Visibility

Why do I need Managed File Transfer? Isn’t FTP enough?

Possibly not. The Internet’s venerable File Transfer Protocol (FTP) is usually supported by Managed File Transfer (MFT) systems, which can typically use FTP as one of the ways in which data is physically moved from place to place. However, MFT essentially wraps a significant management and automation layer around FTP. Consider some of […]

Also posted in Advanced File Services, Auditing, Enforcement, FTP, Integration, Interactions, Ipswitch, Ipswitch Products and Services, Managed File Transfer, Management, MessageWay, MOVEit, Person-to-Person, Social Media, Technology and Software, WS_FTP Professional, WS_FTP Server | Tagged , , , , , , , , , , , , , , , , | Leave a comment

When transferring files, isn’t all encryption the same?

Definitely not. To begin with, there are numerous kinds of encryption—some of which can actually be broken quite easily. One of the earlier common forms of encryption (around 1996) relied on encryption keys that were 40 bits in length; surprisingly, many technologies and products continue to use this older, weaker form of encryption. […]

Also posted in Auditing, Compliance, Data Breach, Enforcement, File Security, FTP, Integration, Interactions, Ipswitch, Ipswitch Products and Services, Managed File Transfer, Management, MessageWay, MOVEit, Person-to-Person, Security, Technology and Software, WS_FTP Professional, WS_FTP Server | Tagged , , , , , , , , , , , , , , , | Leave a comment

You must protect the security AND privacy of confidential information

Here’s a great article by Brian O’Connell of CPA Site Solutions on how to deal with email security difficulties.  The context of the article is from the perspective of the accounting industry, but I’d say it’s an extremely universal topic that actually impacts almost every kind of company today. The […]

Also posted in Data Breach, Enforcement, File Security, Management, Person-to-Person, Security | Tagged , , , , , , , , , | Leave a comment

Email – Rethinking how files get shared

Email is the world’s collaborative tool and is the electronic ‘sending’ system of choice between people, both within and across organizations. While the capabilities of transferring files via email hasn’t improved much in the past 10 years, the size and sensitivity of files has multiplied ten-fold. Email usage is ungoverned […]

Also posted in Data Breach, Managed File Transfer, Management, Person-to-Person, Security | Tagged , , , , | Leave a comment

FTP is unsecure and generally unmonitored

SC Magazine just published a short article titled “FTP described as unsecure and generally unmonitored”. In the article, fellow Managed File Transfer (MFT) vendor Axway correctly points out that “usernames, passwords, commands and data can be easily intercepted and read while files transferred via FTP are uploaded or downloaded without […]

Also posted in Enforcement, FTP, Managed File Transfer, Management | Tagged , , , , | Leave a comment

We warned you!

Ipswitch has been cautioning companies about the dangers of private/confidential information being sent through Google (and other hosted and person-to-person services), both from a security and a responsibility perspective. Last week’s GMail hack further drives home the point that organizations must proactively manage and have visibility into what information is […]

Also posted in Cloud Computing, Data Breach, Enforcement, File Security, Integration, Person-to-Person, Security, Webcasts | Tagged , , , , | Leave a comment

Google versus China – Is your company at risk?

Google revealed yesterday a targeted phishing attack from China against hundreds of GMail users, including government officials and military personnel.  The FBI, Department of Homeland Security, and the White House National Security Council are all participating in an investigation of the cyber attack. My hope is that this breach will […]

Also posted in Auditing, Data Breach, Enforcement, File Security, Ipswitch, Managed File Transfer, Person-to-Person, Security | Tagged , , , , , , , , , | Leave a comment