Sharetru Blog

    Secure file sharing software information, file sharing trends and announcements.

    Press Releases

    FTP Today has Rebranded to Sharetru

    Today is an important milestone in the history of our company. We’ve been... Read More
    Healthcare Compliance

    5 Common HIPAA Compliance Challenges

    What is HIPAA? The Health Insurance Portability and Accountability Act, often... Read More
    File Sharing Best Practices

    Common Delivery Methods for One-Time Password (OTP) Authentication

    Over the last few weeks, we have focused on authentication progressing through... Read More
    File Sharing Best Practices

    One-Time Password (OTP) Authentication Methods You Should Know – HOTP + TOTP

    The evolution of multi-factor authentication (MFA) is like that from the... Read More
    File Sharing Best Practices

    Authentication 101: Understanding Multi-Factor Authentication (MFA) to Protect Your Business

    In the IT industry there are many words used when discussing the topic of... Read More
    Cyber and Data Security

    Data Security Breaches: The Consequences + Hacking Prevention Best Practices

    Over the last month we have written several pieces of content reviewing the ... Read More
    Cyber and Data Security

    Key Differences: EFSS vs MFT/MFTaaS

    In our last few blog posts, we’ve explored potential options and solutions for... Read More
    Cyber and Data Security

    File Transfer + File Sharing Software Solutions

    What is File Transfer + File Sharing? File sharing is the practice of sharing... Read More
    Cyber and Data Security

    IT Infrastructure Choices for File Transfer + File Sharing Solutions

    Since the beginning of the internet, it’s been necessary for organizations to... Read More
    Cyber and Data Security

    CMMC 2.0 Controls Made Easy for Small & Mid-Sized Contractors

    When the Department of Defense initially announced version 2.0 of its... Read More
    Cyber and Data Security

    DoD SAFE Alternatives: How to Efficiently Share Files with the U.S. Military

    The U.S. Department of Defense (DoD) manages an annual budget that stretches... Read More
    Cyber and Data Security

    ExaVault Alternative

    The search for a secure file-sharing solution can lead you all over the... Read More
    File Sharing Best Practices

    How to Setup a Secure FTP

    File transfer protocol has been around for decades. But FTP as originally... Read More
    File Sharing Best Practices

    Data Security Best Practices

    Cybersecurity threats exist all around us, no matter what industries we may... Read More
    Cyber and Data Security

    How to Plan for Changes to CMMC Requirements

    By now, all contractors that work with the U.S. Department of Defense should be... Read More
    File Sharing Best Practices

    What to Look for in Enterprise FTP Solutions

    Large enterprises operating in the cloud need compliant and secure environments... Read More
    Cyber and Data Security

    What is FTP? Everything You Need to Know About File Transfer Protocol

    FTP, also known as file transfer protocol, is a process that organizations can... Read More
    File Sharing Best Practices

    How Does FTPS Work? Get to Know This Popular Protocol for Secure File Sharing

    Corporate servers are loaded with sensitive information. If this information... Read More
    File Sharing Best Practices

    HIPAA Compliant File Sharing

    In late summer 1996, the President of the United States signed into law the... Read More
    File Sharing Best Practices

    How to Find Secure File Sharing for Law Firms

    All organizations store and share files and data that are sensitive on some... Read More
    Cyber and Data Security

    Everything You Need to Know About Aerospace Industry Regulations and Cybersecurity

    The aerospace industry is a big business — and it’s only going to get bigger in... Read More
    File Sharing Best Practices

    What is SOC 2? Why it’s Important to Your Organization

    In the modern age, cybersecurity has become a serious priority for... Read More
    File Sharing Best Practices

    Why Rent A Dedicated FTP Server?

