5 Benefits when Using Secure Email and Attachment Solutions
Do you send sensitive documents and files using email? Could you do more to protect those documents and files to ensure their confidentiality? These are just two of the more obvious questions which many an IT administrator and security officer are now asking their organisations, as the world and it's regulators become more focussed and stringent on data protection.
Understanding SWIFT CSP Regulation: Key Steps to Business Compliance Have you ever met an IT manager, administrator, CISO or compliance officer who had a lot of time on their hands? No, me neither. If they exist, then they are certainly a rare breed!
It may be obvious to some that FTP (File Transfer Protocol) is an insecure protocol; and that its continued use for transferring sensitive or personal is inappropriate. Yet, its use for that very purpose still continues according to Rapid7, creating an unnecessary risk.
You may have noticed that this is our second blog post on the different configurable modes of FTP, in recent days - after our previous blog on the differences between active and passive FTP. We often write about our experiences at the time and the past 30-days have been no exception, having spoken with and assisted a number of customers through the intricacies of FTP. One such question which keeps coming up is the difference between implicit and explicit FTP - otherwise known as FTPS.