Blog

An Open Letter to the Software Industry

By SRT CEO, Michael Ryan One patch. That’s all it took to cause a data breach that exposed personal information of nearly 146 million Americans. A single employee, somewhere within the Equifax chain of command, failed to install a software patch. A patch that had been available for months. A patch that could have prevented … Read More

WebDrive vs ExpanDrive

In 8 different performance tests, WebDrive outperformed ExpanDrive, making WebDrive the faster ExpanDrive alternative, but additionally making WebDrive the most cost-effective Expandrive alternative. This post is a derivative of an article published by ITler.net. Upload / Download Test Test scenario small files Upload: 300 MB photos WebDrive: Speed: approx. 3:20 minutes Maximum upload: 20 Minimum … Read More

If You Have Multiple Cloud Services, Here’s an Easy Trick You Should Know

You have your personal files on Google Drive, your work files on SharePoint Online, and some files in your old DropBox account. With so many cloud storage services becoming available, managing multiple locations can eliminate the productivity benefits of the cloud. An easy solution to this issue is to mount a drive to connect to … Read More

7 Ways to Hacker-Proof Your Server

SFTP Server Security Best Practices Keeping your corporate servers safe is a constant concern for IT professionals. Typically, the first step in SFTP Server security is choosing a secure protocol such as FTP/S or SFTP.  Sometimes, that’s not possible, so what other security measures can you take? The most important thing to focus on is … Read More

Defeat Hackers: 8 Simple Tips

With the threat of cyberattacks on the rise, keeping corporate servers safe is a constant concern for IT professionals. Typically the first step in FTP Server security is choosing a secure protocol such as FTP/S or SFTP. Sometimes, that’s not possible, so what other security measures can you take? Anti-hacking (password guessing) features on your … Read More

Server Downtime: Are YOU Doing Enough to Prevent it?

Did you know that many of the websites you visit regularly, such as Amazon.com, are clustered & scalable websites? As customers access these websites, the network load balancers monitor the incoming traffic, distributing traffic across multiple servers. Clustering keeps day-to-day operations running smoothly, so you don’t have to worry about any server downtime. Is your business … Read More

Cyberattacks are on the Rise–Are You Sure Your Confidential Data is Secure?

If you are looking for a Managed File Transfer solution, PGP (Pretty Good Privacy) is likely a requirement on your security features checklist. PGP is a method of securing digital information originally developed to provide email privacy and authentication. Standard PGP is usually used to encrypt data “at rest.” But is Standard PGP enough? What … Read More