    The need for an FTP hosting service becomes apparent to any organization that... Read More
    File Sharing Best Practices

    Introducing Our User Facing Clickwrap Agreement Feature

    FTP Today recently launched our new User Facing Clickwrap Agreement feature... Read More
    File Sharing Best Practices

    NIST 101: Everything You Need to Know About the NIST Framework

    Even if you’ve only dabbled in cybersecurity, you’ve likely heard the acronym... Read More
    File Sharing Best Practices

    Introducing Our Session Lockouts Feature — for a More Secure FTP

    In mid-November, FTP Today launched a new session lockout feature that will... Read More
    File Sharing Best Practices

    Data Encryption Best Practices

    File transfer protocol (FTP) as it was first conceived included no encryption.... Read More
    File Sharing Best Practices

    CMMC 2.0: How the DoD’s Cybersecurity Certification is Changing

    The body that oversees Cybersecurity Maturity Model Certification (better known... Read More
    File Sharing Best Practices

    8 SFTP Best Practices for Your Business

    You’ve likely heard of FTP as a protocol for sharing files and information... Read More
    File Sharing Best Practices

    What to Look for in FTP Hosting: 10 Essential Features & Benefits for 2022

    FTP servers empower users to download and upload needed files and information... Read More
    File Sharing Best Practices

    ITAR Compliance Tips for 2021 and Beyond

    The United States is likely to spend more than $700 billion on national defense... Read More
    File Sharing Best Practices

    Comparison: Buy vs. Rent an FTP Server

    Organizations that regularly handle, store and share sensitive information... Read More
    File Sharing Best Practices

    File Share Best Practices for 2021 and Beyond

    Cybercrime has skyrocketed in the last 18 months. Malware, phishing and other... Read More
    Cyber and Data Security

    FTP Today Partnership with Carahsoft for GOVFTP Cloud

    In a press release last year, Carahsoft announced FTP Today has joined the... Read More
    File Sharing Best Practices

    Drive Mapping: Everything You Need to Know

    On more than one occasion, our clients have asked if it’s possible to map files... Read More
    File Sharing Best Practices

    What is an API (Application Programmable Interface)? The Basics & Benefits

    Recently, FTP Today launched a new feature as part of our platform called an... Read More
    File Sharing Best Practices

    Single Sign-On (SSO) Explained: What is SSO, How it Works, Why it Improves Security & More

    In recent years, FTP Today has received many questions from our customer base... Read More
    Secure File Sharing

    Compare File Sharing Solutions Before Committing: Free Trials for Your Proof of Concept

    Are you looking for a secure FTP hosting option  or a file sharing solution... Read More
    Cyber and Data Security

    How GOVFTP Cloud Managed File Transfer Compares to Microsoft SharePoint GCC

    You might be asking yourself, “why are collaboration platforms competing with ... Read More
    Cyber and Data Security

    Securing the Supply Chain - Meeting CMMC Compliance

    This blog post is the culmination of our Securing the Supply Chain series. In... Read More
    Cyber and Data Security

    Securing the Supply Chain - Meeting NIST SP 800-171 R2

    This blog post is a continuation of The CMMC Basics where we covered what the... Read More
    Cyber and Data Security

    Cybersecurity Maturity Model Certification: The CMMC Basics

    The United States of America is increasing attention on cybersecurity to ensure... Read More
    Healthcare Compliance

    The Impact of COVID-19 on Secure File Transfer in Healthcare

    COVID-19 has impacted every industry and person, especially those involved in... Read More
    Cyber and Data Security

    Why DoD SAFE Replaced AMRDEC SAFE and What It Means for Your Business

    AMRDEC SAFE was the leading solution in the government file-sharing space for a... Read More
    Press Releases

    FTP Today Opens Dallas Sales Office

    Las Vegas, Nevada U.S.A.June 15, 2020 FTP Today announces the grand opening of... Read More
    FTP

    Secure FTP: Best Alternatives to FTP

    FTP (File Transfer Protocol) has been a leading option in file transfers for a... Read More
    Cyber and Data Security

    3 Reasons ITAR Compliance Is Important For Aerospace Companies

    The aerospace industry has grown exponentially in recent memory. The transport... Read More
    FTP

    Why Do People Still Use FTP Sites?

    File sharing options and acronyms can often be overwhelming to keep track of as... Read More
    File Sharing Best Practices

    A Comparison of Dedicated FTP Servers and Cloud FTP Hosting

    When it comes to file sharing, nothing is more important than security. But... Read More
    File Sharing Best Practices

    Cybersecurity Best Practices for Newly Remote Employees

    Businesses all over the world are adjusting how employees work due to the... Read More
    Government

    5 Aerospace Cybersecurity Trends for 2020

    Aerospace cybersecurity is a growing topic in our industry – and not for the... Read More
    Cyber and Data Security

    What is the NAS9933 Aerospace Cybersecurity Standard?

