A managed file transfer (MFT) solution is critical for businesses that need to securely share and sync files. Multi-layer security is vital, because exposing your data at any point — even for fractions of a second — can put your sensitive information at risk. To make sure you choose the right MFT solution for your […]
By SRT CEO, Michael Ryan One patch. That’s all it took to cause a data breach that exposed personal information of nearly 146 million Americans. A single employee, somewhere within the Equifax chain of command, failed to install a software patch. A patch that had been available for months. A patch that could have prevented […]
Keeping corporate servers safe is a constant concern for IT professionals. Typically, the first step in Secure File Transfer server security is choosing a secure protocol such as FTP/S or SFTP. Sometimes, that’s not possible, so what other security measures can you take? The most important thing to focus on is to not be an […]
By SRT CEO Michael Ryan Sensitive and confidential documents stored on your servers need to be protected. PGP (Pretty Good Privacy) Encryption is likely a requirement on your security checklist. PGP is a method of securing digital information and is usually used to encrypt data “at rest.” Not all PGP implementations offer complete point-to-point security. […]
Did you know that many of the websites you visit regularly, such as Amazon.com, are clustered & scalable websites? As customers access these websites, the network load balancers monitor the incoming traffic, distributing traffic across multiple servers. Clustering keeps day-to-day operations running smoothly, so you don’t have to worry about any server downtime. Is your business […]
If you are looking for a Managed File Transfer solution, PGP (Pretty Good Privacy) is likely a requirement on your security features checklist. PGP is a method of securing digital information originally developed to provide email privacy and authentication. Standard PGP is usually used to encrypt data “at rest.” But is Standard PGP enough? What […]
Accepting credit card payments is standard practice in most businesses. In order to protect cardholder data, any business that accepts, processes, transfers or stores credit card data must comply with the Payment Card Industry Data Security Standard (PCI DSS). Often referred to simply as “PCI,” this standard was developed by a consortium of credit card issuers […]
There is real danger that the current climate of freedom and flexibility enjoyed by many enterprise businesses using cloud computing could be overshadowed by a storm looming on the horizon. The unsanctioned use of consumer-oriented file-sharing services across businesses is a growing concern for IT departments everywhere. Often referred to as the ‘Dropbox problem’ by […]
When you attempt to access data on a server, an authentication process goes on behind the scenes to prove you have permission to access data. This can be as simple as entering a password. Some servers even allow anonymous access, which allows anyone to request data (this is terribly insecure, however, and unacceptable in secure […]
SSL Secures Transactions and File Transfers While FTP paved the way for common-use applications of file transfer, here it is a legacy protocol with many unpluggable security holes. Certain measures can be taken to make FTP more se, such as turning off anonymous access and heightening the security of your firewall, but this doesn’t make […]