Blog

Blog

Managed File Transfer 101: What's in it for Me?

Note from the Editor: This blog is a recap of an older webinar. To view the most recent webinars, you can do so here.Meet MFTThe term MFT (Managed File Transfer) is not new, but you may have begun to hear it more frequently. Changes in data security and transmission regulations have brought this established technology to the forefront, but what...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.Email File Transfer ChallengesThese are the four big challenges that organizations should be aware of when transmitting files via email.Email is sent "in the...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.Yet, here is the irony. While those in the insurance industry excel at evaluating risk management for their...
Blog

Is Your Company Letting Data Slip Through the Cracks?

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year.Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they needed, and were dismayed to...
Blog

How Important is Auditing Your File Transfers?

When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start sending quite a few...
Blog

Reverse Proxy DMZ Secure Gateways Might Be the Missing Link in Your MFT Strategy

By now, most companies have gotten the message that their data—as well as the sensitive data belonging to customers and partners—needs reliable protection from unauthorized access. The ever growing regulatory environment is making it more and more painful for any company who does not take their data security seriously.The challenges of data...
Blog

What Makes FTP an Outdated Security Method

Why is FTP an Outdated Protocol?FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data was controlled by the basic...