    Imagine you are the pilot of a plane, carrying delicate cargo – maybe the most... Read More
    Cyber and Data Security

    The Role of the AIA in Aerospace Cybersecurity

    At FTP Today, we get asked a lot about aerospace cybersecurity. From who... Read More
    Government

    What is the Difference Between CMMC and DFARS?

    DFARS, or the Defense Federal Acquisition Regulation Supplement, was launched... Read More
    Government

    4 Steps to Becoming CMMC Compliant

    As a DoD contractor, you are probably wondering how to prepare for the... Read More
    Government

    What is the Difference Between CMMC and NIST?

    If you are a DoD contractor, this summer you’ll be required to align with new... Read More
    Government

    The Levels of Cybersecurity Maturity Model Certification (CMMC)

    The Cybersecurity Maturity Model Certification is a relatively new security... Read More
    Government

    Do DoD Contractors Need the Cybersecurity Maturity Model Certification?

    The Cybersecurity Maturity Model Certification (CMMC) was a big announcement... Read More
    FTP

    Aerospace Cybersecurity Standards Explained

    Cybersecurity is a widespread concern, the aerospace industry being no... Read More
    Government

    The 4 Biggest Aerospace Cybersecurity Challenges

    The aerospace industry is a particularly alluring target for cybersecurity... Read More
    FTP

    5 Tips for Using the FedRAMP Marketplace

    The FedRAMP Marketplace is a helpful resource for federal agencies looking for... Read More
    Cyber and Data Security

    Why Use SSH-Key Authentication for SFTP Instead of Password Authentication?

    When you think of user access security, you might think of traditional security... Read More
    Government

    What are the Costs of Working with a FedRAMP Authorized CSP?

    Working with a FedRAMP Authorized cloud service provider (CSP) is required for... Read More
    Government

    The 3 Stages of FedRAMP Compliance

    Many cloud service providers strive to be FedRAMP compliant and earn their... Read More
    Healthcare Compliance

    5 Types of Challenges You Must Overcome to be HIPAA Compliant

    If your organization deals with sensitive healthcare data, you’re well aware of... Read More
    Cyber and Data Security

    4 Benefits of Using a FedRAMP Authorized Cloud Service Provider (CSP)

    Security breaches and cybersecurity attacks happen every day, making it... Read More
    File Sharing Best Practices

    How BYOD Is Affecting Your Business's File Security

    No longer just a novel approach to office technology, BYOD (bring your own... Read More
    Cyber and Data Security

    The Difference Between ATO and P-ATO FedRAMP Authorization

    For so many organizations, especially government agencies, it can feel like ... Read More
    Government

    Understanding The Levels of FedRAMP Compliance

    Choosing a cloud service provider is a major decision for many organizations,... Read More
    File Sharing Best Practices

    How to Be HIPAA Compliant When Sharing Sensitive Files

    Is your company subject to HIPAA compliance regulations? If you deal with... Read More
    Government

    An Overview of Regulations Under The DDTC

    When you deal with defense-related data and services, the different compliance... Read More
    Government

    Data Security Best Practices for ITAR Compliance

    If you’re running a company that’s subject to ITAR compliance regulations, you... Read More
    Cyber and Data Security

    6 Steps for Implementing the NIST Cybersecurity Framework

    Implementing the NIST Cybersecurity Framework is one of the best ways to ... Read More
    Healthcare Compliance

    Regulatory Compliance: The Differences Between HIPAA, SOX, and GLBA

    If you’re subject to regulatory compliance, this can have a major impact on the... Read More
    File Sharing Best Practices

    8 Types of Malware Attacks and How to Avoid Them

    Malware is a threat to your business both from a monetary and a productivity... Read More
    FTP

    Best Secure File Transfer Solutions? [A Comparison Guide]

    Before integrating a secure file sharing solution into your business... Read More
    File Sharing Best Practices

    How Does an FTP Server Work and What are Its Benefits?

