Blog – MFT Nation

Handy MFT Tips from bTrade to Help You with Information Governance

A Solution with Monitoring and Scheduling Capability Is a Must

Effective data security is a vital part of delivering value to an organization. To maximize the value of electronic data while also reducing risk, we counsel organizations to take a centralized, global approach to Information governance. We believe that our MFT (Managed File Transfer) software provides a holistic solution for information governance issues because it has the features/functionality to address and resolve the core requirements of the many mandates, whether imposed internally or by external authorities. (more)

Time-Tested Data Security Equation: Out-of-Date Software + Hackers = Disaster

The case of FTC v. Wyndham Worldwide Corp. is a good case study for what not to do in the rapidly changing world of data security. We will share some thoughts about the case in an upcoming blog. But for now, I want to quickly address one allegation from the case because it serves to highlight a point made in an earlier blog post. (more)

Using Technology and People to Help Protect Against Data Breaches

Most of us in the data security industry know that a data breach is the most common and costly data security failure for a company of any size. We also know that we have technology to help prevent these attacks—e.g., encryption, firewalls, network monitoring, etc. But if you are waiting for technology alone to solve all your issues, then as my favorite rock group of all time would say, “Dream On”.   It’s true that technology is getting smarter, but this can be undermined when your employees are not trained to play defense. Protecting data systems requires both the technical and human elements to be synchronized. (more)

Data Monitoring: Do It or Face the Ugly Consequences

Our data security experts here at bTrade want to let our readers know of a breaking story in the world of data security. News outlets are reporting that Russian crime figures have illegally obtained more than a billion stolen Internet credentials. According to data security firm, the stolen credentials include 1.2 billion password and username combinations and more than 500 million email addresses. (more)

Ten Database Security Vulnerabilities That Can Leave Your Company Open to Attack

One of the ongoing goals for this blog is to provide our readers with pertinent articles in the world of managed file transfer and data security. I recently read an article written by Charlie Osborne a blogger for ZDNet’s blog Zero Day, entitled: “The top ten most common database security vulnerabilities”. (more)

Three Basic Managed File Transfer Scenarios

After explaining to a friend the type of work I do as a bTrade managed file transfer (MFT) specialist, he said: “Moving data from one place to another is pretty simple.” Generally speaking, he is correct. But as the saying goes, the devil is in the details.

You need to know the details of your file transfer scenarios in order to deploy a truly effective “managed” file transfer system. Today, I want to go over three of the basic types of file transfer—B2B (Business to Business), A2A (Application to Application) and Ad hoc transfers. (more)

Managed File Transfer Maxim: Know Your File Transfer Frequency/Volume

Anyone involved in the search for a Managed File Transfer (MFT) solution knows that the MFT process is becoming increasingly complex. Previously, we’ve discussed some crucial aspects of the MFT process. Today, I’d like to introduce you to another key issue--the volume and frequency of file transfers. (more)

Ten Industry Experts Weigh In On How To Fix Cybersecurity

It seems every week we hear and read about new data or security breaches. The impact a breach can have on a business of any size could be devastating with the consequences including financial and reputational risks ranging from significant to catastrophic. If your company transfers files and sensitive data, you need to understand the risks involved and know how to proactively reduce those risks. (more)