Blog

Cybersecurity Expertise and Secure File Transfer Best Practices

The Corporate Firewall

Corporate networks today rely on a router and/or firewall to protect their computers or LAN from unauthorized external access. Firewalls provide security by filtering or redirecting inbound traffic. A firewall can be implemented as software or hardware and works by examining packets of information passing into a network through ports. We explored packets a bit […]

UNC Paths for Data Storage and Networking

Scalability is a hot topic in server technology today. Large companies want to use their hardware to maximum efficiency. They want servers that handle both everyday file exchange and spikes of high traffic. At the most basic level, order a server must have access to the data a user needs and the capacity to deliver […]

The Heartbleed Bug – How Does it Affect You?

A serious security vulnerability was recently discovered in the very popular Open Source cryptographic software engine named OpenSSL. This vulnerability, The Heartbleed Bug, could allow an attacker to access the memory of an OpenSSL-based application, extract data, and potentially decrypt and access sensitive information from the system. Heartbleed, introduced into the OpenSSL 1.0 source branch […]

Target: A Massive Data Breach Just in Time for the Holidays

Another story sweeps through the news about a data breach of credit card information, as retailer Target reports that 40 million credit card accounts have been affected. The company will say little about how the breach happened. For now, they say only that the “data on the magnetic strip” of the credit card was compromised. […]

Contact us today if you’d like to discuss your needs with an experienced MFT consultant.

Contact Us