al B2B Secure File Sharing Blog | FTP Today | Martin Horan (3)

x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Martin Horan

Founder of FTP Today and an expert in secure file transfer and Internet protocols. A software and IT geek since a young age, Martin has successfully led his companies through the digital age by spotting market niches and filling them with quality IT services.

Blog Feature

Government Compliance

The 3 Stages of FedRAMP Compliance

Many cloud service providers strive to be FedRAMP compliant and earn their FedRAMP authorization. Gaining FedRAMP authorization means that federal government agencies have permission to work with a specific cloud service provider. This provider has demonstrated that they can meet FedRAMP requirements to keep sensitive data protected, making them a suitable service provider for government organizations.  Let’s look at the three stages of FedRAMP compliance and learn more about the process cloud service providers go through to be FedRAMP compliant. We’ll also take a closer look at the benefits of working with cloud service providers who have been through this process and received their FedRAMP authorization.

Read More

Blog Feature

Healthcare Compliance

5 Types of Challenges You Must Overcome to be HIPAA Compliant

If your organization deals with sensitive healthcare data, you’re well aware of the importance of HIPAA compliance. While compliance with the Health Insurance Portability and Accountability Act of 1996 may be time-consuming or complicated, it is definitely essential, regardless of the challenges that come with your compliance efforts.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Cyber and Data Security Government Compliance

4 Benefits of Using a FedRAMP Authorized Cloud Service Provider (CSP)

Security breaches and cybersecurity attacks happen every day, making it imperative that organizations have the proper security controls in place. In addition to having your own security measures established and tested, you also need to ensure that every service provider you work with is up to your standards, especially a cloud service provider (CSP). 

Read More

Blog Feature

Cyber and Data Security File Sharing Best Practices

How BYOD Is Affecting Your Business's File Security

No longer just a novel approach to office technology, BYOD (bring your own device) policies have become common practice in today’s workplaces. It’s easy to see why as we grow more dependent on smartphones, tablets, laptops, and other devices by the day. 

Read More

Blog Feature

Cyber and Data Security Government Compliance

The Difference Between ATO and P-ATO FedRAMP Authorization

For so many organizations, especially government agencies, it can feel like compliance requirements are increasing each day. It can be a challenge to keep up with all the necessary requirements Cloud Service Providers must meet. FedRAMP is one such requirement. 

Read More

Blog Feature

Government Compliance

Understanding The Levels of FedRAMP Compliance

Choosing a cloud service provider is a major decision for many organizations, especially when you factor in FedRAMP compliance. Understanding the levels of FedRAMP compliance is imperative for those agencies trying to determine which cloud service provider is right for their needs. 

Read More

Blog Feature

File Sharing Best Practices Healthcare Compliance

How to Be HIPAA Compliant When Sharing Sensitive Files

Is your company subject to HIPAA compliance regulations? If you deal with healthcare data, the answer is yes. Maintaining HIPAA compliance is essential if you want to avoid steep fines, protect your business, and most importantly, protect the sensitive healthcare data belonging to your customers.

Read More

Blog Feature

Government Compliance

An Overview of Regulations Under The DDTC

When you deal with defense-related data and services, the different compliance regulations you’re subject to can be difficult to keep straight. One set of compliance mandates, ITAR, comes from the DDTC. Learn more about the DDTC, its relation to ITAR and USML, and how to maintain compliance. 

Read More

Blog Feature

Government Compliance

Data Security Best Practices for ITAR Compliance

If you’re running a company that’s subject to ITAR compliance regulations, you know how important data security can be. ITAR (International Traffic in Arms Regulations) guidelines are provided by the U.S. government to ensure that sensitive materials don’t fall into the hands of foreign or nefarious parties, and contractors play a big role in aiding the government in its efforts.

Read More

Blog Feature

Cyber and Data Security Government Compliance

6 Steps for Implementing the NIST Cybersecurity Framework

Implementing the NIST Cybersecurity Framework is one of the best ways to mitigate the risk of a data breach in your organization. If you want to keep your sensitive files protected from nefarious parties roaming the net, the best thing to do is to use this framework in your daily operations. Learn more about the NIST Cybersecurity Framework, and how it can help you keep your data protected.

Read More