CyberSecurity Blog

Your go-to resource for insights on secure file transfer, cybersecurity best practices, and data management innovations.

How to Back up CUCM Using SFTP: A Step-by-Step Guide

Introduction Backing up Cisco Unified Communications Manager (CUCM) is essential for data security, compliance, and business continuity."Secure file transfer for CUCM is critical for protecting call records, configurations, and user data. SFTP (Secure File Transfer...

Security & Threat Protection

What is Two-Factor Authentication?

When you attempt to access data on a server, an authentication process goes on behind the scenes to prove you have permission to access data. This can be as simple as entering a password. Some servers even allow anonymous access, which allows anyone to request data...

How does SSL Secure File Transfers?

SSL Secures Transactions and File Transfers While FTP paved the way for common-use applications of file transfer, here it is a legacy protocol with many unpluggable security holes. Certain measures can be taken to make FTP more se,  such as turning off anonymous...

The Corporate Firewall

Corporate networks today rely on a router and/or firewall to protect their computers or LAN from unauthorized external access. Firewalls provide security by filtering or redirecting inbound traffic. A firewall can be implemented as software or hardware and works by...

Security & Managed File Transfer

Cloud and Hybrid Environments

More Articles from South River Technologies Experts