Archive for the ‘data encryption’ Category

Chip and Pin, will EMV cards enhance security at POS?

Authentication is an essential function of a secure managed file transfer process.  Basically, authentication is the process of verifying “the source (identity), uniqueness, and integrity (unaltered contents) of a message.”  With TDXchange, users can be authenticated automatically using their network identity or by entering a secure username and password, or both. (more)

Cybersecurity is a Journey, Not a Destination

Nine months ago, the National Institute of Standards and Technology (NIST) released version 1.0 of its Framework for Improving Critical Infrastructure Cybersecurity (Framework).  NIST recently sought and received public feedback from industry relating to “awareness” of, “experiences” with, and a proposed “roadmap for the future” of the Framework.  Since bTrade’s MFT Nation blog followed events leading up to the release of the Framework, we decided to provide some input on the post-release feedback from the public. (more)


Tuesday Tips: The Importance of Strong Passwords and Data Encryption Technology

As we head into week four of our participation in Cybersecurity Awareness Month, it is time again for bTrade’s Tuesdays Tips .  This week’s cybersecurity tips are centered on showcasing what “businesses can do to protect their organization, customers, and employees.”  For the purpose of this blog and its readership, we will focus on two such tips:  the importance of strong passwords, and using encryption technologies for data in-transit. (more)

Using Technology and People to Help Protect Against Data Breaches

Most of us in the data security industry know that a data breach is the most common and costly data security failure for a company of any size. We also know that we have technology to help prevent these attacks—e.g., encryption, firewalls, network monitoring, etc. But if you are waiting for technology alone to solve all your issues, then as my favorite rock group of all time would say, “Dream On”.   It’s true that technology is getting smarter, but this can be undermined when your employees are not trained to play defense. Protecting data systems requires both the technical and human elements to be synchronized. (more)

Follow my Mom’s Advice When it Comes to Updating Your Data Security Software

My mom and dad were different in certain respects, especially when it came to household finances. My dad was frugal, which I attribute to the struggles he faced as the oldest of seven kids working on a small family farm during the depression. My mom was frugal, too, but she developed a keen sense of knowing when it was wise to “invest” in a certain aspect of the home or family. Her way of conveying that to my dad was to say: “Vernon (my dad’s name), don’t be penny wise and pound foolish.” (more)

bTrade Celebrates Strong Growth in 2013

In 2014, the managed file transfer community will no doubt be faced with many data security/data management challenges, which we will cover and discuss throughout the year.  But for now, we would like to take a moment to reflect on the tremendous year we had in 2013. (more)

High Availability–What It Means in a Managed File Transfer Environment

High availability can invoke feelings of insecurity when it comes to evaluating your managed file transfer software resources, but it need not be such a scary prospect.  In its simplest form, high availability allows you to ensure that your system will be operational as close to 100% of the time it needs to be. (more)

Creating a strategic infrastructure . . .

Technology infrastructures, much like living organisms, grow and evolve in order to sustain meaningful existence within their environments.  Unlike living organisms, though, the growth experienced by technology is applied in layers without removing or replacing the older components.  This inevitably creates infrastructures with processes and operations that are vastly more complicated and bloated than they need to be. (more)

Web Design BangladeshBangladesh Online Market