Blog

Cybersecurity Expertise and Secure File Transfer Best Practices

PGP Encryption – Why should I use it?

What is PGP? PGP stands for Pretty Good Privacy, which is easy to remember, but also not terribly descriptive. PGP is a way of encrypting data that’s stored on workstations or servers. Its most popular use is to secure email attachments, since email is not sent over a secure protocol. PGP is a free tool […]

Defeat Hackers: 8 Simple Tips

With the threat of cyberattacks on the rise, keeping corporate servers safe is a constant concern for IT professionals. Typically, the first step in Managed File Transfer Server security is choosing a secure protocol to protect your data. But what other security measures can you take? Anti-hacking (password guessing) features on your server should be […]

New Cybersecurity Laws: What They Mean for Your Business

Significant increases in the exposure of personal information has led the U.S. government to introduce legislation to protect consumer data. These bills focus on creating a culture of security within public companies and requiring disclosure when personal information has been compromised. Learn how these new laws could change your strategies for hiring leaders and training […]

An Open Letter to the Software Industry

By SRT CEO, Michael Ryan One patch. That’s all it took to cause a data breach that exposed personal information of nearly 146 million Americans. A single employee, somewhere within the Equifax chain of command, failed to install a software patch. A patch that had been available for months. A patch that could have prevented […]

Not All Encrypted Storage is Secure

By SRT CEO Michael Ryan Sensitive and confidential documents stored on your servers need to be protected.  PGP (Pretty Good Privacy) Encryption is likely a requirement on your security checklist. PGP is a method of securing digital information and is usually used to encrypt data “at rest.” Not all PGP implementations offer complete point-to-point security. […]

What is PCI Compliant File Transfer and Storage?

Accepting credit card payments is standard practice in most businesses. In order to protect cardholder data, any business that accepts, processes, transfers or stores credit card data must comply with the Payment Card Industry Data Security Standard (PCI DSS). Often referred to simply as “PCI,” this standard was developed by a consortium of credit card issuers […]

The Corporate Firewall

Corporate networks today rely on a router and/or firewall to protect their computers or LAN from unauthorized external access. Firewalls provide security by filtering or redirecting inbound traffic. A firewall can be implemented as software or hardware and works by examining packets of information passing into a network through ports. We explored packets a bit […]

Contact us today if you’d like to discuss your needs with an experienced MFT consultant.

Contact Us