Tim was the founding CEO at the time. I thought it odd that we met in a conference room named...

Logical Operations: The Ashley Madison Hack — One Year Later

Cybersecurity is more than a technical operation. It is a human undertaking, and its failures lead to human cost. Few events illustrate this better than the Ashley Madison hack, which I blogged about almost exactly one year ago. Ashley...

STAY CONNECTED

36,264FansLike
55,564FollowersFollow
Show Buttons
Hide Buttons