    Using an FTP server is a common solution for businesses that want to keep their... Read More
    Government

    Everything You Need to Know About EAR Regulation Compliance

    Is your business subject to commercial Export Administration Regulations or its... Read More
    Government

    The Glossary of DFARS Compliance Terms

    Understanding DFARS, its correlating policies and information can be... Read More
    FTP

    SFTP vs. FTP: Understanding the Difference

    Data is a valuable asset, one that’s important for businesses to protect.... Read More
    Government

    The Most Common FAQs on NIST 800-171 and NIST 800-53

    NIST 800-171 and NIST 800-53 are two key publications outlining cybersecurity... Read More
    FTP

    Why an FTP Alternative is Not Ideal for External File Sharing

    With numerous options for sharing files, choosing the right one can be a... Read More
    FTP

    Overcoming Common File Transfer Protocol Challenges

    Does your organization commonly use old methods of FTP (file transfer protocol)... Read More
    Government

    DoD Contractor Options to Meet DFARS Compliance

    Department of Defense contractors are trusted with some of the government’s... Read More
    Government

    How Much Will NIST Compliance Cost?

    If you are a government contractor, compliance is non-negotiable. Protecting... Read More
    Government

    Understanding the Basics of FedRAMP Compliance

    The Federal Risk and Authorization Management Program (FedRAMP) essentially is... Read More
    Government

    The Best Resources for NIST Security Compliance

    Cybersecurity is vital for modern companies using digital tools. In 2018, the... Read More
    Government

    ITAR Requirements: The Consequences of Non-Compliance

    Is your company subject to ITAR (International Traffic in Arms Regulations)?... Read More
    Government

    What is NIST? Understanding Why You Need to Comply

    If your business often works with the United States government, you’re likely... Read More
    Government

    7 Ways to Prepare for DFARS Compliance

    As a government contractor, it’s imperative that you take steps to comply with... Read More
    FTP

    How to Evaluate if a Cloud-Based FTP Solution is Right for Your Business

    Does your organization need a cloud FTP solution? File sharing is a key aspect... Read More
    Government

    NIST 800-171 Assessment for DoD Contractors and Subcontractors

    Conducting  a security assessment is an essential part of keeping your data... Read More
    File Sharing Best Practices

    File Sharing Standards Your Team is Failing to Implement

    Establishing file sharing standards within your organization creates the... Read More
    Government

    AMRDEC SAFE Alternatives for Secure File Sharing

    Was your organization a previous user of AMRDEC SAFE (Army Aviation and Missile... Read More
    Government

    Your Complete NIST 800-171 Checklist

    If your organization handles controlled unclassified information (CUI), you... Read More
    Government

    NIST 800-171 Questionnaire: Are You Complying With These Access Control Factors?

    Are you complying with NIST (National Institute of Standards and Technology) SP... Read More
    Government

    14 Questions to Answer on Meeting CUI Security Requirements

    Are you looking for clarification on the CUI (Controlled Unclassified... Read More
    Government

    NIST Security Controls Assessment Guide

    Does your organization have security controls in place, but you’re unsure if... Read More
    Government

    How to Comply with NIST 800-171

    The National Institute of Standards and Technology (NIST) Special Publication... Read More
    Government

    6 Steps to Implement NIST 800-171 Requirements

    Has your company taken steps to be compliant with NIST 800-171 regulations?... Read More
    Government

    2019 ITAR Compliance Regulations You Need to Know

    ITAR, or the International Traffic in Arms Regulations, is a set of regulations... Read More
    FTP

    Complete Breakdown of FTP Hosting Costs – What You Need to Know

    When trying to evaluate the cost of FTP hosting providers, there are many... Read More
    Government

    FedRAMP vs. FISMA: Similarities and Differences

    For federal agencies and the contractors they work with, compliance is a daily... Read More
    Government

    NIST Cybersecurity Framework Explained

    Is your organization working to align with NIST (National Institute of... Read More
    Government

    FISMA Compliance Requirements for File Sharing

    In 2002, the United States government took steps to address a relatively new... Read More

    NIST File Sharing Standards: What You Need to Know

    NIST standards are vital for both federal and nonfederal organizations alike.... Read More
    Government

    Protecting Controlled Unclassified Information: NIST 800-171

    The U.S. government is reliant on contractors and subcontractors for special... Read More
    Government

    DFARS Compliance: Steps to Consider for FTP Hosting Services

    Does your organization need to comply with DFARS (Defense Federal Acquisition... Read More
    Government

    How Cloud-Based File Sharing Fits in the CJIS Compliant Security Policy

    Maintaining CJIS (Criminal Justice Information Services) compliance might seem... Read More
    Government

    What Is CJIS Compliance?

