Blog – MFT Nation

heading-img-1
Time-Tested Data Security Equation: Out-of-Date Software + Hackers = Disaster

The case of FTC v. Wyndham Worldwide Corp. is a good case study for what not to do in the rapidly changing world of data security. We will share some thoughts about the case in an upcoming blog. But for now, I want to quickly address one allegation from the case because it serves to highlight a point made in an earlier blog post. (more)

 
Using Technology and People to Help Protect Against Data Breaches

Most of us in the data security industry know that a data breach is the most common and costly data security failure for a company of any size. We also know that we have technology to help prevent these attacks—e.g., encryption, firewalls, network monitoring, etc. But if you are waiting for technology alone to solve all your issues, then as my favorite rock group of all time would say, “Dream On”.   It’s true that technology is getting smarter, but this can be undermined when your employees are not trained to play defense. Protecting data systems requires both the technical and human elements to be synchronized. (more)

 
Data Monitoring: Do It or Face the Ugly Consequences

Our data security experts here at bTrade want to let our readers know of a breaking story in the world of data security. News outlets are reporting that Russian crime figures have illegally obtained more than a billion stolen Internet credentials. According to data security firm, the stolen credentials include 1.2 billion password and username combinations and more than 500 million email addresses. (more)

 
Ten Database Security Vulnerabilities That Can Leave Your Company Open to Attack

One of the ongoing goals for this blog is to provide our readers with pertinent articles in the world of managed file transfer and data security. I recently read an article written by Charlie Osborne a blogger for ZDNet’s blog Zero Day, entitled: “The top ten most common database security vulnerabilities”. (more)

 
Three Basic Managed File Transfer Scenarios

After explaining to a friend the type of work I do as a bTrade managed file transfer (MFT) specialist, he said: “Moving data from one place to another is pretty simple.” Generally speaking, he is correct. But as the saying goes, the devil is in the details.

You need to know the details of your file transfer scenarios in order to deploy a truly effective “managed” file transfer system. Today, I want to go over three of the basic types of file transfer—B2B (Business to Business), A2A (Application to Application) and Ad hoc transfers. (more)

 
Managed File Transfer Maxim: Know Your File Transfer Frequency/Volume

Anyone involved in the search for a Managed File Transfer (MFT) solution knows that the MFT process is becoming increasingly complex. Previously, we’ve discussed some crucial aspects of the MFT process. Today, I’d like to introduce you to another key issue--the volume and frequency of file transfers. (more)

 
Ten Industry Experts Weigh In On How To Fix Cybersecurity

It seems every week we hear and read about new data or security breaches. The impact a breach can have on a business of any size could be devastating with the consequences including financial and reputational risks ranging from significant to catastrophic. If your company transfers files and sensitive data, you need to understand the risks involved and know how to proactively reduce those risks. (more)

 
Follow my Mom’s Advice When it Comes to Updating Your Data Security Software

My mom and dad were different in certain respects, especially when it came to household finances. My dad was frugal, which I attribute to the struggles he faced as the oldest of seven kids working on a small family farm during the depression. My mom was frugal, too, but she developed a keen sense of knowing when it was wise to “invest” in a certain aspect of the home or family. Her way of conveying that to my dad was to say: “Vernon (my dad’s name), don’t be penny wise and pound foolish.” (more)