Blog

Defeat Hackers: 8 Simple Tips

With the threat of cyberattacks on the rise, keeping corporate servers safe is a constant concern for IT professionals. Typically, the first step in Managed File Transfer Server security is choosing a secure protocol to protect your data. But what other security measures can you take? Anti-hacking (password guessing) features on your server should be […]

New Cybersecurity Laws: What They Mean for Your Business

Significant increases in the exposure of personal information has led the U.S. government to introduce legislation to protect consumer data. These bills focus on creating a culture of security within public companies and requiring disclosure when personal information has been compromised. Learn how these new laws could change your strategies for hiring leaders and training […]

An Open Letter to the Software Industry

By SRT CEO, Michael Ryan One patch. That’s all it took to cause a data breach that exposed personal information of nearly 146 million Americans. A single employee, somewhere within the Equifax chain of command, failed to install a software patch. A patch that had been available for months. A patch that could have prevented […]

Don’t be an Easy Target: 7 Ways to Keep Your Server Secure

Keeping corporate servers safe is a constant concern for IT professionals. Typically, the first step in Secure File Transfer server security is choosing a secure protocol such as FTP/S or SFTP. Sometimes, that’s not possible, so what other security measures can you take? The most important thing to focus on is to not be an […]

Not All Encrypted Storage is Secure

By SRT CEO Michael Ryan Sensitive and confidential documents stored on your servers need to be protected.  PGP (Pretty Good Privacy) Encryption is likely a requirement on your security checklist. PGP is a method of securing digital information and is usually used to encrypt data “at rest.” Not all PGP implementations offer complete point-to-point security. […]

Server Downtime: Are YOU Doing Enough to Prevent it?

Did you know that many of the websites you visit regularly, such as Amazon.com, are clustered & scalable websites? As customers access these websites, the network load balancers monitor the incoming traffic, distributing traffic across multiple servers. Clustering keeps day-to-day operations running smoothly, so you don’t have to worry about any server downtime. Is your business […]

Perimeter Defense: The Reverse Proxy

By Michael Ryan, CEO of South River Technologies Nearly all businesses protect vital internal assets by means of a firewall: a software- or hardware-based solution that sits between the corporate LAN and the external internet. These firewalls are designed to limit, regulate, and monitor traffic that passes between the public internet and the private corporate […]

What is PCI Compliant File Transfer and Storage?

Accepting credit card payments is standard practice in most businesses. In order to protect cardholder data, any business that accepts, processes, transfers or stores credit card data must comply with the Payment Card Industry Data Security Standard (PCI DSS). Often referred to simply as “PCI,” this standard was developed by a consortium of credit card issuers […]

Ready to see for yourself?

Contact us today if you’d like to discuss your needs with an experienced MFT consultant.

Contact Us