    Criminal Justice Information Services (CJIS) protects private or sensitive... Read More
    Government

    ITAR Requirements for Your Employees: Who's at Risk?

    ITAR (International Traffic in Arms Regulations) compliance isn’t just an... Read More
    Government

    What Are ITAR Certification Requirements?

    Many people in your industry or others impacted by ITAR (International Traffic... Read More
    Government

    How to Keep Your File Sharing DDTC and ITAR Compliant

    Do you believe your products or data are subject to ITAR or DDTC compliance,... Read More
    Government

    Secure AMDEC Safe Alternatives

    The United States government has shut down AMRDEC SAFE (Army Aviation and... Read More
    Government

    ITAR vs. EAR: What You Need to Know When Sharing Files

    Is your business subject to ITAR or EAR regulations? If you’re unsure, it’s... Read More
    FTP

    File Sharing Q&A: What Are File Sharing Alternatives?

    Have you been tasked with finding a new file sharing alternative for your... Read More
    Government

    ITAR Compliance: How Does File Sharing Software Comply with Transmission of Data Standards?

    ITAR (International Traffic in Arms Regulations) is a set of government... Read More
    File Sharing Best Practices

    Explicit FTPS vs. Implicit FTPS: What You Need to Know

    File sharing solutions can be a great asset for you company, but sometimes it... Read More
    File Sharing Best Practices

    How Do I Know Which File Sharing Solution is Right for Me?

    With so many file sharing solutions on the market, it can be hard to determine... Read More
    Cyber and Data Security

    What is the Biggest Cybersecurity or Data Threat?

    If you’ve tuned into or read the news lately, you’ve probably seen a story... Read More
    FTP

    What is the Most Cost-Effective File Sharing Solution?

    For most businesses, budget is a huge factor in every decision, including ... Read More
    Cyber and Data Security

    Actions and Procedures to Consider When Establishing a Data Security Policy

    Does your company have a working and enforced data security policy? While you... Read More
    FTP

    File Sharing Gone Wrong: What You Need to Know About Disaster Recovery

    Have you ever accidentally deleted an important file? Maybe the power went out... Read More
    FTP

    Top 6 Questions to Ask When Comparing Corporate FTP Solutions

    Adopting a new file sharing solution can be a big investment for your company,... Read More

    Restriction Protocols You Need for Compliant File Sharing

    Do you live in fear of a getting hit with non-compliance fine? If so, you’re... Read More
    FTP

    The Biggest Disadvantages and Advantages of FTP

    Whether you’re running a law firm that needs to send large amounts of case data... Read More

    When to Use SFTP

    Do you need to transfer a file, but you’re unsure of the best way to share it... Read More
    File Sharing Best Practices

    Best Practices for SFTP Email Notifications

    If you’ve been searching for the right SFTP solution for your business, you’ve... Read More

    How to Choose the Right FTP Host

    Choosing the right FTP host is a tall task for any business. When you started... Read More

    What is SFTP Hosting?

     FTP, SFTP, SSL, SSH. With so many acronyms, it’s hard to keep these protocols... Read More

    How to Get Budget Approval for a Hosted FTP Solution

    All businesses look for ways to save time and money without compromising... Read More

    How Remote Work Affects IT Compliance and Data Security

    Hiring remote employees is the easiest way to expand your talent pool, provide... Read More
    FTP

    6 Things You Should Know about Cloud SFTP Servers

    If security and convenience are important factors in your file sharing solution... Read More
    FTP

    FTP Servers vs File Services: What are the Biggest Differences?

    Are you in the market for a new file storage server? If so, you’ve probably... Read More
    Cyber and Data Security

    5 Steps to Take Post Malware Attack

    As the programs you use to protect your information get more sophisticated, so... Read More

    7 Essential Control Features Needed for Secure File Sharing

    When people search for a secure file sharing solution, there are a few features... Read More

    When You Should (and Shouldn't) Choose EFSS

    There is no doubt that the ease of deploying an Enterprise File Synchronization... Read More

    How to Determine the Type of File Sharing Solution You Need

    With all the different types of file sharing services out there, it can be hard... Read More

    Cloud-Based File Sharing: A Checklist to Keep Your Files Secure

    While enterprise cloud-based solutions have become a top way for companies to... Read More

