Blog – MFT Nation

heading-img-1
Data Monitoring: Do It or Face the Ugly Consequences

Our data security experts here at bTrade want to let our readers know of a breaking story in the world of data security. News outlets are reporting that Russian crime figures have illegally obtained more than a billion stolen Internet credentials. According to data security firm, the stolen credentials include 1.2 billion password and username combinations and more than 500 million email addresses. (more)

 
Ten Database Security Vulnerabilities That Can Leave Your Company Open to Attack

One of the ongoing goals for this blog is to provide our readers with pertinent articles in the world of managed file transfer and data security. I recently read an article written by Charlie Osborne a blogger for ZDNet’s blog Zero Day, entitled: “The top ten most common database security vulnerabilities”. (more)

 
Three Basic Managed File Transfer Scenarios

After explaining to a friend the type of work I do as a bTrade managed file transfer (MFT) specialist, he said: “Moving data from one place to another is pretty simple.” Generally speaking, he is correct. But as the saying goes, the devil is in the details.

You need to know the details of your file transfer scenarios in order to deploy a truly effective “managed” file transfer system. Today, I want to go over three of the basic types of file transfer—B2B (Business to Business), A2A (Application to Application) and Ad hoc transfers. (more)

 
Managed File Transfer Maxim: Know Your File Transfer Frequency/Volume

Anyone involved in the search for a Managed File Transfer (MFT) solution knows that the MFT process is becoming increasingly complex. Previously, we’ve discussed some crucial aspects of the MFT process. Today, I’d like to introduce you to another key issue--the volume and frequency of file transfers. (more)

 
Ten Industry Experts Weigh In On How To Fix Cybersecurity

It seems every week we hear and read about new data or security breaches. The impact a breach can have on a business of any size could be devastating with the consequences including financial and reputational risks ranging from significant to catastrophic. If your company transfers files and sensitive data, you need to understand the risks involved and know how to proactively reduce those risks. (more)

 
Follow my Mom’s Advice When it Comes to Updating Your Data Security Software

My mom and dad were different in certain respects, especially when it came to household finances. My dad was frugal, which I attribute to the struggles he faced as the oldest of seven kids working on a small family farm during the depression. My mom was frugal, too, but she developed a keen sense of knowing when it was wise to “invest” in a certain aspect of the home or family. Her way of conveying that to my dad was to say: “Vernon (my dad’s name), don’t be penny wise and pound foolish.” (more)

 
FTP vs. MFT: Gaining Control of Your Organization’s Data

Is it a good practice to transmit data using the File Transfer Protocol (FTP)?  bTrade, as well as most IT professionals, answer this question with a resounding:  “No!”  In fact, we would tell you that relying solely on FTP to transmit data exposes an organization to very clear risks (i.e., lack of visibility and reliability) and would pose very serious challenges with controlling the high costs associated with managing/maintaining such processes. (more)

 
Anti-Virus is Dead

Symantec, the inventor of commercial antivirus software, has publicly disclosed that antivirus tactics have been rendered largely ineffective. The disclosure came from Brian Dye, Symantec's senior vice president for information security, during an interview with the Wall Street Journal. Mr. Dye said that because antivirus tactics catch only about 45% of cyber attacks, he considers antivirus “dead.” Yes, that’s right, the company that invented antivirus software and still derives a big chunk of its revenues from antivirus software, has declared it all but dead. (more)