The Sharetru Blog

    Discover expert insights, practical tips, and the latest trends to optimize your file transfers.
    Subscribe to stay ahead of the curve, receive feature updates, and transform the way you manage and exchange files.

    Cyber and Data Security

    SSH-Key vs. Password Authentication: Which is Better?

    When you think of user access security, you might think of traditional security... Read More
    File Sharing Best Practices

    How Does an FTP Server Work and What are Its Benefits?

    Using an FTP server is a common solution for businesses that want to keep their... Read More
    File Sharing Best Practices

    One-Time Password (OTP) Authentication Methods – HOTP + TOTP

    The evolution of multi-factor authentication (MFA) is like that from the... Read More
    Healthcare Compliance

    Deciphering Compliance: HIPAA, SOX, and GLBA Differences

    If you’re subject to regulatory compliance, this can have a major impact on the... Read More
    File Sharing Best Practices

    Understanding One-Time Password (OTP) Authentication Options

    Over the last few weeks, we have focused on authentication progressing through... Read More
    File Sharing Best Practices

    Data Retention 101: How Long to Keep Your Files? | Sharetru

    An Introduction to Data Retention "Data Retention" is a term that's used in... Read More
    FTP

    Why Do People Still Use FTP Sites?

    File sharing options and acronyms can often be overwhelming to keep track of as... Read More
    Cyber and Data Security

    Secure Military File Sharing: Exploring DoD SAFE Alternatives

    The U.S. Department of Defense (DoD) manages an annual budget that stretches... Read More
    Cyber and Data Security

    6 Steps for Implementing the NIST Cybersecurity Framework

    Implementing the NIST Cybersecurity Framework is one of the best ways to ... Read More