    How to Choose the Best File Sharing Solutions for Enterprises

    Enterprises have very different requirements for file sharing solutions than... Read More
    File Sharing Best Practices

    4 Must-Have Features to Look for in an SFTP Server

    Are you looking for a new SFTP solution for your business? When you simply... Read More

    How to Stay in Control of Your Files Even When Sharing on the Cloud

    When the term “cloud computing” was coined back in 2006 everyone was intrigued... Read More

    8 Ways Successful Businesses Increase Efficiency with Online File Sharing

    Over the last few decades, the internet has changed how people work. In the... Read More

    What Is Multi-Factor Authentication?

    Today, in the face of large scale data breaches, data security is becoming more... Read More

    HIPAA Changes and Compliance: What You Should Know About Keeping PHI Safe

    In the face of evolving technologies and sophisticated security threats, HIPAA... Read More

    In-House FTP vs Hosted FTP: A Cost Comparison

    If you’re a business owner, you know that cost is a factor in every decision... Read More

    Authentication Factors that Help Ensure Secure File Sharing

    Verifying that someone is who they say they are is essential for keeping your... Read More

    How to Keep Your Files Safe When Using the Cloud

    While the cloud presents a number of opportunities for large scale data storage... Read More

    Online FTP Checklist: What to Look for When Replacing an In-House Server

    Are you tired of maintaining your in-house server? The high costs, regular... Read More

    FTP Alternative Options for Working with the Government

    For government agencies or contractors, data security is a top concern. Between... Read More

    Data Leakage Prevention Best Practices

    Data loss is a huge threat for many companies, especially those working in the... Read More

    Essential Secure File Sharing Features for Military Contractors

    Keeping data and information secure as a military contractor is vital. Not only... Read More

    Everything You Need to Know about HIPAA Compliant File Sharing Solutions

    Being HIPAA compliant when sharing files is mandatory for those in the medical... Read More

    At-Rest Encryption: Everything You Should Know About Keeping Files Safe

    For many companies, ensuring data is securely shared both internally and... Read More
    FTP

    Why Should I Use FTP Cloud Storage?

    If you’re shopping for a file transfer solution, you’ve probably heard a lot... Read More
    FTP

    Folder Access Permissions: How Do FTP and File Sharing Alternatives Compare?

    When searching for a file sharing solution, many people look at features like... Read More

    Unlimited Transfers vs. Unlimited Bandwidth: What's the Difference with Your FTP Software

    If you are looking for a new file transfer solution, there’s a chance you have... Read More

    How Choosing an Online FTP Solution Improves Your Business Growth

    If you’re a business owner, you know that growing and improving your business... Read More

    Red Flags to Avoid When Shopping for a File Transfer Solution

    If you’re searching for your next file transfer solution, you’ve likely noticed... Read More

    PCI-DSS File Sharing Requirements

    The Payment Card Industry Data Security Standard (PCI-DSS) is designed to help... Read More

    The Best File Sharing Solutions for the Payment Card Industry

    If you work in the finance industry, you know how crucial it is that you keep... Read More
    Government

    How to Choose the Best Regulatory Compliant FTP Software

    Data security is crucial for many companies, especially ones in the medical,... Read More

    8 Computer Security Training Tips for Secure File Sharing

    In September, Equifax, a top consumer credit reporting company, was hacked, ... Read More

    Secure FTP Solution Price Comparison: What’s Your Best Option?

    If you need a new FTP solution, you’ve probably noticed that there are plenty... Read More

    In-House vs. SaaS FTP Software: How Do They Compare?

    In-house or an SaaS solution? This is a question many companies are face.... Read More

    Interface Features To Look For In An FTP System

    When many companies search for an FTP solution, they assess a number of... Read More

    How To Choose The Best File Sharing Solution

    Have you been putting off a much needed upgrade to your file sharing solution?... Read More
    FTP

    Switching to a New File Transfer Solution Is Easier Than You Think

    Are you considering switching to a new file sharing solution? For many... Read More

    Changing My FTP File Transfer Protocol for Better Security

    Take a moment to think about how much data your company gains, transfers and... Read More
    Government

    Is My File Sharing ITAR Compliant?

    A strong flow of information is the heartbeat of any business or organization.... Read More
    Government

    8 ITAR Data Security Tips for Government Agencies

    Government organizations and companies that operate in the defense industry... Read More
    File Sharing Best Practices

    What Happens if I Accidentally Delete Files from my FTP Service Provider?

    User error is a tricky thing when it comes to data security. Regardless of how... Read More
    Government

    What Does ITAR Compliance Have to Do with Your Technical Data?

    When operating in the import and export of military or defense-related... Read More
    Government

    ITAR Compliance Requirements You Need To Know

    The International Traffic in Arms Regulations, or ITAR, is a set of government... Read More

    What Cyber or Data Security Threat Should I Be Most Concerned About?

    You don’t have to look far or wide to find an abundance of headlines... Read More
    FTP

    Which File Sharing Solution is Best: FTP or SFTP?

    The process of choosing a file sharing solution for your organization can be... Read More
    File Sharing Best Practices

    Understanding Your File-Sharing Alternatives: What Else Is Out There?

    There are a host of options on the market for businesses that require a way to... Read More
    FTP

    5 Ways to Safely Use Cloud-Based Solutions for Secure File Transfer

    For businesses that need a way to store, manage and share files and... Read More

    Your Top Priority: Creating an IT Compliance Policy

    For years, hacking and breaches have become increasingly prevalent. And in this... Read More

    The Data Loss Prevention Efforts You Need to Focus On

    With the crippling financial and legal ramifications of data loss, preventing... Read More

    Credible Data Security Policies Include File Sharing Software

    The secret’s out: data is the key to business success. Well, maybe it wasn’t... Read More

    Why Your Data Security is Failing: Data Leakage Issues

    Data is the lifeblood of nearly every business. Whether data about your... Read More

    Why an IT Security & Compliance Policy is Vital to Your Company's Success

    Think about all of the factors that contribute to the growth and success of... Read More
    Cyber and Data Security

    Key Components Needed in Your Data Security Policy

    It doesn’t matter what kind of business you’re running, what industry you’re... Read More

    4 Ways Companies Can Communicate the Security Risks of File Sharing to Their Employees

    IT professionals have their work cut out for them when it comes to ensuring the... Read More

    Top Technologies & Processes to Identify & Mitigate Risks in Your IT Department

    Information technology continues to evolve at an unprecedented rate. For... Read More

    3 Reasons Why “Secure” File Sharing Just Isn't Enough Security

    Whatever industry your business operates in, you’re likely to be working with... Read More

    What Hackers Don't Want You to Know About Secure File Sharing

    If you could have an open, honest conversation with a hacker, what would you... Read More
    Cyber and Data Security

    Biggest Computer Security Threats

    No business is safe from the computer security threats that permeate today’s... Read More
    Cyber and Data Security

    Data Security Tips for Remote Workers

    50% of U.S. workers have a job that’s compatible with at least partial... Read More
    Cyber and Data Security

    Data Security Trends for 2017

    If you’re in business today, you likely have critical data being stored,... Read More
    Cyber and Data Security

    Computer Security Tips for Employees

    When it comes to cybersecurity for your organization, there are potential risks... Read More

    File Sharing Secrets: How to Protect Your Business Data from Hackers

    Many small and mid-sized businesses don’t see their file sharing processes as a... Read More

    Protect & Track Critical Data with Managed File Transfer Solutions

    2016 was a record-breaking year for cyber attacks, with billions of data points... Read More

    Healthcare Cybersecurity: Following HIPAA Regulations May Not Protect You

    Make no mistake: Regulatory compliance in the medical industry is a necessary... Read More

    Safeguard Actions Needed for HIPAA-Compliant File Storage

    Maybe you’ve read about all the data breaches recently experienced by... Read More
    Healthcare Compliance

    Is Your SFTP Hosting Solution HIPAA Compliant?

    Can your healthcare facility afford to incur thousands -- or even millions --... Read More

    9 HIPAA-Compliant FTP Software Features Your Medical Data Needs

    Every day, your healthcare facility deals with sensitive patient information.... Read More

    5 Security Questions Every Enterprise Needs to Ask Before Choosing FTP Hosting

    You’ve read many a horror story about cyber attacks that left businesses facing... Read More

    Control Questions to Ask When Comparing FTP Service Providers

    Deciding to employ an FTP service (or an FTP alternative) for your... Read More